Page 4 of 20 results (0.006 seconds)

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in the ActiveX control in Sharp EVA Animeter allows remote attackers to execute arbitrary code via a crafted web page. Desbordamiento de buffer en el control ActiveX en Sharp EVA Animeter permite a atacantes remotos ejecutar código arbitrario a través de una página web manipulada. • http://jvn.jp/en/jp/JVN41875357/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2016-000038 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 0

Multiple unspecified vulnerabilities in the Syslink driver for Texas Instruments OMAP mobile processor, as used on NTT DOCOMO ARROWS Tab LTE F-01D, ARROWS X LTE F-05D, Disney Mobile on docomo F-08D, REGZA Phone T-01D, and PRADA phone by LG L-02D; and SoftBank SHARP handsets 102SH allow local users to execute arbitrary code or read kernel memory via unknown vectors related to userland data and "improper data validation." Múltiples vulnerabilidades no especificadas en el controlador Syslink para el procesador móvil de Texas Instruments OMAP, utilizado en NTT DOCOMO ARROWS Tab LTE F-01D, ARROWS X LTE F-05D, Disney Mobile on docomo F-08D, REGZA Phone T-01D, y PRADA phone por LG L-02D; y los teléfonos SoftBank SHARP 102SH permiten a usuarios locales ejecutar código arbitrario o leer la memoria del kernel a través de vectores desconocidos relacionados con los datos userland y 'la validación de datos incorrecta.' • http://jvn.jp/en/jp/JVN67792023/397327/index.html http://jvn.jp/en/jp/JVN67792023/995312/index.html http://jvn.jp/en/jp/JVN67792023/index.html http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000137.html •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

The Sharp AQUOS PhotoPlayer HN-PP150 with firmware before 1.04.00.04 allows remote attackers to cause a denial of service (networking outage) via crafted packet data. Sharp AQUOS PhotoPlayer HN-PP150 con firmware anterior a v1.04.00.04 permite a atacantes remotos provocar una denegación de servicio (agotamiento de red) a través de paquetes de datos manipulados. • http://jvn.jp/en/jp/JVN68773685/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2013-000068 http://www.sharp.co.jp/support/photoplayer/fw_update.html •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

Sharp Zaurus PDA SL-5000D and SL-5500 uses a salt of "A0" to encrypt the screen-locking password as stored in the Security.conf file, which makes it easier for local users to guess the password via brute force methods. • http://online.securityfocus.com/archive/1/281437 http://www.iss.net/security_center/static/9535.php http://www.securityfocus.com/bid/5201 • CWE-326: Inadequate Encryption Strength •

CVSS: 10.0EPSS: 1%CPEs: 2EXPL: 0

The FTP service in Zaurus PDAs SL-5000D and SL-5500 does not require authentication, which allows remote attackers to access the file system as root. • http://online.securityfocus.com/archive/1/281437 http://www.iss.net/security_center/static/9534.php http://www.securityfocus.com/archive/1/281549 http://www.securityfocus.com/archive/1/281652 http://www.securityfocus.com/bid/5200 •