Vulnerabilities (CVE)

Filtered by CWE-125
Total 7428 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-35635 1 Microsoft 2 Windows 11 22h2, Windows 11 23h2 2024-11-21 N/A 5.5 MEDIUM
Windows Kernel Denial of Service Vulnerability
CVE-2023-35629 1 Microsoft 3 Windows 10 1507, Windows Server 2008, Windows Server 2012 2024-11-21 N/A 6.8 MEDIUM
Microsoft USBHUB 3.0 Device Driver Remote Code Execution Vulnerability
CVE-2023-35319 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-11-21 N/A 6.5 MEDIUM
Remote Procedure Call Runtime Denial of Service Vulnerability
CVE-2023-35318 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-11-21 N/A 6.5 MEDIUM
Remote Procedure Call Runtime Denial of Service Vulnerability
CVE-2023-35316 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-11-21 N/A 6.5 MEDIUM
Remote Procedure Call Runtime Information Disclosure Vulnerability
CVE-2023-35314 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-11-21 N/A 6.5 MEDIUM
Remote Procedure Call Runtime Denial of Service Vulnerability
CVE-2023-35299 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-11-21 N/A 7.8 HIGH
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2023-35296 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-11-21 N/A 6.5 MEDIUM
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-34359 1 Asus 2 Rt-ax88u, Rt-ax88u Firmware 2024-11-21 N/A 7.5 HIGH
ASUS RT-AX88U's httpd is subject to an unauthenticated DoS condition. A remote attacker can send a specially crafted request to the device which causes the httpd binary to crash within the "do_json_decode()" function of ej.c, resulting in a DoS condition.
CVE-2023-34358 1 Asus 2 Rt-ax88u, Rt-ax88u Firmware 2024-11-21 N/A 7.5 HIGH
ASUS RT-AX88U's httpd is subject to an unauthenticated DoS condition. A remote attacker can send a specially crafted request to a device which contains a specific user agent, causing the httpd binary to crash during a string comparison performed within web.c, resulting in a DoS condition.
CVE-2023-34101 1 Contiki-ng 1 Contiki-ng 2024-11-21 N/A 7.3 HIGH
Contiki-NG is an operating system for internet of things devices. In version 4.8 and prior, when processing ICMP DAO packets in the `dao_input_storing` function, the Contiki-NG OS does not verify that the packet buffer is big enough to contain the bytes it needs before accessing them. Up to 16 bytes can be read out of bounds in the `dao_input_storing` function. An attacker can truncate an ICMP packet so that it does not contain enough data, leading to an out-of-bounds read on these lines. The problem has been patched in the "develop" branch of Contiki-NG, and is expected to be included in release 4.9. As a workaround, one can apply the changes in Contiki-NG pull request #2435 to patch the system.
CVE-2023-34100 1 Contiki-ng 1 Contiki-ng 2024-11-21 N/A 7.3 HIGH
Contiki-NG is an open-source, cross-platform operating system for IoT devices. When reading the TCP MSS option value from an incoming packet, the Contiki-NG OS does not verify that certain buffer indices to read from are within the bounds of the IPv6 packet buffer, uip_buf. In particular, there is a 2-byte buffer read in the module os/net/ipv6/uip6.c. The buffer is indexed using 'UIP_IPTCPH_LEN + 2 + c' and 'UIP_IPTCPH_LEN + 3 + c', but the uip_buf buffer may not have enough data, resulting in a 2-byte read out of bounds. The problem has been patched in the "develop" branch of Contiki-NG, and is expected to be included in release 4.9. Users are advised to watch for the 4.9 release and to upgrade when it becomes available. There are no workarounds for this vulnerability aside from manually patching with the diff in commit `cde4e9839`.
CVE-2023-34044 2 Apple, Vmware 3 Mac Os X, Fusion, Workstation 2024-11-21 N/A 7.1 HIGH
VMware Workstation( 17.x prior to 17.5) and Fusion(13.x prior to 13.5) contain an out-of-bounds read vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine. A malicious actor with local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.
CVE-2023-33904 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2024-11-21 N/A 4.4 MEDIUM
In hci_server, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed.
CVE-2023-33383 1 Shelly 2 Pro 4pm, Pro 4pm Firmware 2024-11-21 N/A 5.3 MEDIUM
Shelly 4PM Pro four-channel smart switch 0.11.0 allows an attacker to trigger a BLE out of bounds read fault condition that results in a device reload.
CVE-2023-33285 1 Qt 1 Qt 2024-11-21 N/A 5.3 MEDIUM
An issue was discovered in Qt 5.x before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. QDnsLookup has a buffer over-read via a crafted reply from a DNS server.
CVE-2023-33164 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-11-21 N/A 6.5 MEDIUM
Remote Procedure Call Runtime Denial of Service Vulnerability
CVE-2023-33162 1 Microsoft 3 365 Apps, Office, Office Online Server 2024-11-21 N/A 5.5 MEDIUM
Microsoft Excel Information Disclosure Vulnerability
CVE-2023-33139 1 Microsoft 4 Visual Studio, Visual Studio 2017, Visual Studio 2019 and 1 more 2024-11-21 N/A 5.5 MEDIUM
Visual Studio Information Disclosure Vulnerability
CVE-2023-33123 1 Siemens 2 Jt2go, Teamcenter Visualization 2024-11-21 N/A 7.8 HIGH
A vulnerability has been identified in JT2Go (All versions < V14.2.0.3), Teamcenter Visualization V13.2 (All versions < V13.2.0.13), Teamcenter Visualization V13.3 (All versions < V13.3.0.10), Teamcenter Visualization V14.0 (All versions < V14.0.0.6), Teamcenter Visualization V14.1 (All versions < V14.1.0.8), Teamcenter Visualization V14.2 (All versions < V14.2.0.3). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted CGM files. This could allow an attacker to execute code in the context of the current process.