Total
6546 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2023-21155 | 1 Google | 1 Android | 2023-06-30 | N/A | 5.5 MEDIUM |
| In BuildSetRadioNode of protocolmiscbuilder.cpp, there is a possible out of bounds read due to a missing null check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-264540700References: N/A | |||||
| CVE-2023-21154 | 1 Google | 1 Android | 2023-06-30 | N/A | 4.4 MEDIUM |
| In StoreAdbSerialNumber of protocolmiscbuilder.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-263783910References: N/A | |||||
| CVE-2023-21170 | 1 Google | 1 Android | 2023-06-30 | N/A | 4.4 MEDIUM |
| In executeSetClientTarget of ComposerCommandEngine.h, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-252764410 | |||||
| CVE-2023-21169 | 1 Google | 1 Android | 2023-06-30 | N/A | 4.4 MEDIUM |
| In inviteInternal of p2p_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-274443441 | |||||
| CVE-2023-36356 | 1 Tp-link | 8 Tl-wr740n, Tl-wr740n Firmware, Tl-wr841n and 5 more | 2023-06-30 | N/A | 7.7 HIGH |
| TP-Link TL-WR940N V2/V4/V6, TL-WR841N V8, TL-WR941ND V5, and TL-WR740N V1/V2 were discovered to contain a buffer read out-of-bounds via the component /userRpm/VirtualServerRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request. | |||||
| CVE-2023-21153 | 1 Google | 1 Android | 2023-06-30 | N/A | 6.7 MEDIUM |
| In Do_AIMS_SET_CALL_WAITING of imsservice.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-264259730References: N/A | |||||
| CVE-2023-21148 | 1 Google | 1 Android | 2023-06-30 | N/A | 4.4 MEDIUM |
| In BuildSetConfig of protocolimsbuilder.cpp, there is a possible out of bounds read due to a missing null check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-263783657References: N/A | |||||
| CVE-2023-21150 | 1 Google | 1 Android | 2023-06-30 | N/A | 4.4 MEDIUM |
| In handle_set_parameters_ctrl of hal_socket.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-267312009References: N/A | |||||
| CVE-2023-21152 | 1 Google | 1 Android | 2023-06-30 | N/A | 5.5 MEDIUM |
| In FaceStatsAnalyzer::InterpolateWeightList of face_stats_analyzer.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-269174022References: N/A | |||||
| CVE-2022-3178 | 1 Gpac | 1 Gpac | 2023-06-29 | N/A | 7.8 HIGH |
| Buffer Over-read in GitHub repository gpac/gpac prior to 2.1.0-DEV. | |||||
| CVE-2022-32141 | 1 Codesys | 2 Plcwinnt, Runtime Toolkit | 2023-06-29 | 4.0 MEDIUM | 6.5 MEDIUM |
| Multiple CODESYS Products are prone to a buffer over read. A low privileged remote attacker may craft a request with an invalid offset, which can cause an internal buffer over-read, resulting in a denial-of-service condition. User interaction is not required. | |||||
| CVE-2022-1714 | 1 Radare | 1 Radare2 | 2023-06-29 | 3.6 LOW | 7.1 HIGH |
| Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. | |||||
| CVE-2023-3040 | 1 Cloudflare | 1 Lua-resty-json | 2023-06-28 | N/A | 7.5 HIGH |
| A debug function in the lua-resty-json package, up to commit id 3ef9492bd3a44d9e51301d6adc3cd1789c8f534a (merged in PR #14) contained an out of bounds access bug that could have allowed an attacker to launch a DoS if the function was used to parse untrusted input data. It is important to note that because this debug function was only used in tests and demos, it was not exploitable in a normal environment. | |||||
| CVE-2023-20981 | 1 Google | 1 Android | 2023-06-28 | N/A | 4.4 MEDIUM |
| In btu_ble_rc_param_req_evt of btu_hcif.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-256165737 | |||||
| CVE-2023-20990 | 1 Google | 1 Android | 2023-06-28 | N/A | 4.4 MEDIUM |
| In btm_ble_rand_enc_complete of btm_ble.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260568354 | |||||
| CVE-2023-20984 | 1 Google | 1 Android | 2023-06-28 | N/A | 4.4 MEDIUM |
| In ParseBqrLinkQualityEvt of btif_bqr.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-242993878 | |||||
| CVE-2023-20991 | 1 Google | 1 Android | 2023-06-28 | N/A | 4.4 MEDIUM |
| In btm_ble_process_periodic_adv_sync_lost_evt of ble_scanner_hci_interface.cc , there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-255305114 | |||||
| CVE-2023-20982 | 1 Google | 1 Android | 2023-06-28 | N/A | 4.4 MEDIUM |
| In btm_read_tx_power_complete of btm_acl.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260568083 | |||||
| CVE-2023-20987 | 1 Google | 1 Android | 2023-06-28 | N/A | 4.5 MEDIUM |
| In btm_read_link_quality_complete of btm_acl.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure over Bluetooth with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260569414 | |||||
| CVE-2023-20980 | 1 Google | 1 Android | 2023-06-28 | N/A | 5.5 MEDIUM |
| In btu_ble_ll_conn_param_upd_evt of btu_hcif.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260230274 | |||||
