| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2024-8360 | Visteon Infotainment REFLASH_DDU_ExtractFile Command Injection Remote Code Execution Vulnerability | Visteon | Infotainment | 中危 | - | 2024-11-22 21:33:33 | Deep Dive |
| CVE-2024-8359 | Visteon Infotainment REFLASH_DDU_FindFile Command Injection Remote Code Execution Vulnerability | Visteon | Infotainment | 中危 | - | 2024-11-22 21:33:20 | Deep Dive |
| CVE-2024-8358 | Visteon Infotainment UPDATES_ExtractFile Command Injection Remote Code Execution Vulnerability | Visteon | Infotainment | 中危 | - | 2024-11-22 21:33:10 | Deep Dive |
| CVE-2024-8357 | Visteon Infotainment App SoC Missing Immutable Root of Trust in Hardware Local Privilege Escalation Vulnerability | Visteon | Infotainment | 高危 | - | 2024-11-22 21:32:59 | Deep Dive |
| CVE-2024-8356 | Visteon Infotainment VIP MCU Code Insufficient Validation of Data Authenticity Local Privilege Escalation Vulnerability | Visteon | Infotainment | 高危 | - | 2024-11-22 21:32:48 | Deep Dive |
| CVE-2024-8355 | Visteon Infotainment System DeviceManager iAP Serial Number SQL Injection Vulnerability | Visteon | Infotainment | 中危 | - | 2024-11-22 21:32:38 | Deep Dive |
| CVE-2023-28898 | Head Unit Denial-of-Service via Apple CarPlay service | JOYNEXT | MIB3 Infotainment Unit | Medium | 5.3 | 2024-01-12 16:04:57 | Deep Dive |
| CVE-2023-28897 | Hard-coded password for UDS services | JOYNEXT | MIB3 Infotainment Unit | Medium | 4.0 | 2024-01-12 15:55:00 | Deep Dive |
| CVE-2023-28896 | Weak encoding for password in UDS services | JOYNEXT | MIB3 Infotainment Unit | Low | 3.3 | 2023-12-01 14:01:06 | Deep Dive |
| CVE-2023-28895 | Hard-coded password for access to power controller chip memory | JOYNEXT | MIB3 Infotainment Unit | Low | 3.5 | 2023-12-01 13:41:17 | Deep Dive |