Total
2592 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-22422 | 1 F5 | 12 Big-ip Access Policy Manager, Big-ip Advanced Firewall Manager, Big-ip Analytics and 9 more | 2024-11-21 | N/A | 7.5 HIGH |
On BIG-IP versions 17.0.x before 17.0.0.2 and 16.1.x before 16.1.3.3, when a HTTP profile with the non-default Enforcement options of Enforce HTTP Compliance and Unknown Methods: Reject are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | |||||
CVE-2023-22416 | 1 Juniper | 46 Junos, Mx10, Mx10000 and 43 more | 2024-11-21 | N/A | 7.5 HIGH |
A Buffer Overflow vulnerability in SIP ALG of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). On all MX Series and SRX Series platform with SIP ALG enabled, when a malformed SIP packet is received, the flow processing daemon (flowd) will crash and restart. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3-S1; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R1-S2, 22.1R2; 22.2 versions prior to 22.2R1-S1, 22.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1 on SRX Series. | |||||
CVE-2023-22399 | 1 Juniper | 1 Junos | 2024-11-21 | N/A | 7.5 HIGH |
When sFlow is enabled and it monitors a packet forwarded via ECMP, a buffer management vulnerability in the dcpfe process of Juniper Networks Junos OS on QFX10K Series systems allows an attacker to cause the Packet Forwarding Engine (PFE) to crash and restart by sending specific genuine packets to the device, resulting in a Denial of Service (DoS) condition. The dcpfe process tries to copy more data into a smaller buffer, which overflows and corrupts the buffer, causing a crash of the dcpfe process. Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS on QFX10K Series: All versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R2-S2, 21.4R3; 22.1 versions prior to 22.1R2; 22.2 versions prior to 22.2R1-S2, 22.2R2. | |||||
CVE-2023-22386 | 1 Qualcomm | 402 215, 215 Firmware, Ar8035 and 399 more | 2024-11-21 | N/A | 7.8 HIGH |
Memory Corruption in WLAN HOST while processing WLAN FW request to allocate memory. | |||||
CVE-2023-22384 | 1 Qualcomm | 18 Qca6574au, Qca6574au Firmware, Qca6696 and 15 more | 2024-11-21 | N/A | 6.7 MEDIUM |
Memory Corruption in VR Service while sending data using Fast Message Queue (FMQ). | |||||
CVE-2023-21664 | 1 Qualcomm | 274 Aqt1000, Aqt1000 Firmware, Ar8035 and 271 more | 2024-11-21 | N/A | 7.8 HIGH |
Memory Corruption in Core Platform while printing the response buffer in log. | |||||
CVE-2023-21662 | 1 Qualcomm | 272 Aqt1000, Aqt1000 Firmware, Ar8035 and 269 more | 2024-11-21 | N/A | 7.8 HIGH |
Memory corruption in Core Platform while printing the response buffer in log. | |||||
CVE-2023-21649 | 1 Qualcomm | 130 Apq8096au, Apq8096au Firmware, Aqt1000 and 127 more | 2024-11-21 | N/A | 6.7 MEDIUM |
Memory corruption in WLAN while running doDriverCmd for an unspecific command. | |||||
CVE-2023-21640 | 1 Qualcomm | 12 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 9 more | 2024-11-21 | N/A | 6.7 MEDIUM |
Memory corruption in Linux when the file upload API is called with parameters having large buffer. | |||||
CVE-2023-21639 | 1 Qualcomm | 44 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 41 more | 2024-11-21 | N/A | 6.7 MEDIUM |
Memory corruption in Audio while processing sva_model_serializer using memory size passed by HIDL client. | |||||
CVE-2023-21635 | 1 Qualcomm | 98 Aqt1000, Aqt1000 Firmware, Csrb31024 and 95 more | 2024-11-21 | N/A | 6.7 MEDIUM |
Memory Corruption in Data Network Stack & Connectivity when sim gets detected on telephony. | |||||
CVE-2023-21504 | 1 Samsung | 1 Android | 2024-11-21 | N/A | 5.6 MEDIUM |
Potential buffer overflow vulnerability in mm_Plmncoordination.c in Shannon baseband prior to SMR May-2023 Release 1 allows remote attackers to cause invalid memory access. | |||||
CVE-2023-21503 | 1 Samsung | 2 Android, Exynos | 2024-11-21 | N/A | 5.6 MEDIUM |
Potential buffer overflow vulnerability in mm_LteInterRatManagement.c in Shannon baseband prior to SMR May-2023 Release 1 allows remote attackers to cause invalid memory access. | |||||
CVE-2023-21494 | 1 Samsung | 2 Android, Exynos | 2024-11-21 | N/A | 5.6 MEDIUM |
Potential buffer overflow vulnerability in auth api in mm_Authentication.c in Shannon baseband prior to SMR May-2023 Release 1 allows remote attackers to cause invalid memory access. | |||||
CVE-2023-21406 | 1 Axis | 2 A1001, A1001 Firmware | 2024-11-21 | N/A | 7.1 HIGH |
Ariel Harush and Roy Hodir from OTORIO have found a flaw in the AXIS A1001 when communicating over OSDP. A heap-based buffer overflow was found in the pacsiod process which is handling the OSDP communication allowing to write outside of the allocated buffer. By appending invalid data to an OSDP message it was possible to write data beyond the heap allocated buffer. The data written outside the buffer could be used to execute arbitrary code. lease refer to the Axis security advisory for more information, mitigation and affected products and software versions. | |||||
CVE-2023-21243 | 1 Google | 1 Android | 2024-11-21 | N/A | 5.5 MEDIUM |
In validateForCommonR1andR2 of PasspointConfiguration.java, there is a possible way to inflate the size of a config file with no limits due to a buffer overflow. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation. | |||||
CVE-2023-20624 | 2 Google, Mediatek | 16 Android, Mt6789, Mt6833 and 13 more | 2024-11-21 | N/A | 6.7 MEDIUM |
In vow, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628530; Issue ID: ALPS07628530. | |||||
CVE-2023-20189 | 1 Cisco | 458 Business 250-16p-2g, Business 250-16p-2g Firmware, Business 250-16t-2g and 455 more | 2024-11-21 | N/A | 8.6 HIGH |
Multiple vulnerabilities in the web-based user interface of certain Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with root privileges on an affected device. These vulnerabilities are due to improper validation of requests that are sent to the web interface. For more information about these vulnerabilities, see the Details section of this advisory. | |||||
CVE-2023-20162 | 1 Cisco | 458 Business 250-16p-2g, Business 250-16p-2g Firmware, Business 250-16t-2g and 455 more | 2024-11-21 | N/A | 8.6 HIGH |
Multiple vulnerabilities in the web-based user interface of certain Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with root privileges on an affected device. These vulnerabilities are due to improper validation of requests that are sent to the web interface. For more information about these vulnerabilities, see the Details section of this advisory. | |||||
CVE-2023-20161 | 1 Cisco | 458 Business 250-16p-2g, Business 250-16p-2g Firmware, Business 250-16t-2g and 455 more | 2024-11-21 | N/A | 8.6 HIGH |
Multiple vulnerabilities in the web-based user interface of certain Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with root privileges on an affected device. These vulnerabilities are due to improper validation of requests that are sent to the web interface. For more information about these vulnerabilities, see the Details section of this advisory. |