Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
motorola vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-38281
An attacker can access the maintenance console using hard coded credentials for a hidden wireless network on the device.
NA
CVE-2024-38282
Utilizing default credentials, an attacker is able to log into the camera's operating system which could allow changes to be made to the operations or shutdown the camera requiring a physical reboot of the system.
NA
CVE-2024-38283
Sensitive customer information is stored in the device without encryption.
NA
CVE-2024-38284
Transmitted data is logged between the device and the backend service. An attacker could use these logs to perform a replay attack to replicate calls.
NA
CVE-2024-38285
Logs storing credentials are insufficiently protected and can be decoded through the use of open source tools.
9.3
CVSSv2
CVE-2016-10277
An elevation of privilege vulnerability in the Motorola bootloader could enable a local malicious application to execute arbitrary code within the context of the bootloader. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may r...
Linux Linux Kernel 3.10
Linux Linux Kernel 3.18
1 EDB exploit
3 Github repositories
7.5
CVSSv2
CVE-2008-1118
Timbuktu Pro 8.6.5 for Windows, and possibly 8.7 for Mac OS X, does not perform input validation before logging information fields taken from packets from a remote peer, which allows remote malicious users to generate crafted log entries, and possibly avoid detection of attacks, ...
Netopia Timbuktu Pro 8.6.5
1 EDB exploit
NA
CVE-2023-38301
An issue exists in a third-party component related to vendor.gsm.serial, shipped on devices from multiple device manufacturers. Various software builds for the BLU View 2, Boost Mobile Celero 5G, Sharp Rouvo V, Motorola Moto G Pure, Motorola Moto G Power, T-Mobile Revvl 6 Pro 5G,...
NA
CVE-2023-38291
An issue exists in a third-party component related to ro.boot.wifimacaddr, shipped on devices from multiple device manufacturers. Various software builds for the following TCL devices (30Z and 10L) and Motorola devices (Moto G Pure and Moto G Power) leak the Wi-Fi MAC address to ...
NA
CVE-2022-30273
The Motorola MDLC protocol through 2022-05-02 mishandles message integrity. It supports three security modes: Plain, Legacy Encryption, and New Encryption. In Legacy Encryption mode, traffic is encrypted via the Tiny Encryption Algorithm (TEA) block-cipher in ECB mode. This mode ...
Motorolasolutions Mdlc 4.80.0024
Motorolasolutions Mdlc 4.82.004
Motorolasolutions Mdlc 4.83.001
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
buffer overflow
type confusion
server-side request forgery
CVE-2024-38440
CVE-2024-27801
CVE-2024-5868
CVE-2024-0582
CVE-2024-37643
CVE-2024-3105
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »