Search Results (19178 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2023-28572 1 Qualcomm 110 Csrb31024, Csrb31024 Firmware, Fastconnect 6800 and 107 more 2024-11-21 6.6 Medium
Memory corruption in WLAN HOST while processing the WLAN scan descriptor list.
CVE-2023-28561 1 Qualcomm 2 Qcn7606, Qcn7606 Firmware 2024-11-21 9.8 Critical
Memory corruption in QESL while processing payload from external ESL device to firmware.
CVE-2023-28558 1 Qualcomm 399 315 5g Iot Modem, 315 5g Iot Modem Firmware, Aqt1000 and 396 more 2024-11-21 7.8 High
Memory corruption in WLAN handler while processing PhyID in Tx status handler.
CVE-2023-28537 1 Qualcomm 366 315 5g Iot Modem, 315 5g Iot Modem Firmware, 8098 and 363 more 2024-11-21 8.4 High
Memory corruption while allocating memory in COmxApeDec module in Audio.
CVE-2023-28527 1 Ibm 2 Informix Dynamic Server, Informix Dynamic Server On Cloud Pak For Data 2024-11-21 6.2 Medium
IBM Informix Dynamic Server 12.10 and 14.10 cdr is vulnerable to a heap buffer overflow, caused by improper bounds checking which could allow a local user to cause a segmentation fault. IBM X-Force ID: 251206.
CVE-2023-28526 1 Ibm 2 Informix Dynamic Server, Informix Dynamic Server On Cloud Pak For Data 2024-11-21 6.2 Medium
IBM Informix Dynamic Server 12.10 and 14.10 archecker is vulnerable to a heap buffer overflow, caused by improper bounds checking which could allow a local user to cause a segmentation fault. IBM X-Force ID: 251204.
CVE-2023-28401 2 Intel, Microsoft 3 Arc A Graphics, Iris Xe Graphics, Windows 2024-11-21 5.2 Medium
Out-of-bounds write in some Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers before version 31.0.101.4255 may allow authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-28064 1 Dell 140 Alienware M15 R6, Alienware M15 R6 Firmware, Alienware M15 R7 and 137 more 2024-11-21 3.5 Low
Dell BIOS contains an Out-of-bounds Write vulnerability. An unauthenticated physical attacker may potentially exploit this vulnerability, leading to denial of service.
CVE-2023-28000 1 Fortinet 1 Fortiadc 2024-11-21 6.3 Medium
An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in FortiADC CLI 7.1.0, 7.0.0 through 7.0.3, 6.2.0 through 6.2.4, 6.1 all versions, 6.0 all versions may allow a local and authenticated attacker to execute unauthorized commands via specifically crafted arguments in diagnose system df CLI command.
CVE-2023-27999 1 Fortinet 1 Fortiadc 2024-11-21 7.6 High
An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in FortiADC 7.2.0, 7.1.0 through 7.1.1 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.
CVE-2023-27395 1 Softether 1 Vpn 2024-11-21 9 Critical
A heap-based buffer overflow vulnerability exists in the vpnserver WpcParsePacket() functionality of SoftEther VPN 4.41-9782-beta, 5.01.9674 and 5.02. A specially crafted network packet can lead to arbitrary code execution. An attacker can perform a man-in-the-middle attack to trigger this vulnerability.
CVE-2023-27390 1 Diagon Project 1 Diagon 2024-11-21 7.8 High
A heap-based buffer overflow vulnerability exists in the Sequence::DrawText functionality of Diagon v1.0.139. A specially crafted markdown file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.
CVE-2023-27380 1 Peplink 2 Surf Soho, Surf Soho Firmware 2024-11-21 7.2 High
An OS command injection vulnerability exists in the admin.cgi USSD_send functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVE-2023-27198 1 Paxtechnology 2 Pax A930, Pax A930 Firmware 2024-11-21 6.8 Medium
PAX A930 device with PayDroid_7.1.1_Virgo_V04.5.02_20220722 can allow the execution of arbitrary commands by using the exec service and including a specific word in the command to be executed. The attacker must have physical USB access to the device in order to exploit this vulnerability.
CVE-2023-27103 1 Struktur 1 Libde265 2024-11-21 8.8 High
Libde265 v1.0.11 was discovered to contain a heap buffer overflow via the function derive_collocated_motion_vectors at motion.cc.
CVE-2023-26317 1 Mi 1 Xiaomi Router Firmware 2024-11-21 7 High
Xiaomi routers have an external interface that can lead to command injection. The vulnerability is caused by lax filtering of responses from external interfaces. Attackers can exploit this vulnerability to gain access to the router by hijacking the ISP or upper-layer routing.
CVE-2023-26156 1 Chromedriver Project 1 Chromedriver 2024-11-21 5.6 Medium
Versions of the package chromedriver before 119.0.1 are vulnerable to Command Injection when setting the chromedriver.path to an arbitrary system binary. This could lead to unauthorized access and potentially malicious actions on the host system. **Note:** An attacker must have access to the system running the vulnerable chromedriver library to exploit it. The success of exploitation also depends on the permissions and privileges of the process running chromedriver.
CVE-2023-26155 1 Nrhirani 1 Node-qpdf 2024-11-21 7.3 High
All versions of the package node-qpdf are vulnerable to Command Injection such that the package-exported method encrypt() fails to sanitize its parameter input, which later flows into a sensitive command execution API. As a result, attackers may inject malicious commands once they can specify the input pdf file path.
CVE-2023-26153 1 Geokit 1 Geokit-rails 2024-11-21 8.3 High
Versions of the package geokit-rails before 2.5.0 are vulnerable to Command Injection due to unsafe deserialisation of YAML within the 'geo_location' cookie. This issue can be exploited remotely via a malicious cookie value. **Note:** An attacker can use this vulnerability to execute commands on the host system.
CVE-2023-26145 1 Derrickgilland 1 Pydash 2024-11-21 7.4 High
This affects versions of the package pydash before 6.0.0. A number of pydash methods such as pydash.objects.invoke() and pydash.collections.invoke_map() accept dotted paths (Deep Path Strings) to target a nested Python object, relative to the original source object. These paths can be used to target internal class attributes and dict items, to retrieve, modify or invoke nested Python objects. **Note:** The pydash.objects.invoke() method is vulnerable to Command Injection when the following prerequisites are satisfied: 1) The source object (argument 1) is not a built-in object such as list/dict (otherwise, the __init__.__globals__ path is not accessible) 2) The attacker has control over argument 2 (the path string) and argument 3 (the argument to pass to the invoked method) The pydash.collections.invoke_map() method is also vulnerable, but is harder to exploit as the attacker does not have direct control over the argument to be passed to the invoked function.