Embedded System Vulnerabilities
A focused list of vulnerabilities relevant to embedded and IoT devices.
| CVE ID | Description | Severity | Published | Type |
|---|---|---|---|---|
| CVE-2015-7890 | Multiple buffer overflows in the esa_write function in /dev/seirenin the Exynos Seiren Audio driver, as used in Samsung… | Medium (5.5) | 2020-02-12 | Environment Specific |
| CVE-2014-2560 | The PhonerLite phone before 2.15 provides hashed credentials in a response to an invalid authentication challenge, whic… | High (7.5) | 2020-02-12 | Environment Specific |
| CVE-2009-5140 | The SIP implementation on the Linksys SPA2102 phone adapter provides hashed credentials in a response to an invalid aut… | High (8.8) | 2020-02-12 | Environment Specific |
| CVE-2009-5139 | The SIP implementation on the Gizmo5 software phone provides hashed credentials in a response to an invalid authenticat… | High (7.5) | 2020-02-12 | Environment Specific |
| CVE-2014-8128 | LibTIFF prior to 4.0.4, as used in Apple iOS before 8.4 and OS X before 10.10.4 and other products, allows remote attac… | Medium (6.5) | 2020-02-12 | Environment Specific |