Total
3774 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-47217 | 1 Openatom | 1 Openharmony | 2024-11-21 | 4 Medium |
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through buffer overflow. | ||||
CVE-2023-46960 | 2024-11-21 | 8.6 High | ||
Buffer Overflow vulnerability in PyPXE v.1.8.4 allows a remote attacker to cause a denial of service via the handle function in the tftp module. | ||||
CVE-2023-46852 | 1 Memcached | 1 Memcached | 2024-11-21 | 7.5 High |
In Memcached before 1.6.22, a buffer overflow exists when processing multiget requests in proxy mode, if there are many spaces after the "get" substring. | ||||
CVE-2023-46587 | 1 Xnview | 1 Xnview | 2024-11-21 | 7.8 High |
Buffer Overflow vulnerability in XnView Classic v.2.51.5 allows a local attacker to execute arbitrary code via a crafted TIF file. | ||||
CVE-2023-46566 | 1 Msoulier | 1 Tftpy | 2024-11-21 | 7.5 High |
Buffer Overflow vulnerability in msoulier tftpy commit 467017b844bf6e31745138a30e2509145b0c529c allows a remote attacker to cause a denial of service via the parse function in the TftpPacketFactory class. | ||||
CVE-2023-46363 | 1 Jbig2enc Project | 1 Jbig2enc | 2024-11-21 | 5.5 Medium |
jbig2enc v0.28 was discovered to contain a SEGV via jbig2_add_page in src/jbig2enc.cc:512. | ||||
CVE-2023-46256 | 1 Dronecode | 1 Px4 Drone Autopilot | 2024-11-21 | 4.4 Medium |
PX4-Autopilot provides PX4 flight control solution for drones. In versions 1.14.0-rc1 and prior, PX4-Autopilot has a heap buffer overflow vulnerability in the parser function due to the absence of `parserbuf_index` value checking. A malfunction of the sensor device can cause a heap buffer overflow with leading unexpected drone behavior. Malicious applications can exploit the vulnerability even if device sensor malfunction does not occur. Up to the maximum value of an `unsigned int`, bytes sized data can be written to the heap memory area. As of time of publication, no fixed version is available. | ||||
CVE-2023-46001 | 1 Gpac | 1 Gpac | 2024-11-21 | 5.5 Medium |
Buffer Overflow vulnerability in gpac MP4Box v.2.3-DEV-rev573-g201320819-master allows a local attacker to cause a denial of service via the gpac/src/isomedia/isom_read.c:2807:51 function in gf_isom_get_user_data. | ||||
CVE-2023-45797 | 1 Dreamsecurity | 1 Magicline 4.0 | 2024-11-21 | 9.8 Critical |
A Buffer overflow vulnerability in DreamSecurity MagicLine4NX versions 1.0.0.1 to 1.0.0.26 allows an attacker to remotely execute code. | ||||
CVE-2023-45616 | 2 Arubanetworks, Hp | 2 Arubaos, Instantos | 2024-11-21 | 9.8 Critical |
There is a buffer overflow vulnerability in the underlying AirWave client service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system. | ||||
CVE-2023-45615 | 2 Arubanetworks, Hp | 2 Arubaos, Instantos | 2024-11-21 | 9.8 Critical |
There are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. | ||||
CVE-2023-45614 | 2 Arubanetworks, Hp | 2 Arubaos, Instantos | 2024-11-21 | 9.8 Critical |
There are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. | ||||
CVE-2023-45468 | 1 Netis-systems | 2 N3m, N3m Firmware | 2024-11-21 | 7.5 High |
Netis N3Mv2-V1.0.1.865 was discovered to contain a buffer overflow via the pingWdogIp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | ||||
CVE-2023-45464 | 1 Netis-systems | 2 N3m, N3m Firmware | 2024-11-21 | 7.5 High |
Netis N3Mv2-V1.0.1.865 was discovered to contain a buffer overflow via the servDomain parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | ||||
CVE-2023-45463 | 1 Netis-systems | 2 N3m, N3m Firmware | 2024-11-21 | 7.5 High |
Netis N3Mv2-V1.0.1.865 was discovered to contain a buffer overflow via the hostName parameter in the FUN_0040dabc function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | ||||
CVE-2023-45199 | 2 Arm, Mbed | 2 Mbed Tls, Mbedtls | 2024-11-21 | 9.8 Critical |
Mbed TLS 3.2.x through 3.4.x before 3.5 has a Buffer Overflow that can lead to remote Code execution. | ||||
CVE-2023-45041 | 1 Qnap | 2 Qts, Quts Hero | 2024-11-21 | 3.8 Low |
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later | ||||
CVE-2023-45039 | 1 Qnap | 2 Qts, Quts Hero | 2024-11-21 | 3.8 Low |
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later | ||||
CVE-2023-44839 | 1 Dlink | 2 Dir-823g, Dir-823g Firmware | 2024-11-21 | 7.5 High |
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Encryption parameter in the SetWLanRadioSecurity function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | ||||
CVE-2023-44838 | 2 D-link, Dlink | 3 Dir-823g-firmware, Dir-823g, Dir-823g Firmware | 2024-11-21 | 7.5 High |
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the TXPower parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. |