Vulnerabilities (CVE)

Filtered by CWE-787
Total 12307 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-24134 1 Heimgardtechnologies 2 Eagle 1200ac, Eagle 1200ac Firmware 2024-11-21 N/A 6.5 MEDIUM
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey3 parameter at /goform/WifiBasicSet.
CVE-2023-24133 1 Heimgardtechnologies 2 Eagle 1200ac, Eagle 1200ac Firmware 2024-11-21 N/A 6.5 MEDIUM
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey_5g parameter at /goform/WifiBasicSet.
CVE-2023-24132 1 Heimgardtechnologies 2 Eagle 1200ac, Eagle 1200ac Firmware 2024-11-21 N/A 6.5 MEDIUM
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey3_5g parameter at /goform/WifiBasicSet.
CVE-2023-24131 1 Heimgardtechnologies 2 Eagle 1200ac, Eagle 1200ac Firmware 2024-11-21 N/A 6.5 MEDIUM
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey1_5g parameter at /goform/WifiBasicSet.
CVE-2023-24130 1 Heimgardtechnologies 2 Eagle 1200ac, Eagle 1200ac Firmware 2024-11-21 N/A 6.5 MEDIUM
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey parameter at /goform/WifiBasicSet.
CVE-2023-24129 1 Heimgardtechnologies 2 Eagle 1200ac, Eagle 1200ac Firmware 2024-11-21 N/A 6.5 MEDIUM
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey4 parameter at /goform/WifiBasicSet.
CVE-2023-24128 1 Heimgardtechnologies 2 Eagle 1200ac, Eagle 1200ac Firmware 2024-11-21 N/A 6.5 MEDIUM
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey2 parameter at /goform/WifiBasicSet.
CVE-2023-24127 1 Heimgardtechnologies 2 Eagle 1200ac, Eagle 1200ac Firmware 2024-11-21 N/A 6.5 MEDIUM
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey1 parameter at /goform/WifiBasicSet.
CVE-2023-24099 1 Trendnet 2 Tew-820ap, Tew-820ap Firmware 2024-11-21 N/A 8.8 HIGH
TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the username parameter at /formWizardPassword. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2023-24095 1 Trendnet 2 Tew-820ap, Tew-820ap Firmware 2024-11-21 N/A 8.8 HIGH
TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the submit-url parameter at /formSystemCheck. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2023-24018 1 Milesight 2 Ur32l, Ur32l Firmware 2024-11-21 N/A 8.8 HIGH
A stack-based buffer overflow vulnerability exists in the libzebra.so.0.0.0 security_decrypt_password functionality of Milesight UR32L v32.3.0.5. A specially crafted HTTP request can lead to a buffer overflow. An authenticated attacker can send an HTTP request to trigger this vulnerability.
CVE-2023-24014 1 Deltaww 1 Cncsoft-b 2024-11-21 N/A 7.8 HIGH
Delta Electronics' CNCSoft-B DOPSoft versions 1.0.0.4 and prior are vulnerable to heap-based buffer overflow, which could allow an attacker to execute arbitrary code.
CVE-2023-23910 1 Intel 2 Oneapi Hpc Toolkit, Trace Analyzer And Collector 2024-11-21 N/A 3.9 LOW
Out-of-bounds write for some Intel(R) Trace Analyzer and Collector software before version 2021.8.0 published Dec 2022 may allow an authenticated user to potentially escalation of privilege via local access.
CVE-2023-23782 1 Fortinet 1 Fortiweb 2024-11-21 N/A 7.8 HIGH
A heap-based buffer overflow in Fortinet FortiWeb version 7.0.0 through 7.0.1, FortiWeb version 6.3.0 through 6.3.19, FortiWeb 6.4 all versions, FortiWeb 6.2 all versions, FortiWeb 6.1 all versions allows attacker to escalation of privilege via specifically crafted arguments to existing commands.
CVE-2023-23781 1 Fortinet 1 Fortiweb 2024-11-21 N/A 6.4 MEDIUM
A stack-based buffer overflow vulnerability [CWE-121] in FortiWeb version 7.0.1 and below, 6.4 all versions, version 6.3.19 and below SAML server configuration may allow an authenticated attacker to achieve arbitrary code execution via specifically crafted XML files.
CVE-2023-23780 1 Fortinet 1 Fortiweb 2024-11-21 N/A 8.0 HIGH
A stack-based buffer overflow in Fortinet FortiWeb version 7.0.0 through 7.0.1, Fortinet FortiWeb version 6.3.6 through 6.3.19, Fortinet FortiWeb 6.4 all versions allows attacker to escalation of privilege via specifically crafted HTTP requests.
CVE-2023-23609 1 Contiki-ng 1 Contiki-ng 2024-11-21 N/A 8.2 HIGH
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. Versions prior to and including 4.8 are vulnerable to an out-of-bounds write that can occur in the BLE-L2CAP module. The Bluetooth Low Energy - Logical Link Control and Adaptation Layer Protocol (BLE-L2CAP) module handles fragmentation of packets up the configured MTU size. When fragments are reassembled, they are stored in a packet buffer of a configurable size, but there is no check to verify that the packet buffer is large enough to hold the reassembled packet. In Contiki-NG's default configuration, it is possible that an out-of-bounds write of up to 1152 bytes occurs. The vulnerability has been patched in the "develop" branch of Contiki-NG, and will be included in release 4.9. The problem can be fixed by applying the patch in Contiki-NG pull request #2254 prior to the release of version 4.9.
CVE-2023-23585 1 Honeywell 4 Direct Station, Engineering Station, Experion Server and 1 more 2024-11-21 N/A 9.8 CRITICAL
Experion server DoS due to heap overflow occurring during the handling of a specially crafted message for a specific configuration operation.  See Honeywell Security Notification for recommendations on upgrading and versioning.
CVE-2023-23582 1 Snapav 2 Wattbox Wb-300-ip-3, Wattbox Wb-300-ip-3 Firmware 2024-11-21 N/A 5.3 MEDIUM
Snap One Wattbox WB-300-IP-3 versions WB10.9a17 and prior are vulnerable to a heap-based buffer overflow, which could allow an attacker to execute arbitrary code or crash the device remotely.
CVE-2023-23580 1 Intel 2 Oneapi Hpc Toolkit, Trace Analyzer And Collector 2024-11-21 N/A 4.8 MEDIUM
Stack-based buffer overflow for some Intel(R) Trace Analyzer and Collector software before version 2021.8.0 published Dec 2022 may allow an authenticated user to potentially escalation of privilege via local access.