Vulnerabilities (CVE)

Filtered by CWE-120
Total 3795 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-28559 1 Qualcomm 426 Aqt1000, Aqt1000 Firmware, Ar8031 and 423 more 2024-11-21 N/A 7.8 HIGH
Memory corruption in WLAN FW while processing command parameters from untrusted WMI payload.
CVE-2023-28544 1 Qualcomm 412 Aqt1000, Aqt1000 Firmware, Ar9380 and 409 more 2024-11-21 N/A 7.8 HIGH
Memory corruption in WLAN while sending transmit command from HLOS to UTF handlers.
CVE-2023-28116 1 Contiki-ng 1 Contiki-ng 2024-11-21 N/A 8.1 HIGH
Contiki-NG is an open-source, cross-platform operating system for internet of things (IoT) devices. In versions 4.8 and prior, an out-of-bounds write can occur in the BLE L2CAP module of the Contiki-NG operating system. The network stack of Contiki-NG uses a global buffer (packetbuf) for processing of packets, with the size of PACKETBUF_SIZE. In particular, when using the BLE L2CAP module with the default configuration, the PACKETBUF_SIZE value becomes larger then the actual size of the packetbuf. When large packets are processed by the L2CAP module, a buffer overflow can therefore occur when copying the packet data to the packetbuf. The vulnerability has been patched in the "develop" branch of Contiki-NG, and will be included in release 4.9. The problem can be worked around by applying the patch manually.
CVE-2023-27989 1 Zyxel 8 Lte7480-m804, Lte7480-m804 Firmware, Lte7490-m904 and 5 more 2024-11-21 N/A 6.5 MEDIUM
A buffer overflow vulnerability in the CGI program of the Zyxel NR7101 firmware versions prior to V1.00(ABUV.8)C0 could allow a remote authenticated attacker to cause denial of service (DoS) conditions by sending a crafted HTTP request to a vulnerable device.
CVE-2023-27590 1 Rizin 1 Rizin 2024-11-21 N/A 7.8 HIGH
Rizin is a UNIX-like reverse engineering framework and command-line toolset. In version 0.5.1 and prior, converting a GDB registers profile file into a Rizin register profile can result in a stack-based buffer overflow when the `name`, `type`, or `groups` fields have longer values than expected. Users opening untrusted GDB registers files (e.g. with the `drpg` or `arpg` commands) are affected by this flaw. Commit d6196703d89c84467b600ba2692534579dc25ed4 contains a patch for this issue. As a workaround, review the GDB register profiles before loading them with `drpg`/`arpg` commands.
CVE-2023-26930 1 Xpdfreader 1 Xpdf 2024-11-21 N/A 5.5 MEDIUM
Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via the PDFDoc malloc in the pdftotext.cc function. NOTE: Vendor states “it's an expected abort on out-of-memory error.”
CVE-2023-26924 1 Llvm 1 Llvm 2024-11-21 N/A 5.5 MEDIUM
LLVM a0dab4950 has a segmentation fault in mlir::outlineSingleBlockRegion. NOTE: third parties dispute this because the LLVM security policy excludes "Language front-ends ... for which a malicious input file can cause undesirable behavior."
CVE-2023-26769 1 Liblouis 1 Liblouis 2024-11-21 N/A 7.5 HIGH
Buffer Overflow vulnerability found in Liblouis Lou_Trace v.3.24.0 allows a remote attacker to cause a denial of service via the resolveSubtable function at compileTranslationTabel.c.
CVE-2023-26767 1 Liblouis 1 Liblouis 2024-11-21 N/A 7.5 HIGH
Buffer Overflow vulnerability found in Liblouis v.3.24.0 allows a remote attacker to cause a denial of service via the lou_logFile function at logginc.c endpoint.
CVE-2023-26616 1 Dlink 2 Dir-823g, Dir-823g Firmware 2024-11-21 N/A 9.8 CRITICAL
D-Link DIR-823G firmware version 1.02B05 has a buffer overflow vulnerability, which originates from the URL field in SetParentsControlInfo.
CVE-2023-26612 1 Dlink 2 Dir-823g, Dir-823g Firmware 2024-11-21 N/A 9.8 CRITICAL
D-Link DIR-823G firmware version 1.02B05 has a buffer overflow vulnerability, which originates from the HostName field in SetParentsControlInfo.
CVE-2023-26320 1 Mi 2 Xiaomi Router Ax3200, Xiaomi Router Ax3200 Firmware 2024-11-21 N/A 7.5 HIGH
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Xiaomi Xiaomi Router allows Command Injection.
CVE-2023-26319 1 Mi 2 Xiaomi Router Ax3200, Xiaomi Router Ax3200 Firmware 2024-11-21 N/A 6.7 MEDIUM
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Xiaomi Xiaomi Router allows Command Injection.
CVE-2023-26318 1 Mi 2 Xiaomi Router Ax3200, Xiaomi Router Ax3200 Firmware 2024-11-21 N/A 6.7 MEDIUM
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Xiaomi Xiaomi Router allows Overflow Buffers.
CVE-2023-26110 1 Node-bluetooth Project 1 Node-bluetooth 2024-11-21 N/A 7.3 HIGH
All versions of the package node-bluetooth are vulnerable to Buffer Overflow via the findSerialPortChannel method due to improper user input length validation.
CVE-2023-26109 1 Node-bluetooth-serial-port Project 1 Node-bluetooth-serial-port 2024-11-21 N/A 7.3 HIGH
All versions of the package node-bluetooth-serial-port are vulnerable to Buffer Overflow via the findSerialPortChannel method due to improper user input length validation.
CVE-2023-25664 1 Google 1 Tensorflow 2024-11-21 N/A 7.5 HIGH
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, there is a heap buffer overflow in TAvgPoolGrad. A fix is included in TensorFlow 2.12.0 and 2.11.1.
CVE-2023-25642 1 Zte 4 Mc801a, Mc801a1, Mc801a1 Firmware and 1 more 2024-11-21 N/A 5.9 MEDIUM
There is a buffer overflow vulnerability in some ZTE mobile internet producsts. Due to insufficient validation of tcp port parameter, an authenticated attacker could use the vulnerability to perform a denial of service attack. 
CVE-2023-25505 1 Nvidia 2 Bmc, Dgx-1 2024-11-21 N/A 7.8 HIGH
NVIDIA DGX-1 BMC contains a vulnerability in the IPMI handler of the AMI MegaRAC BMC , where an attacker with the appropriate level of authorization can cause a buffer overflow, which may lead to denial of service, information disclosure, or arbitrary code execution.
CVE-2023-25076 1 Sniproxy Project 1 Sniproxy 2024-11-21 N/A 9.8 CRITICAL
A buffer overflow vulnerability exists in the handling of wildcard backend hosts of SNIProxy 0.6.0-2 and the master branch (commit: 822bb80df9b7b345cc9eba55df74a07b498819ba). A specially crafted HTTP or TLS packet can lead to arbitrary code execution. An attacker could send a malicious packet to trigger this vulnerability.