Total
1412 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-5403 | 2024-04-17 | N/A | 8.1 HIGH | ||
Server hostname translation to IP address manipulation which could lead to an attacker performing remote code execution or causing a failure. See Honeywell Security Notification for recommendations on upgrading and versioning. | |||||
CVE-2024-23594 | 2024-04-15 | N/A | 6.4 MEDIUM | ||
A buffer overflow vulnerability was reported in a system recovery bootloader that was part of the Lenovo preloaded Windows 7 and 8 operating systems from 2012 to 2014 that could allow a privileged attacker with local access to execute arbitrary code. | |||||
CVE-2023-33028 | 1 Qualcomm | 352 Ar8035, Ar8035 Firmware, Ar9380 and 349 more | 2024-04-12 | N/A | 9.8 CRITICAL |
Memory corruption in WLAN Firmware while doing a memory copy of pmk cache. | |||||
CVE-2023-28538 | 1 Qualcomm | 260 Aqt1000, Aqt1000 Firmware, Csra6620 and 257 more | 2024-04-12 | N/A | 7.8 HIGH |
Memory corruption in WIN Product while invoking WinAcpi update driver in the UEFI region. | |||||
CVE-2023-24854 | 1 Qualcomm | 326 215, 215 Firmware, Ar8035 and 323 more | 2024-04-12 | N/A | 7.8 HIGH |
Memory Corruption in WLAN HOST while parsing QMI WLAN Firmware response message. | |||||
CVE-2023-21632 | 1 Qualcomm | 50 Apq8064au, Apq8064au Firmware, Msm8996au and 47 more | 2024-04-12 | N/A | 7.8 HIGH |
Memory corruption in Automotive GPU while querying a gsl memory node. | |||||
CVE-2022-33279 | 1 Qualcomm | 148 Ar9380, Ar9380 Firmware, Csr8811 and 145 more | 2024-04-12 | N/A | 9.8 CRITICAL |
Memory corruption due to stack based buffer overflow in WLAN having invalid WNM frame length. | |||||
CVE-2022-33264 | 1 Qualcomm | 484 315 5g Iot Modem, 315 5g Iot Modem Firmware, 8953pro and 481 more | 2024-04-12 | N/A | 7.8 HIGH |
Memory corruption in modem due to stack based buffer overflow while parsing OTASP Key Generation Request Message. | |||||
CVE-2022-33260 | 1 Qualcomm | 92 Aqt1000, Aqt1000 Firmware, Qam8295p and 89 more | 2024-04-12 | N/A | 7.8 HIGH |
Memory corruption due to stack based buffer overflow in core while sending command from USB of large size. | |||||
CVE-2022-33213 | 1 Qualcomm | 418 Apq8009, Apq8009 Firmware, Apq8009w and 415 more | 2024-04-12 | N/A | 8.8 HIGH |
Memory corruption in modem due to buffer overflow while processing a PPP packet | |||||
CVE-2023-43520 | 1 Qualcomm | 140 Ar8035, Ar8035 Firmware, Fastconnect 6900 and 137 more | 2024-04-12 | N/A | 9.8 CRITICAL |
Memory corruption when AP includes TID to link mapping IE in the beacons and STA is parsing the beacon TID to link mapping IE. | |||||
CVE-2023-43549 | 2024-04-12 | N/A | 8.4 HIGH | ||
Memory corruption while processing TPC target power table in FTM TPC. | |||||
CVE-2024-30273 | 2024-04-12 | N/A | 7.8 HIGH | ||
Illustrator versions 28.3, 27.9.2 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | |||||
CVE-2024-20772 | 2024-04-10 | N/A | 7.8 HIGH | ||
Media Encoder versions 24.2.1, 23.6.4 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | |||||
CVE-2023-49911 | 2024-04-10 | N/A | 7.2 HIGH | ||
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `band` parameter at offset `0x422420` of the `httpd` binary shipped with v5.0.4 Build 20220216 of the EAP115. | |||||
CVE-2023-49906 | 2024-04-10 | N/A | 7.2 HIGH | ||
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `ssid` parameter at offset `0x0045ab7c` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225. | |||||
CVE-2023-48724 | 2024-04-10 | N/A | 7.5 HIGH | ||
A memory corruption vulnerability exists in the web interface functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted HTTP POST request can lead to denial of service of the device's web interface. An attacker can send an unauthenticated HTTP POST request to trigger this vulnerability. | |||||
CVE-2023-49909 | 2024-04-10 | N/A | 7.2 HIGH | ||
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `action` parameter at offset `0x0045ab38` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225. | |||||
CVE-2023-49912 | 2024-04-10 | N/A | 7.2 HIGH | ||
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `profile` parameter at offset `0x4224b0` of the `httpd` binary shipped with v5.0.4 Build 20220216 of the EAP115. | |||||
CVE-2023-49908 | 2024-04-10 | N/A | 7.2 HIGH | ||
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `profile` parameter at offset `0x0045abc8` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225. |