Show filters
1,078 Total Results
Displaying 101-110 of 1,078
Sort by:
Attacker Value
Unknown

CVE-2023-20564

Disclosure Date: August 15, 2023 (last updated October 08, 2023)
Insufficient validation in the IOCTL (Input Output Control) input buffer in AMD Ryzen™ Master may permit a privileged attacker to perform memory reads/writes potentially leading to a loss of confidentiality or arbitrary kernel execution.
Attacker Value
Unknown

CVE-2023-20560

Disclosure Date: August 15, 2023 (last updated October 08, 2023)
Insufficient validation of the IOCTL (Input Output Control) input buffer in AMD Ryzen™ Master may allow a privileged attacker to provide a null value potentially resulting in a Windows crash leading to denial of service.
Attacker Value
Unknown

CVE-2023-39908

Disclosure Date: August 14, 2023 (last updated October 08, 2023)
The PKCS11 module of the YubiHSM 2 SDK through 2023.01 does not properly validate the length of specific read operations on object metadata. This may lead to disclosure of uninitialized and previously used memory.
Attacker Value
Unknown

CVE-2022-40609

Disclosure Date: August 02, 2023 (last updated October 08, 2023)
IBM SDK, Java Technology Edition 7.1.5.18 and 8.0.8.0 could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization flaw. By sending specially-crafted data, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 236069.
Attacker Value
Unknown

CVE-2023-37259

Disclosure Date: July 18, 2023 (last updated October 08, 2023)
matrix-react-sdk is a react-based SDK for inserting a Matrix chat/voip client into a web page. The Export Chat feature includes certain attacker-controlled elements in the generated document without sufficient escaping, leading to stored Cross site scripting (XSS). Since the Export Chat feature generates a separate document, an attacker can only inject code run from the `null` origin, restricting the impact. However, the attacker can still potentially use the XSS to leak message contents. A malicious homeserver is a potential attacker since the affected inputs are controllable server-side. This issue has been addressed in commit `22fcd34c60` which is included in release version 3.76.0. Users are advised to upgrade. The only known workaround for this issue is to disable or to not use the Export Chat feature.
Attacker Value
Unknown

CVE-2023-0972

Disclosure Date: June 21, 2023 (last updated October 08, 2023)
Description: A vulnerability in SiLabs Z/IP Gateway 7.18.01 and earlier allows an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution.
Attacker Value
Unknown

CVE-2023-0971

Disclosure Date: June 21, 2023 (last updated October 08, 2023)
A logic error in SiLabs Z/IP Gateway SDK 7.18.02 and earlier allows authentication to be bypassed, remote administration of Z-Wave controllers, and S0/S2 encryption keys to be recovered.
Attacker Value
Unknown

CVE-2023-0970

Disclosure Date: June 21, 2023 (last updated October 08, 2023)
Multiple buffer overflow vulnerabilities in SiLabs Z/IP Gateway SDK version 7.18.01 and earlier allow an attacker with invasive physical access to a Z-Wave controller device to overwrite global memory and potentially execute arbitrary code.
Attacker Value
Unknown

CVE-2023-0969

Disclosure Date: June 21, 2023 (last updated October 08, 2023)
A vulnerability in SiLabs Z/IP Gateway 7.18.01 and earlier allows an authenticated attacker within Z-Wave range to manipulate an array pointer to disclose the contents of global memory.
Attacker Value
Unknown

CVE-2023-34115

Disclosure Date: June 13, 2023 (last updated October 08, 2023)
Buffer copy without checking size of input in Zoom Meeting SDK before 5.13.0 may allow an authenticated user to potentially enable a denial of service via local access. This issue may result in the Zoom Meeting SDK to crash and need to be restarted.