CVE-2024-13396
Vie, 31/01/2025 – 03:15
CVE-2024-13396
CVE-2024-13396
Vie, 31/01/2025 – 03:15
CVE-2024-13396
CVE-2024-13817
Vie, 31/01/2025 – 03:15
CVE-2024-13817
CVE-2024-13767
Vie, 31/01/2025 – 03:15
CVE-2024-13767
CVE-2024-13399
Vie, 31/01/2025 – 03:15
CVE-2024-13399
CVE-2024-13397
Vie, 31/01/2025 – 03:15
CVE-2024-13397
CVE-2024-46974
Vie, 31/01/2025 – 03:15
CVE-2024-46974
CVE-2024-23971
Vie, 31/01/2025 – 00:15
CVE-2024-23971
The specific flaw exists within the handling of OCPP messages. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
CVE-2024-23970
Vie, 31/01/2025 – 00:15
CVE-2024-23970
The specific flaw exists within the CURLOPT_SSL_VERIFYHOST setting. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.
CVE-2024-23969
Vie, 31/01/2025 – 00:15
CVE-2024-23969
The specific flaw exists within the wlanchnllst function. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of root.
CVE-2024-24731
Vie, 31/01/2025 – 00:15
CVE-2024-24731
The specific flaw exists within the implementation of the http_download command. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.