A vulnerability classified as problematic has been found in Idera Uptime Infrastructure Monitor up to 7.6. Affected is an unknown function of the component up.time Client. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2015-2896. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability has been found in German National Identity Card up to 2024-02-15 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Online-Ausweis-Funktion eID Scheme Handler. The manipulation leads to authentication bypass by spoofing.
This vulnerability is known as CVE-2024-23674. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Linux Kernel up to 5.15.133/6.1.55/6.5.5. It has been rated as problematic. Affected by this issue is some unknown functionality of the component sun6i. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2023-52511. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Google Android. This affects an unknown part of the component ACPM. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2024-22006. The attack can only be done within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic was found in Elspec G5 Digital Fault Recorder up to 1.1.4.15. Affected by this vulnerability is an unknown functionality of the component shadow File. The manipulation leads to incorrect default permissions.
This vulnerability is known as CVE-2024-22085. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in Linux Kernel up to 5.10.209/5.15.148/6.1.75/6.6.14/6.7.2. It has been classified as critical. Affected is the function __dma_async_device_channel_register of the component dmaengine. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2023-52492. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
Omdia Principal Analyst Hollie Hennessy says that until a promising new set of regulations around the world comes online, connected device security entails a shared responsibility among consumers, enterprises, and manufacturers.
Cisco has fixed a maximum severity vulnerability that allows attackers to run commands with root privileges on vulnerable Ultra-Reliable Wireless Backhaul (URWB) access points that provide connectivity for industrial wireless automation. [...]