Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-53845

Description: ESPTouch is a connection protocol for internet of things devices. In the ESPTouchV2 protocol, while there is an option to use a custom AES key, there is no option to set the IV (Initialization Vector) prior to versions 5.3.2, 5.2.4, 5.1.6, and 5.0.8. The IV is set to zero and remains constant throughout the product's lifetime. In AES/CBC mode, if the IV is not properly initialized, the encrypted output becomes deterministic, leading to potential data leakage. To address the aforementioned issues, the application generates a random IV when activating the AES key starting in versions 5.3.2, 5.2.4, 5.1.6, and 5.0.8. This IV is then transmitted along with the provision data to the provision device. The provision device has also been equipped with a parser for the AES IV. The upgrade is applicable for all applications and users of ESPTouch v2 component from ESP-IDF. As it is implemented in the ESP Wi-Fi stack, there is no workaround for the user to fix the application layer without upgrading the underlying firmware.

CVSS: MEDIUM (6.6)

EPSS Score: 0.04%

Source: CVE
December 12th, 2024 (6 months ago)

CVE-2024-53273

Description: Habitica is an open-source habit-building program. Versions prior to 5.28.5 are vulnerable to reflected cross-site scripting. The `register` function in `RegisterLoginReset.vue` contains a reflected XSS vulnerability due to an incorrect sanitization function. An attacker can specify a malicious `redirectTo` parameter to trigger the vulnerability, giving the attacker control of the victim’s account when a victim registers or logins with a specially crafted link. Version 5.28.5 contains a patch.

CVSS: MEDIUM (5.0)

EPSS Score: 0.04%

Source: CVE
December 12th, 2024 (6 months ago)

CVE-2024-53272

Description: Habitica is an open-source habit-building program. Versions prior to 5.28.5 are vulnerable to reflected cross-site scripting. The `login` and `social media` function in `RegisterLoginReset.vue` contains two reflected XSS vulnerabilities due to an incorrect sanitization function. An attacker can specify a malicious `redirectTo` parameter to trigger the vulnerability, giving the attacker control of the victim’s account when a victim registers or logins with a specially crafted link. Version 5.28.5 contains a patch.

CVSS: MEDIUM (5.0)

EPSS Score: 0.04%

Source: CVE
December 12th, 2024 (6 months ago)

CVE-2024-52537

Description: Dell Client Platform Firmware Update Utility contains an Improper Link Resolution vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

CVSS: MEDIUM (6.3)

EPSS Score: 0.04%

Source: CVE
December 12th, 2024 (6 months ago)

CVE-2024-51460

Description: IBM InfoSphere Information Server 11.7 could allow an authenticated user to obtain sensitive information when a detailed technical error message is returned in a stack trace. This information could be used in further attacks against the system.

CVSS: MEDIUM (4.3)

EPSS Score: 0.05%

Source: CVE
December 12th, 2024 (6 months ago)

CVE-2024-49532

Description: Acrobat Reader versions 24.005.20307, 24.001.30213, 24.001.30193, 20.005.30730, 20.005.30710 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS: MEDIUM (5.5)

EPSS Score: 0.04%

Source: CVE
December 12th, 2024 (6 months ago)

CVE-2024-49111

Description: Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability

CVSS: MEDIUM (6.6)

EPSS Score: 0.05%

Source: CVE
December 12th, 2024 (6 months ago)

CVE-2024-49110

Description: Windows Mobile Broadband Driver Elevation of Privilege Vulnerability

CVSS: MEDIUM (6.8)

EPSS Score: 0.05%

Source: CVE
December 12th, 2024 (6 months ago)

CVE-2024-49109

Description: Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability

CVSS: MEDIUM (6.6)

EPSS Score: 0.05%

Source: CVE
December 12th, 2024 (6 months ago)

CVE-2024-49099

Description: Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability

CVSS: MEDIUM (4.3)

EPSS Score: 0.05%

Source: CVE
December 12th, 2024 (6 months ago)