Show filters
1,609 Total Results
Displaying 451-460 of 1,609
Sort by:
Attacker Value
Unknown

CVE-2023-30431

Disclosure Date: July 10, 2023 (last updated February 25, 2025)
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 db2set is vulnerable to a buffer overflow, caused by improper bounds checking. An attacker could overflow the buffer and execute arbitrary code. IBM X-Force ID: 252184.
Attacker Value
Unknown

CVE-2023-31194

Disclosure Date: July 05, 2023 (last updated February 25, 2025)
An improper array index validation vulnerability exists in the GraphPlanar::Write functionality of Diagon v1.0.139. A specially crafted markdown file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability.
Attacker Value
Unknown

CVE-2023-21637

Disclosure Date: July 04, 2023 (last updated February 25, 2025)
Memory corruption in Linux while calling system configuration APIs.
Attacker Value
Unknown

CVE-2023-21633

Disclosure Date: July 04, 2023 (last updated February 25, 2025)
Memory Corruption in Linux while processing QcRilRequestImsRegisterMultiIdentityMessage request.
Attacker Value
Unknown

CVE-2023-3138

Disclosure Date: June 28, 2023 (last updated February 25, 2025)
A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.
Attacker Value
Unknown

CVE-2023-21167

Disclosure Date: June 28, 2023 (last updated February 25, 2025)
In setProfileName of DevicePolicyManagerService.java, there is a possible way to crash the SystemUI menu due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-259942964
Attacker Value
Unknown

CVE-2023-3110

Disclosure Date: June 21, 2023 (last updated February 25, 2025)
Description: A vulnerability in SiLabs Unify Gateway 1.3.1 and earlier allows an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution.
Attacker Value
Unknown

CVE-2023-0972

Disclosure Date: June 21, 2023 (last updated February 25, 2025)
Description: A vulnerability in SiLabs Z/IP Gateway 7.18.01 and earlier allows an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution.
Attacker Value
Unknown

CVE-2023-0969

Disclosure Date: June 21, 2023 (last updated February 25, 2025)
A vulnerability in SiLabs Z/IP Gateway 7.18.01 and earlier allows an authenticated attacker within Z-Wave range to manipulate an array pointer to disclose the contents of global memory.
Attacker Value
Unknown

CVE-2023-32270

Disclosure Date: June 19, 2023 (last updated February 25, 2025)
Access of memory location after end of buffer issue exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted V8 file may lead to information disclosure and/or arbitrary code execution.