Show filters
1,078 Total Results
Displaying 101-110 of 1,078
Sort by:
Attacker Value
Unknown
CVE-2023-20564
Disclosure Date: August 15, 2023 (last updated October 08, 2023)
Insufficient validation in the IOCTL (Input Output Control) input buffer in AMD Ryzen™ Master may permit a privileged attacker to perform memory reads/writes potentially leading to a loss of confidentiality or arbitrary kernel execution.
0
Attacker Value
Unknown
CVE-2023-20560
Disclosure Date: August 15, 2023 (last updated October 08, 2023)
Insufficient validation of the IOCTL (Input Output Control) input buffer in AMD Ryzen™ Master may allow a privileged attacker to provide a null value potentially resulting in a Windows crash leading to denial of service.
0
Attacker Value
Unknown
CVE-2023-39908
Disclosure Date: August 14, 2023 (last updated October 08, 2023)
The PKCS11 module of the YubiHSM 2 SDK through 2023.01 does not properly validate the length of specific read operations on object metadata. This may lead to disclosure of uninitialized and previously used memory.
0
Attacker Value
Unknown
CVE-2022-40609
Disclosure Date: August 02, 2023 (last updated October 08, 2023)
IBM SDK, Java Technology Edition 7.1.5.18 and 8.0.8.0 could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization flaw. By sending specially-crafted data, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 236069.
0
Attacker Value
Unknown
CVE-2023-37259
Disclosure Date: July 18, 2023 (last updated October 08, 2023)
matrix-react-sdk is a react-based SDK for inserting a Matrix chat/voip client into a web page. The Export Chat feature includes certain attacker-controlled elements in the generated document without sufficient escaping, leading to stored Cross site scripting (XSS). Since the Export Chat feature generates a separate document, an attacker can only inject code run from the `null` origin, restricting the impact. However, the attacker can still potentially use the XSS to leak message contents. A malicious homeserver is a potential attacker since the affected inputs are controllable server-side. This issue has been addressed in commit `22fcd34c60` which is included in release version 3.76.0. Users are advised to upgrade. The only known workaround for this issue is to disable or to not use the Export Chat feature.
0
Attacker Value
Unknown
CVE-2023-0972
Disclosure Date: June 21, 2023 (last updated October 08, 2023)
Description: A vulnerability in SiLabs Z/IP Gateway 7.18.01 and earlier allows an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution.
0
Attacker Value
Unknown
CVE-2023-0971
Disclosure Date: June 21, 2023 (last updated October 08, 2023)
A logic error in SiLabs Z/IP Gateway SDK 7.18.02 and earlier allows authentication to be bypassed, remote administration of Z-Wave controllers, and S0/S2 encryption keys to be recovered.
0
Attacker Value
Unknown
CVE-2023-0970
Disclosure Date: June 21, 2023 (last updated October 08, 2023)
Multiple buffer overflow vulnerabilities in SiLabs Z/IP Gateway SDK version 7.18.01 and earlier allow an attacker with invasive physical access to a Z-Wave controller device to overwrite global memory and potentially execute arbitrary code.
0
Attacker Value
Unknown
CVE-2023-0969
Disclosure Date: June 21, 2023 (last updated October 08, 2023)
A vulnerability in SiLabs Z/IP Gateway 7.18.01 and earlier allows an authenticated attacker within Z-Wave range to manipulate an array pointer to disclose the contents of global memory.
0
Attacker Value
Unknown
CVE-2023-34115
Disclosure Date: June 13, 2023 (last updated October 08, 2023)
Buffer copy without checking size of input in Zoom Meeting SDK before 5.13.0 may allow an authenticated user to potentially enable a denial of service via local access. This issue may result in the Zoom Meeting SDK to crash and need to be restarted.
0