Export limit exceeded: 44107 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (44107 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2023-43540 1 Qualcomm 58 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 55 more 2025-01-10 8.4 High
Memory corruption while processing the IOCTL FM HCI WRITE request.
CVE-2023-43539 1 Qualcomm 274 Ar8035, Ar8035 Firmware, Csr8811 and 271 more 2025-01-10 7.5 High
Transient DOS while processing an improperly formatted 802.11az Fine Time Measurement protocol frame.
CVE-2023-33105 1 Qualcomm 298 Ar8035, Ar8035 Firmware, Ar9380 and 295 more 2025-01-10 7.5 High
Transient DOS in WLAN Host and Firmware when large number of open authentication frames are sent with an invalid transaction sequence number.
CVE-2023-33090 1 Qualcomm 104 Ar8035, Ar8035 Firmware, Fastconnect 6800 and 101 more 2025-01-10 5.5 Medium
Transient DOS while processing channel information for speaker protection v2 module in ADSP.
CVE-2023-33078 1 Qualcomm 26 Fastconnect 6700, Fastconnect 6700 Firmware, Fastconnect 6900 and 23 more 2025-01-10 5.1 Medium
Information Disclosure while processing IOCTL request in FastRPC.
CVE-2023-28582 1 Qualcomm 86 Ar8035, Ar8035 Firmware, Fastconnect 6700 and 83 more 2025-01-10 9.8 Critical
Memory corruption in Data Modem while verifying hello-verify message during the DTLS handshake.
CVE-2024-23366 1 Qualcomm 34 Qam8255p, Qam8255p Firmware, Qam8295p and 31 more 2025-01-10 6.6 Medium
Information Disclosure while invoking the mailbox write API when message received from user is larger than mailbox size.
CVE-2021-45039 1 Uniview 1 Camera Firmware 2025-01-10 9.8 Critical
Multiple models of the Uniview IP Camera (e.g., IPC_G6103 B6103.16.10.B25.201218, IPC_G61, IPC21, IPC23, IPC32, IPC36, IPC62, and IPC_HCMN) offer an undocumented UDP service on port 7788 that allows a remote unauthenticated attacker to overflow an internal buffer and achieve code execution. By using this buffer overflow, a remote attacker can start the telnetd service. This service has a hardcoded default username and password (root/123456). Although it has a restrictive shell, this can be easily bypassed via the built-in ECHO shell command.
CVE-2023-24817 1 Riot-os 1 Riot 2025-01-10 7.5 High
RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2023.04, an attacker can send a crafted frame to the device resulting in an integer underflow and out of bounds access in the packet buffer. Triggering the access at the right time will corrupt other packets or the allocator metadata. Corrupting a pointer will lead to denial of service. This issue is fixed in version 2023.04. As a workaround, disable SRH in the network stack.
CVE-2023-33975 1 Riot-os 1 Riot 2025-01-10 9.8 Critical
RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. In version 2023.01 and prior, an attacker can send a crafted frame to the device resulting in an out of bounds write in the packet buffer. The overflow can be used to corrupt other packets and the allocator metadata. Corrupting a pointer will easily lead to denial of service. While carefully manipulating the allocator metadata gives an attacker the possibility to write data to arbitrary locations and thus execute arbitrary code. This issue is fixed in pull request 19680. As a workaround, disable support for fragmented IP datagrams.
CVE-2024-33061 1 Qualcomm 18 Qcs8550, Qcs8550 Firmware, Sw5100 and 15 more 2025-01-10 6.8 Medium
Information disclosure while processing IOCTL call made for releasing a trusted VM process release or opening a channel without initializing the process.
CVE-2024-43063 1 Qualcomm 34 Qam8255p, Qam8255p Firmware, Qam8295p and 31 more 2025-01-10 6.1 Medium
information disclosure while invoking the mailbox read API.
CVE-2024-34698 1 Freescout 1 Freescout 2025-01-10 4.6 Medium
FreeScout is a free, self-hosted help desk and shared mailbox. Versions of FreeScout prior to 1.8.139 contain a Prototype Pollution vulnerability in the `/public/js/main.js` source file. The Prototype Pollution arises because the `getQueryParam` Function recursively merges an object containing user-controllable properties into an existing object (For URL Query Parameters Parsing), without first sanitizing the keys. This can allow an attacker to inject a property with a key `__proto__`, along with arbitrarily nested properties. The merge operation assigns the nested properties to the `params` object's prototype instead of the target object itself. As a result, the attacker can pollute the prototype with properties containing harmful values, which are then inherited by user-defined objects and subsequently used by the application dangerously. The vulnerability lets an attacker control properties of objects that would otherwise be inaccessible. If the application subsequently handles an attacker-controlled property in an unsafe way, this can potentially be chained with other vulnerabilities like DOM-based XSS, Open Redirection, Cookie Manipulation, Link Manipulation, HTML Injection, etc. Version 1.8.139 contains a patch for the issue.
CVE-2024-1892 1 Scrapy 1 Scrapy 2025-01-10 6.5 Medium
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the XMLFeedSpider class of the scrapy/scrapy project, specifically in the parsing of XML content. By crafting malicious XML content that exploits inefficient regular expression complexity used in the parsing process, an attacker can cause a denial-of-service (DoS) condition. This vulnerability allows for the system to hang and consume significant resources, potentially rendering services that utilize Scrapy for XML processing unresponsive.
CVE-2024-10006 1 Hashicorp 1 Consul 2025-01-10 8.3 High
A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that using Headers in L7 traffic intentions could bypass HTTP header based access rules.
CVE-2024-23363 1 Qualcomm 250 Ar8035, Ar8035 Firmware, Csr8811 and 247 more 2025-01-09 7.5 High
Transient DOS while processing an improperly formatted Fine Time Measurement (FTM) management frame.
CVE-2023-1711 1 Hitachienergy 2 Foxman-un, Unem 2025-01-09 4 Medium
A vulnerability exists in a FOXMAN-UN and UNEM logging component, it only affects systems that use remote authentication to the network elements. If exploited an attacker could obtain confidential information. List of CPEs: * cpe:2.3:a:hitachienergy:foxman_un:R9C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R10C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R11A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R11B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R14A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R14B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R15A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R15B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R16A:*:*:*:*:*:*:* * * cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R10C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R11A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R11B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R14A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R14B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R15A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R15B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R16A:*:*:*:*:*:*:*
CVE-2017-11076 1 Qualcomm 54 Msm8909w, Msm8909w Firmware, Msm8996au and 51 more 2025-01-09 8.8 High
On some hardware revisions where VP9 decoding is hardware-accelerated, the frame size is not programmed correctly into the decoder hardware which can lead to an invalid memory access by the decoder.
CVE-2017-17772 1 Qualcomm 14 Sd 450, Sd 450 Firmware, Sd 625 and 11 more 2025-01-09 8.8 High
In multiple functions that process 802.11 frames, out-of-bounds reads can occur due to insufficient validation.
CVE-2018-11922 1 Qualcomm 44 215, 215 Firmware, Mdm9206 and 41 more 2025-01-09 7.5 High
Wrong configuration in Touch Pal application can collect user behavior data without awareness by the user.