Total
7966 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-24349 | 2 D-link, Dlink | 2 Dir-605l, Dir-605l Firmware | 2023-02-17 | N/A | 9.8 CRITICAL |
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSetRoute. | |||||
CVE-2023-24348 | 2 D-link, Dlink | 2 Dir-605l, Dir-605l Firmware | 2023-02-17 | N/A | 9.8 CRITICAL |
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSetACLFilter. | |||||
CVE-2023-21451 | 1 Samsung | 1 Android | 2023-02-17 | N/A | 7.8 HIGH |
A Stack-based overflow vulnerability in IpcRxEmbmsSessionList in SECRIL prior to Android S(12) allows attacker to cause memory corruptions. | |||||
CVE-2022-34454 | 1 Dell | 1 Emc Powerscale Onefs | 2023-02-17 | N/A | 6.7 MEDIUM |
Dell PowerScale OneFS, versions 8.2.x-9.3.x, contain a heap-based buffer overflow. A local privileged malicious user could potentially exploit this vulnerability, leading to system takeover. This impacts compliance mode clusters. | |||||
CVE-2023-24344 | 2 D-link, Dlink | 2 Dir-605l, Dir-605l Firmware | 2023-02-17 | N/A | 8.8 HIGH |
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the webpage parameter at /goform/formWlanGuestSetup. | |||||
CVE-2018-3912 | 1 Samsung | 2 Sth-eth-250, Sth-eth-250 Firmware | 2023-02-16 | 6.9 MEDIUM | 7.8 HIGH |
On Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17, the video-core process insecurely extracts the fields from the "shard" table of its SQLite database, leading to a buffer overflow on the stack. The strcpy call overflows the destination buffer, which has a size of 128 bytes. An attacker can send an arbitrarily long "secretKey" value in order to exploit this vulnerability. | |||||
CVE-2023-24347 | 2 D-link, Dlink | 2 Dir-605l, Dir-605l Firmware | 2023-02-16 | N/A | 8.8 HIGH |
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the webpage parameter at /goform/formSetWanDhcpplus. | |||||
CVE-2023-24346 | 2 D-link, Dlink | 2 Dir-605l, Dir-605l Firmware | 2023-02-16 | N/A | 8.8 HIGH |
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the wan_connected parameter at /goform/formEasySetupWizard3. | |||||
CVE-2023-24345 | 2 D-link, Dlink | 2 Dir-605l, Dir-605l Firmware | 2023-02-16 | N/A | 8.8 HIGH |
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSetWanDhcpplus. | |||||
CVE-2023-24343 | 2 D-link, Dlink | 2 Dir-605l, Dir-605l Firmware | 2023-02-16 | N/A | 8.8 HIGH |
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSchedule. | |||||
CVE-2019-13221 | 2 Debian, Stb Vorbis Project | 2 Debian Linux, Stb Vorbis | 2023-02-16 | 6.8 MEDIUM | 7.8 HIGH |
A stack buffer overflow in the compute_codewords function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service or execute arbitrary code by opening a crafted Ogg Vorbis file. | |||||
CVE-2023-0701 | 1 Google | 1 Chrome | 2023-02-16 | N/A | 8.8 HIGH |
Heap buffer overflow in WebUI in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interaction . (Chromium security severity: Medium) | |||||
CVE-2023-0249 | 1 Deltaww | 1 Diascreen | 2023-02-16 | N/A | 7.8 HIGH |
Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to out-of-bounds write, which may allow an attacker to remotely execute arbitrary code. | |||||
CVE-2023-0760 | 1 Gpac | 1 Gpac | 2023-02-16 | N/A | 7.8 HIGH |
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV. | |||||
CVE-2019-13323 | 2 Foxitsoftware, Microsoft | 2 Foxit Studio Photo, Windows | 2023-02-15 | 6.8 MEDIUM | 7.8 HIGH |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.909. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of TIF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-8783. | |||||
CVE-2021-36410 | 2 Debian, Struktur | 2 Debian Linux, Libde265 | 2023-02-15 | 4.3 MEDIUM | 5.5 MEDIUM |
A stack-buffer-overflow exists in libde265 v1.0.8 via fallback-motion.cc in function put_epel_hv_fallback when running program dec265. | |||||
CVE-2020-21599 | 2 Debian, Struktur | 2 Debian Linux, Libde265 | 2023-02-15 | 4.3 MEDIUM | 6.5 MEDIUM |
libde265 v1.0.4 contains a heap buffer overflow in the de265_image::available_zscan function, which can be exploited via a crafted a file. | |||||
CVE-2019-16096 | 1 Kilo Project | 1 Kilo | 2023-02-15 | 5.0 MEDIUM | 7.5 HIGH |
Kilo 0.0.1 has a heap-based buffer overflow because there is an integer overflow in a calculation involving the number of tabs in one row. | |||||
CVE-2022-39260 | 4 Apple, Debian, Fedoraproject and 1 more | 4 Xcode, Debian Linux, Fedora and 1 more | 2023-02-15 | N/A | 8.8 HIGH |
Git is an open source, scalable, distributed revision control system. `git shell` is a restricted login shell that can be used to implement Git's push/pull functionality via SSH. In versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4, the function that splits the command arguments into an array improperly uses an `int` to represent the number of entries in the array, allowing a malicious actor to intentionally overflow the return value, leading to arbitrary heap writes. Because the resulting array is then passed to `execv()`, it is possible to leverage this attack to gain remote code execution on a victim machine. Note that a victim must first allow access to `git shell` as a login shell in order to be vulnerable to this attack. This problem is patched in versions 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 and users are advised to upgrade to the latest version. Disabling `git shell` access via remote logins is a viable short-term workaround. | |||||
CVE-2021-31578 | 1 Mediatek | 4 En7528, En7528 Firmware, En7580 and 1 more | 2023-02-15 | N/A | 9.8 CRITICAL |
In Boa, there is a possible escalation of privilege due to a stack buffer overflow. This could lead to remote escalation of privilege from a proximal attacker with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: A20210008; Issue ID: OSBNB00123241. |