Total
13431 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-44022 | 2 Tenda, Tendacn | 3 Ac10u, Ac10u, Ac10u Firmware | 2024-11-21 | 9.8 Critical |
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the speed_dir parameter in the formSetSpeedWan function. | ||||
CVE-2023-44021 | 2 Tenda, Tendacn | 3 Ac10u, Ac10u, Ac10u Firmware | 2024-11-21 | 9.8 Critical |
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the formSetClientState function. | ||||
CVE-2023-44020 | 2 Tenda, Tendacn | 3 Ac10u, Ac10u, Ac10u Firmware | 2024-11-21 | 9.8 Critical |
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the security parameter in the formWifiBasicSet function. | ||||
CVE-2023-44019 | 2 Tenda, Tendacn | 3 Ac10u Firmware, Ac10u, Ac10u Firmware | 2024-11-21 | 8.8 High |
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the mac parameter in the GetParentControlInfo function. | ||||
CVE-2023-44018 | 2 Tenda, Tendacn | 3 Ac10u Firmware, Ac10u, Ac10u Firmware | 2024-11-21 | 8.8 High |
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the domain parameter in the add_white_node function. | ||||
CVE-2023-44017 | 2 Tenda, Tendacn | 3 Ac10u Firmware, Ac10u, Ac10u Firmware | 2024-11-21 | 8.8 High |
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the timeZone parameter in the fromSetSysTime function. | ||||
CVE-2023-44016 | 2 Tenda, Tendacn | 3 Ac10u Firmware, Ac10u, Ac10u Firmware | 2024-11-21 | 8.8 High |
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the deviceId parameter in the addWifiMacFilter function. | ||||
CVE-2023-44015 | 2 Tenda, Tendacn | 3 Ac10u Firmware, Ac10u, Ac10u Firmware | 2024-11-21 | 8.8 High |
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the schedEndTime parameter in the setSchedWifi function. | ||||
CVE-2023-44014 | 2 Tenda, Tendacn | 3 Ac10u Firmware, Ac10u, Ac10u Firmware | 2024-11-21 | 8.8 High |
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain multiple stack overflows in the formSetMacFilterCfg function via the macFilterType and deviceList parameters. | ||||
CVE-2023-44013 | 2 Tenda, Tendacn | 3 Ac10u Firmware, Ac10u, Ac10u Firmware | 2024-11-21 | 8.8 High |
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the list parameter in the fromSetIpMacBind function. | ||||
CVE-2023-43824 | 1 Deltaww | 1 Dopsoft | 2024-11-21 | 8.8 High |
A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when parsing the wTitleTextLen field of a DPS file. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution. | ||||
CVE-2023-43821 | 1 Deltaww | 1 Dopsoft | 2024-11-21 | 8.8 High |
A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when parsing the wLogTitlesActionLen field of a DPS file. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution. | ||||
CVE-2023-43820 | 1 Deltaww | 1 Dopsoft | 2024-11-21 | 8.8 High |
A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when parsing the wLogTitlesPrevValueLen field of a DPS file. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution. | ||||
CVE-2023-43816 | 1 Deltaww | 1 Dopsoft | 2024-11-21 | 6.3 Medium |
A buffer overflow vulnerability exists in Delta Electronics Delta Industrial Automation DOPSoft version 2 when parsing the wKPFStringLen field of a DPS file. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve code execution. | ||||
CVE-2023-43554 | 1 Qualcomm | 84 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 81 more | 2024-11-21 | 8.4 High |
Memory corruption while processing IOCTL handler in FastRPC. | ||||
CVE-2023-43534 | 1 Qualcomm | 132 Ar8035, Ar8035 Firmware, Fastconnect 6900 and 129 more | 2024-11-21 | 8.6 High |
Memory corruption while validating the TID to Link Mapping action request frame, when a station connects to an access point. | ||||
CVE-2023-43361 | 2 Redhat, Xiph | 2 Enterprise Linux, Vorbis-tools | 2024-11-21 | 7.8 High |
Buffer Overflow vulnerability in Vorbis-tools v.1.4.2 allows a local attacker to execute arbitrary code and cause a denial of service during the conversion of wav files to ogg files. | ||||
CVE-2023-42506 | 1 Jtekt | 1 Onsinview2 | 2024-11-21 | 7.8 High |
Improper restriction of operations within the bounds of a memory buffer issue exists in OnSinView2 versions 2.0.1 and earlier. If this vulnerability is exploited, information may be disclosed or arbitrary code may be executed by having a user open a specially crafted OnSinView2 project file. | ||||
CVE-2023-42116 | 1 Exim | 1 Exim | 2024-11-21 | 8.1 High |
Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NTLM challenge requests. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. . Was ZDI-CAN-17515. | ||||
CVE-2023-42037 | 1 Kofax | 1 Power Pdf | 2024-11-21 | N/A |
Kofax Power PDF PDF File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21583. |