Total
2602 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-46852 | 1 Memcached | 1 Memcached | 2023-11-07 | N/A | 7.5 HIGH |
In Memcached before 1.6.22, a buffer overflow exists when processing multiget requests in proxy mode, if there are many spaces after the "get" substring. | |||||
CVE-2018-17878 | 1 Abus | 94 Tvip 10000, Tvip 10000 Firmware, Tvip 10001 and 91 more | 2023-11-07 | N/A | 9.8 CRITICAL |
Buffer Overflow vulnerability in certain ABUS TVIP cameras allows attackers to gain control of the program via crafted string sent to sprintf() function. | |||||
CVE-2023-46587 | 1 Xnview | 1 Xnview | 2023-11-07 | N/A | 7.8 HIGH |
Buffer Overflow vulnerability in XnView Classic v.2.51.5 allows a local attacker to execute arbitrary code via a crafted TIF file. | |||||
CVE-2023-37758 | 1 Dlink | 2 Dir-815, Dir-815 Firmware | 2023-11-07 | N/A | 7.5 HIGH |
D-LINK DIR-815 v1.01 was discovered to contain a buffer overflow via the component /web/captcha.cgi. | |||||
CVE-2023-39742 | 1 Giflib Project | 1 Giflib | 2023-11-07 | N/A | 5.5 MEDIUM |
giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c. | |||||
CVE-2023-37734 | 1 Ezsoftmagic | 1 Mp3 Audio Converter | 2023-11-07 | N/A | 9.8 CRITICAL |
EZ softmagic MP3 Audio Converter 2.7.3.700 was discovered to contain a buffer overflow. | |||||
CVE-2023-39976 | 1 Clusterlabs | 1 Libqb | 2023-11-07 | N/A | 9.8 CRITICAL |
log_blackbox.c in libqb before 2.0.8 allows a buffer overflow via long log messages because the header size is not considered. | |||||
CVE-2023-36183 | 1 Openimageio | 1 Openimageio | 2023-11-07 | N/A | 7.8 HIGH |
Buffer Overflow vulnerability in OpenImageIO v.2.4.12.0 and before allows a remote to execute arbitrary code and obtain sensitive information via a crafted file to the readimg function. | |||||
CVE-2023-30383 | 1 Tp-link | 6 Archer C20, Archer C20 Firmware, Archer C2 V1 and 3 more | 2023-11-07 | N/A | 7.5 HIGH |
TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 were discovered to contain a buffer overflow which may lead to a Denial of Service (DoS) when parsing crafted data. | |||||
CVE-2023-28736 | 1 Mdadm Project | 1 Mdadm | 2023-11-07 | N/A | 6.7 MEDIUM |
Buffer overflow in some Intel(R) SSD Tools software before version mdadm-4.2-rc2 may allow a privileged user to potentially enable escalation of privilege via local access. | |||||
CVE-2023-25664 | 1 Google | 1 Tensorflow | 2023-11-07 | N/A | 9.8 CRITICAL |
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, there is a heap buffer overflow in TAvgPoolGrad. A fix is included in TensorFlow 2.12.0 and 2.11.1. | |||||
CVE-2023-26109 | 1 Node-bluetooth-serial-port Project | 1 Node-bluetooth-serial-port | 2023-11-07 | N/A | 9.8 CRITICAL |
All versions of the package node-bluetooth-serial-port are vulnerable to Buffer Overflow via the findSerialPortChannel method due to improper user input length validation. | |||||
CVE-2023-26110 | 1 Node-bluetooth Project | 1 Node-bluetooth | 2023-11-07 | N/A | 9.8 CRITICAL |
All versions of the package node-bluetooth are vulnerable to Buffer Overflow via the findSerialPortChannel method due to improper user input length validation. | |||||
CVE-2023-22754 | 1 Arubanetworks | 2 Arubaos, Sd-wan | 2023-11-07 | N/A | 9.8 CRITICAL |
There are buffer overflow vulnerabilities in multiple underlying operating system processes that could lead to unauthenticated remote code execution by sending specially crafted packets via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. | |||||
CVE-2023-22661 | 1 Intel | 20 Server System D50tnp1mhcpac, Server System D50tnp1mhcpac Firmware, Server System D50tnp1mhcrac and 17 more | 2023-11-07 | N/A | 7.8 HIGH |
Buffer overflow in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable escalation of privilege via local access. | |||||
CVE-2023-22755 | 1 Arubanetworks | 2 Arubaos, Sd-wan | 2023-11-07 | N/A | 9.8 CRITICAL |
There are buffer overflow vulnerabilities in multiple underlying operating system processes that could lead to unauthenticated remote code execution by sending specially crafted packets via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. | |||||
CVE-2023-22756 | 1 Arubanetworks | 2 Arubaos, Sd-wan | 2023-11-07 | N/A | 9.8 CRITICAL |
There are buffer overflow vulnerabilities in multiple underlying operating system processes that could lead to unauthenticated remote code execution by sending specially crafted packets via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. | |||||
CVE-2023-22757 | 1 Arubanetworks | 2 Arubaos, Sd-wan | 2023-11-07 | N/A | 9.8 CRITICAL |
There are buffer overflow vulnerabilities in multiple underlying operating system processes that could lead to unauthenticated remote code execution by sending specially crafted packets via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. | |||||
CVE-2023-20189 | 1 Cisco | 458 Business 250-16p-2g, Business 250-16p-2g Firmware, Business 250-16t-2g and 455 more | 2023-11-07 | N/A | 9.8 CRITICAL |
Multiple vulnerabilities in the web-based user interface of certain Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with root privileges on an affected device. These vulnerabilities are due to improper validation of requests that are sent to the web interface. For more information about these vulnerabilities, see the Details section of this advisory. | |||||
CVE-2023-20162 | 1 Cisco | 458 Business 250-16p-2g, Business 250-16p-2g Firmware, Business 250-16t-2g and 455 more | 2023-11-07 | N/A | 9.8 CRITICAL |
Multiple vulnerabilities in the web-based user interface of certain Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with root privileges on an affected device. These vulnerabilities are due to improper validation of requests that are sent to the web interface. For more information about these vulnerabilities, see the Details section of this advisory. |