Total
10481 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-50992 | 1 Tenda | 2 I29, I29 Firmware | 2023-12-22 | N/A | 9.8 CRITICAL |
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a stack overflow via the ip parameter in the setPing function. | |||||
CVE-2023-50990 | 1 Tenda | 2 I29, I29 Firmware | 2023-12-22 | N/A | 9.8 CRITICAL |
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the rebootTime parameter in the sysScheduleRebootSet function. | |||||
CVE-2023-50988 | 1 Tenda | 2 I29, I29 Firmware | 2023-12-22 | N/A | 9.8 CRITICAL |
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the bandwidth parameter in the wifiRadioSetIndoor function. | |||||
CVE-2023-50987 | 1 Tenda | 2 I29, I29 Firmware | 2023-12-22 | N/A | 9.8 CRITICAL |
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the time parameter in the sysTimeInfoSet function. | |||||
CVE-2023-50986 | 1 Tenda | 2 I29, I29 Firmware | 2023-12-22 | N/A | 9.8 CRITICAL |
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the time parameter in the sysLogin function. | |||||
CVE-2023-50985 | 1 Tenda | 2 I29, I29 Firmware | 2023-12-22 | N/A | 9.8 CRITICAL |
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the lanGw parameter in the lanCfgSet function. | |||||
CVE-2023-50984 | 1 Tenda | 2 I29, I29 Firmware | 2023-12-22 | N/A | 9.8 CRITICAL |
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the ip parameter in the spdtstConfigAndStart function. | |||||
CVE-2023-3725 | 1 Zephyrproject | 1 Zephyr | 2023-12-22 | N/A | 9.8 CRITICAL |
Potential buffer overflow vulnerability in the Zephyr CAN bus subsystem | |||||
CVE-2023-3430 | 2 Openimageio, Redhat | 2 Openimageio, Linux | 2023-12-22 | N/A | 7.5 HIGH |
A vulnerability was found in OpenImageIO, where a heap buffer overflow exists in the src/gif.imageio/gifinput.cpp file. This flaw allows a remote attacker to pass a specially crafted file to the application, which triggers a heap-based buffer overflow and could cause a crash, leading to a denial of service. | |||||
CVE-2023-4751 | 2 Apple, Vim | 2 Macos, Vim | 2023-12-22 | N/A | 7.8 HIGH |
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1331. | |||||
CVE-2023-4735 | 2 Apple, Vim | 2 Macos, Vim | 2023-12-22 | N/A | 7.8 HIGH |
Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1847. | |||||
CVE-2006-2362 | 1 Gnu | 1 Binutils | 2023-12-22 | 7.5 HIGH | N/A |
Buffer overflow in getsym in tekhex.c in libbfd in Free Software Foundation GNU Binutils before 20060423, as used by GNU strings, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a file with a crafted Tektronix Hex Format (TekHex) record in which the length character is not a valid hexadecimal character. | |||||
CVE-2004-1287 | 1 Nasm | 1 Netwide Assembler | 2023-12-22 | 10.0 HIGH | N/A |
Buffer overflow in the error function in preproc.c for NASM 0.98.38 1.2 allows attackers to execute arbitrary code via a crafted asm file, a different vulnerability than CVE-2005-1194. | |||||
CVE-2022-44370 | 1 Nasm | 1 Netwide Assembler | 2023-12-22 | N/A | 7.8 HIGH |
NASM v2.16 was discovered to contain a heap buffer overflow in the component quote_for_pmake() asm/nasm.c:856 | |||||
CVE-2023-44398 | 1 Exiv2 | 1 Exiv2 | 2023-12-22 | N/A | 8.8 HIGH |
Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds write was found in Exiv2 version v0.28.0. The vulnerable function, `BmffImage::brotliUncompress`, is new in v0.28.0, so earlier versions of Exiv2 are _not_ affected. The out-of-bounds write is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. This bug is fixed in version v0.28.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | |||||
CVE-2021-3634 | 6 Debian, Fedoraproject, Libssh and 3 more | 7 Debian Linux, Fedora, Libssh and 4 more | 2023-12-22 | 4.0 MEDIUM | 6.5 MEDIUM |
A flaw has been found in libssh in versions prior to 0.9.6. The SSH protocol keeps track of two shared secrets during the lifetime of the session. One of them is called secret_hash and the other session_id. Initially, both of them are the same, but after key re-exchange, previous session_id is kept and used as an input to new secret_hash. Historically, both of these buffers had shared length variable, which worked as long as these buffers were same. But the key re-exchange operation can also change the key exchange method, which can be based on hash of different size, eventually creating "secret_hash" of different size than the session_id has. This becomes an issue when the session_id memory is zeroed or when it is used again during second key re-exchange. | |||||
CVE-2021-29464 | 2 Exiv2, Fedoraproject | 2 Exiv2, Fedora | 2023-12-22 | 6.8 MEDIUM | 7.8 HIGH |
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. | |||||
CVE-2020-18773 | 1 Exiv2 | 1 Exiv2 | 2023-12-22 | 4.3 MEDIUM | 6.5 MEDIUM |
An invalid memory access in the decode function in iptc.cpp of Exiv2 0.27.99.0 allows attackers to cause a denial of service (DOS) via a crafted tif file. | |||||
CVE-2023-33221 | 1 Idemia | 16 Morphowave Compact, Morphowave Compact Firmware, Morphowave Sp and 13 more | 2023-12-21 | N/A | 9.8 CRITICAL |
When reading DesFire keys, the function that reads the card isn't properly checking the boundaries when copying internally the data received. This allows a heap based buffer overflow that could lead to a potential Remote Code Execution on the targeted device. This is especially problematic if you use Default DESFire key. | |||||
CVE-2023-33220 | 1 Idemia | 16 Morphowave Compact, Morphowave Compact Firmware, Morphowave Sp and 13 more | 2023-12-21 | N/A | 9.8 CRITICAL |
During the retrofit validation process, the firmware doesn't properly check the boundaries while copying some attributes to check. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the targeted device |