Export limit exceeded: 21868 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Search
Search Results (21868 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2023-33308 | 1 Fortinet | 2 Fortios, Fortiproxy | 2024-11-21 | 9.8 Critical |
| A stack-based overflow vulnerability [CWE-124] in Fortinet FortiOS version 7.0.0 through 7.0.10 and 7.2.0 through 7.2.3 and FortiProxy version 7.0.0 through 7.0.9 and 7.2.0 through 7.2.2 allows a remote unauthenticated attacker to execute arbitrary code or command via crafted packets reaching proxy policies or firewall policies with proxy mode alongside deep or full packet inspection. | ||||
| CVE-2023-33222 | 1 Idemia | 16 Morphowave Compact, Morphowave Compact Firmware, Morphowave Sp and 13 more | 2024-11-21 | 6.8 Medium |
| When handling contactless cards, usage of a specific function to get additional information from the card which doesn't check the boundary on the data received while reading. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the targeted device | ||||
| CVE-2023-33221 | 1 Idemia | 16 Morphowave Compact, Morphowave Compact Firmware, Morphowave Sp and 13 more | 2024-11-21 | 6.8 Medium |
| When reading DesFire keys, the function that reads the card isn't properly checking the boundaries when copying internally the data received. This allows a heap based buffer overflow that could lead to a potential Remote Code Execution on the targeted device. This is especially problematic if you use Default DESFire key. | ||||
| CVE-2023-33220 | 1 Idemia | 16 Morphowave Compact, Morphowave Compact Firmware, Morphowave Sp and 13 more | 2024-11-21 | 6.5 Medium |
| During the retrofit validation process, the firmware doesn't properly check the boundaries while copying some attributes to check. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the targeted device | ||||
| CVE-2023-33219 | 1 Idemia | 16 Morphowave Compact, Morphowave Compact Firmware, Morphowave Sp and 13 more | 2024-11-21 | 6.5 Medium |
| The handler of the retrofit validation command doesn't properly check the boundaries when performing certain validation operations. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the targeted device | ||||
| CVE-2023-33218 | 1 Idemia | 16 Morphowave Compact, Morphowave Compact Firmware, Morphowave Sp and 13 more | 2024-11-21 | 6.5 Medium |
| The Parameter Zone Read and Parameter Zone Write command handlers allow performing a Stack buffer overflow. This could potentially lead to a Remote Code execution on the targeted device. | ||||
| CVE-2023-33097 | 1 Qualcomm | 244 Ar8035, Ar8035 Firmware, Csr8811 and 241 more | 2024-11-21 | 7.5 High |
| Transient DOS in WLAN Firmware while processing a FTMR frame. | ||||
| CVE-2023-33081 | 1 Qualcomm | 298 Aqt1000, Aqt1000 Firmware, Ar8035 and 295 more | 2024-11-21 | 7.5 High |
| Transient DOS while converting TWT (Target Wake Time) frame parameters in the OTA broadcast. | ||||
| CVE-2023-33061 | 1 Qualcomm | 230 Ar8035, Ar8035 Firmware, Csr8811 and 227 more | 2024-11-21 | 7.5 High |
| Transient DOS in WLAN Firmware while parsing WLAN beacon or probe-response frame. | ||||
| CVE-2023-33060 | 1 Qualcomm | 94 Ar8035, Ar8035 Firmware, Fastconnect 6700 and 91 more | 2024-11-21 | 7.1 High |
| Transient DOS in Core when DDR memory check is called while DDR is not initialized. | ||||
| CVE-2023-33058 | 1 Qualcomm | 94 Ar8035, Ar8035 Firmware, Fastconnect 6700 and 91 more | 2024-11-21 | 8.2 High |
| Information disclosure in Modem while processing SIB5. | ||||
| CVE-2023-33048 | 1 Qualcomm | 232 Ar8035, Ar8035 Firmware, Csr8811 and 229 more | 2024-11-21 | 7.5 High |
| Transient DOS in WLAN Firmware while parsing t2lm buffers. | ||||
| CVE-2023-33045 | 1 Qualcomm | 265 Ar8035, Ar8035 Firmware, Csr8811 and 262 more | 2024-11-21 | 9.8 Critical |
| Memory corruption in WLAN Firmware while parsing a NAN management frame carrying a S3 attribute. | ||||
| CVE-2023-33016 | 1 Qualcomm | 132 Csr8811, Csr8811 Firmware, Fastconnect 6900 and 129 more | 2024-11-21 | 7.5 High |
| Transient DOS in WLAN firmware while parsing MLO (multi-link operation). | ||||
| CVE-2023-33015 | 1 Qualcomm | 388 315 5g, 315 5g Firmware, Aqt1000 and 385 more | 2024-11-21 | 7.5 High |
| Transient DOS in WLAN Firmware while interpreting MBSSID IE of a received beacon frame. | ||||
| CVE-2023-32973 | 1 Qnap | 3 Qts, Quts Hero, Qutscloud | 2024-11-21 | 3.8 Low |
| A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2425 build 20230609 and later QTS 5.1.0.2444 build 20230629 and later QTS 4.5.4.2467 build 20230718 and later QuTS hero h5.0.1.2515 build 20230907 and later QuTS hero h5.1.0.2424 build 20230609 and later QuTS hero h4.5.4.2476 build 20230728 and later QuTScloud c5.1.0.2498 and later | ||||
| CVE-2023-32972 | 1 Qnap | 3 Qts, Quts Hero, Qutscloud | 2024-11-21 | 3.8 Low |
| A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2425 build 20230609 and later QTS 5.1.0.2444 build 20230629 and later QTS 4.5.4.2467 build 20230718 and later QuTS hero h5.0.1.2515 build 20230907 and later QuTS hero h5.1.0.2424 build 20230609 and later QuTS hero h4.5.4.2476 build 20230728 and later QuTScloud c5.1.0.2498 and later | ||||
| CVE-2023-32971 | 1 Qnap | 3 Qts, Quts Hero, Qutscloud | 2024-11-21 | 3.8 Low |
| A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2425 build 20230609 and later QTS 5.1.0.2444 build 20230629 and later QTS 4.5.4.2467 build 20230718 and later QuTS hero h5.0.1.2515 build 20230907 and later QuTS hero h5.1.0.2424 build 20230609 and later QuTS hero h4.5.4.2476 build 20230728 and later QuTScloud c5.1.0.2498 and later | ||||
| CVE-2023-32968 | 1 Qnap | 2 Qts, Quts Hero | 2024-11-21 | 4.5 Medium |
| A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2514 build 20230906 and later QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.0.1.2515 build 20230907 and later QuTS hero h5.1.2.2534 build 20230927 and later | ||||
| CVE-2023-32870 | 2 Google, Mediatek | 29 Android, Mt6761, Mt6765 and 26 more | 2024-11-21 | 6.7 Medium |
| In display drm, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363740; Issue ID: ALPS07363740. | ||||