Total
12313 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-20752 | 2 Google, Mediatek | 8 Android, Mt8167, Mt8167s and 5 more | 2025-01-07 | N/A | 6.7 MEDIUM |
In keymange, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826586; Issue ID: ALPS07826586. | |||||
CVE-2023-20751 | 2 Google, Mediatek | 8 Android, Mt8167, Mt8167s and 5 more | 2025-01-07 | N/A | 6.7 MEDIUM |
In keymange, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07825502; Issue ID: ALPS07825502. | |||||
CVE-2023-20750 | 2 Google, Mediatek | 23 Android, Mt6835, Mt6886 and 20 more | 2025-01-07 | N/A | 4.1 MEDIUM |
In swpm, there is a possible out of bounds write due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07780926; Issue ID: ALPS07780928. | |||||
CVE-2023-20749 | 2 Google, Mediatek | 28 Android, Mt6789, Mt6835 and 25 more | 2025-01-07 | N/A | 6.7 MEDIUM |
In swpm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07780926; Issue ID: ALPS07780926. | |||||
CVE-2023-20716 | 4 Google, Linux, Linuxfoundation and 1 more | 32 Android, Linux Kernel, Iot-yocto and 29 more | 2025-01-07 | N/A | 6.7 MEDIUM |
In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07796883; Issue ID: ALPS07796883. | |||||
CVE-2023-20715 | 4 Google, Linux, Linuxfoundation and 1 more | 31 Android, Linux Kernel, Iot-yocto and 28 more | 2025-01-07 | N/A | 6.7 MEDIUM |
In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07796900; Issue ID: ALPS07796900. | |||||
CVE-2023-20712 | 4 Google, Linux, Linuxfoundation and 1 more | 32 Android, Linux Kernel, Iot-yocto and 29 more | 2025-01-07 | N/A | 6.7 MEDIUM |
In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07796914; Issue ID: ALPS07796914. | |||||
CVE-2022-40655 | 1 Nikon | 1 Nis-elements Viewer | 2025-01-07 | N/A | 7.8 HIGH |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of NIKON NIS-Elements Viewer 1.2100.1483.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ND2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15071. | |||||
CVE-2023-0668 | 2 Debian, Wireshark | 2 Debian Linux, Wireshark | 2025-01-07 | N/A | 6.5 MEDIUM |
Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark. | |||||
CVE-2023-0666 | 2 Debian, Wireshark | 2 Debian Linux, Wireshark | 2025-01-07 | N/A | 6.5 MEDIUM |
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark. | |||||
CVE-2024-47398 | 2025-01-07 | N/A | 8.8 HIGH | ||
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the device is unable to boot up through out-of-bounds write. | |||||
CVE-2023-34568 | 1 Tenda | 2 Ac10, Ac10 Firmware | 2025-01-06 | N/A | 6.7 MEDIUM |
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter time at /goform/PowerSaveSet. | |||||
CVE-2023-34566 | 1 Tenda | 2 Ac10, Ac10 Firmware | 2025-01-06 | N/A | 9.8 CRITICAL |
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter time at /goform/saveParentControlInfo. | |||||
CVE-2023-33660 | 1 Emqx | 1 Nanomq | 2025-01-06 | N/A | 7.5 HIGH |
A heap buffer overflow vulnerability exists in NanoMQ 0.17.2. The vulnerability can be triggered by calling the function copyn_str() in the file mqtt_parser.c. An attacker could exploit this vulnerability to cause a denial of service attack. | |||||
CVE-2023-34571 | 1 Tenda | 2 Ac10, Ac10 Firmware | 2025-01-06 | N/A | 6.7 MEDIUM |
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter shareSpeed at /goform/WifiGuestSet. | |||||
CVE-2023-34570 | 1 Tenda | 2 Ac10, Ac10 Firmware | 2025-01-06 | N/A | 6.7 MEDIUM |
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter devName at /goform/SetOnlineDevName. | |||||
CVE-2023-34569 | 1 Tenda | 2 Ac10, Ac10 Firmware | 2025-01-06 | N/A | 6.7 MEDIUM |
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter list at /goform/SetNetControlList. | |||||
CVE-2023-34567 | 1 Tenda | 2 Ac10, Ac10 Firmware | 2025-01-06 | N/A | 6.7 MEDIUM |
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter list at /goform/SetVirtualServerCfg. | |||||
CVE-2023-33658 | 1 Emqx | 1 Nanomq | 2025-01-06 | N/A | 7.5 HIGH |
A heap buffer overflow vulnerability exists in NanoMQ 0.17.2. The vulnerability can be triggered by calling the function nni_msg_get_pub_pid() in the file message.c. An attacker could exploit this vulnerability to cause a denial of service attack. | |||||
CVE-2023-0667 | 1 Wireshark | 1 Wireshark | 2025-01-06 | N/A | 6.5 MEDIUM |
Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark |