Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-48259 | Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path. |
Mon, 15 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Wed, 28 May 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Wed, 12 Feb 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 21 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 21 Jan 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Radix smart Recovery
|
|
| CPEs | cpe:2.3:a:radix:smart_recovery:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Radix smartrecovery
|
Radix smart Recovery
|
Tue, 21 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cs-grp
Cs-grp neo Impact |
|
| CPEs | cpe:2.3:a:cs-grp:neo_impact:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ces
Ces neoimpact |
Cs-grp
Cs-grp neo Impact |
Tue, 21 Jan 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ces
Ces neoimpact Greenware Greenware greenguard Howyar Howyar sysreturn Radix Radix smartrecovery Sanfong Sanfong ez-back System Signalcomputer Signalcomputer hdd King Wasay Wasay erecoveryrx |
|
| Weaknesses | CWE-347 | |
| CPEs | cpe:2.3:a:ces:neoimpact:*:*:*:*:*:*:*:* cpe:2.3:a:greenware:greenguard:*:*:*:*:*:*:*:* cpe:2.3:a:howyar:sysreturn:*:*:*:*:*:*:*:* cpe:2.3:a:radix:smartrecovery:*:*:*:*:*:*:*:* cpe:2.3:a:sanfong:ez-back_system:*:*:*:*:*:*:*:* cpe:2.3:a:signalcomputer:hdd_king:*:*:*:*:*:*:*:* cpe:2.3:a:wasay:erecoveryrx:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Ces
Ces neoimpact Greenware Greenware greenguard Howyar Howyar sysreturn Radix Radix smartrecovery Sanfong Sanfong ez-back System Signalcomputer Signalcomputer hdd King Wasay Wasay erecoveryrx |
Fri, 17 Jan 2025 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 14 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 14 Jan 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 14 Jan 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path. | |
| Title | Howyar UEFI Application "Reloader" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path. | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2025-09-15T15:36:17.748Z
Reserved: 2024-07-31T16:05:09.477Z
Link: CVE-2024-7344
Updated: 2025-01-14T15:02:40.649Z
Status : Analyzed
Published: 2025-01-14T14:15:34.930
Modified: 2025-01-22T15:41:04.577
Link: CVE-2024-7344
OpenCVE Enrichment
No data.
EUVD