Vulnerabilities (CVE)

Filtered by CWE-787
Total 12422 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-37710 1 Tenda 4 Ac10, Ac10 Firmware, Ac1206 and 1 more 2024-11-21 N/A 9.8 CRITICAL
Tenda AC1206 V15.03.06.23 and AC10 V15.03.06.47 were discovered to contain a stack overflow in the wpapsk_crypto parameter in the fromSetWirelessRepeat function.
CVE-2023-37707 1 Tenda 2 Fh1203, Fh1203 Firmware 2024-11-21 N/A 9.8 CRITICAL
Tenda FH1203 V2.0.1.6 was discovered to contain a stack overflow via the page parameter in the fromVirtualSer function.
CVE-2023-37706 1 Tenda 2 Fh1203, Fh1203 Firmware 2024-11-21 N/A 9.8 CRITICAL
Tenda FH1203 V2.0.1.6 was discovered to contain a stack overflow via the entrys parameter in the fromAddressNat function.
CVE-2023-37705 1 Tenda 2 Fh1203, Fh1203 Firmware 2024-11-21 N/A 9.8 CRITICAL
Tenda FH1203 V2.0.1.6 was discovered to contain a stack overflow via the page parameter in the fromAddressNat function.
CVE-2023-37704 1 Tenda 2 Fh1203, Fh1203 Firmware 2024-11-21 N/A 9.8 CRITICAL
Tenda FH1203 V2.0.1.6 was discovered to contain a stack overflow via the deviceId parameter in the formSetClientState function.
CVE-2023-37703 1 Tenda 2 Fh1203, Fh1203 Firmware 2024-11-21 N/A 9.8 CRITICAL
Tenda FH1203 V2.0.1.6 was discovered to contain a stack overflow via the speed_dir parameter in the formSetSpeedWan function.
CVE-2023-37702 1 Tenda 2 Fh1203, Fh1203 Firmware 2024-11-21 N/A 9.8 CRITICAL
Tenda FH1203 V2.0.1.6 was discovered to contain a stack overflow via the deviceId parameter in the formSetDeviceName function.
CVE-2023-37701 1 Tenda 2 Fh1203, Fh1203 Firmware 2024-11-21 N/A 9.8 CRITICAL
Tenda FH1203 V2.0.1.6 was discovered to contain a stack overflow via the deviceId parameter in the addWifiMacFilter function.
CVE-2023-37700 1 Tenda 2 Fh1203, Fh1203 Firmware 2024-11-21 N/A 9.8 CRITICAL
Tenda FH1203 V2.0.1.6 was discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function.
CVE-2023-37557 1 Codesys 16 Control For Beaglebone Sl, Control For Empc-a\/imx6 Sl, Control For Iot2000 Sl and 13 more 2024-11-21 N/A 6.5 MEDIUM
After successful authentication as a user in multiple Codesys products in multiple versions, specific crafted remote communication requests can cause the CmpAppBP component to overwrite a heap-based buffer, which can lead to a denial-of-service condition.
CVE-2023-37420 1 Tonybybell 1 Gtkwave 2024-11-21 N/A 7.8 HIGH
Multiple out-of-bounds write vulnerabilities exist in the VCD parse_valuechange portdump functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the vcd2lxt conversion utility.
CVE-2023-37419 1 Tonybybell 1 Gtkwave 2024-11-21 N/A 7.8 HIGH
Multiple out-of-bounds write vulnerabilities exist in the VCD parse_valuechange portdump functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the vcd2lxt2 conversion utility.
CVE-2023-37418 1 Tonybybell 1 Gtkwave 2024-11-21 N/A 7.8 HIGH
Multiple out-of-bounds write vulnerabilities exist in the VCD parse_valuechange portdump functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the vcd2vzt conversion utility.
CVE-2023-37417 1 Tonybybell 1 Gtkwave 2024-11-21 N/A 7.8 HIGH
Multiple out-of-bounds write vulnerabilities exist in the VCD parse_valuechange portdump functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the GUI's interactive VCD parsing code.
CVE-2023-37416 1 Tonybybell 1 Gtkwave 2024-11-21 N/A 7.8 HIGH
Multiple out-of-bounds write vulnerabilities exist in the VCD parse_valuechange portdump functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the GUI's legacy VCD parsing code.
CVE-2023-37375 1 Siemens 1 Tecnomatix 2024-11-21 N/A 7.8 HIGH
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0002). The affected application is vulnerable to stack-based buffer overflow while parsing specially crafted SPP files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21060)
CVE-2023-37374 1 Siemens 1 Tecnomatix 2024-11-21 N/A 7.8 HIGH
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0002). The affected application is vulnerable to stack-based buffer overflow while parsing specially crafted STP files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21054)
CVE-2023-37297 1 Ami 1 Megarac Sp-x 2024-11-21 N/A 8.3 HIGH
AMI’s SPx contains a vulnerability in the BMC where an Attacker may cause a heap memory corruption via an adjacent network. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.
CVE-2023-37296 1 Ami 1 Megarac Sp-x 2024-11-21 N/A 8.3 HIGH
AMI’s SPx contains a vulnerability in the BMC where an Attacker may cause a stack memory corruption via an adjacent network. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.
CVE-2023-37295 1 Ami 1 Megarac Sp-x 2024-11-21 N/A 8.3 HIGH
AMI’s SPx contains a vulnerability in the BMC where an Attacker may cause a heap memory corruption via an adjacent network. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.