Show filters
420 Total Results
Displaying 101-110 of 420
Sort by:
Attacker Value
Unknown

CVE-2023-33222

Disclosure Date: December 15, 2023 (last updated February 25, 2025)
When handling contactless cards, usage of a specific function to get additional information from the card which doesn't check the boundary on the data received while reading. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the targeted device
Attacker Value
Unknown

CVE-2023-33221

Disclosure Date: December 15, 2023 (last updated February 25, 2025)
When reading DesFire keys, the function that reads the card isn't properly checking the boundaries when copying internally the data received. This allows a heap based buffer overflow that could lead to a potential Remote Code Execution on the targeted device. This is especially problematic if you use Default DESFire key.
Attacker Value
Unknown

CVE-2023-33220

Disclosure Date: December 15, 2023 (last updated February 25, 2025)
During the retrofit validation process, the firmware doesn't properly check the boundaries while copying some attributes to check. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the targeted device
Attacker Value
Unknown

CVE-2023-33219

Disclosure Date: December 15, 2023 (last updated February 25, 2025)
The handler of the retrofit validation command doesn't properly check the boundaries when performing certain validation operations. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the targeted device
Attacker Value
Unknown

CVE-2023-33218

Disclosure Date: December 15, 2023 (last updated February 25, 2025)
The Parameter Zone Read and Parameter Zone Write command handlers allow performing a Stack buffer overflow. This could potentially lead to a Remote Code execution on the targeted device.
Attacker Value
Unknown

CVE-2023-33217

Disclosure Date: December 15, 2023 (last updated February 25, 2025)
By abusing a design flaw in the firmware upgrade mechanism of the impacted terminal it's possible to cause a permanent denial of service for the terminal. the only way to recover the terminal is by sending back the terminal to the manufacturer
Attacker Value
Unknown

CVE-2023-49090

Disclosure Date: November 29, 2023 (last updated February 25, 2025)
CarrierWave is a solution for file uploads for Rails, Sinatra and other Ruby web frameworks. CarrierWave has a Content-Type allowlist bypass vulnerability, possibly leading to XSS. The validation in `allowlisted_content_type?` determines Content-Type permissions by performing a partial match. If the `content_type` argument of `allowlisted_content_type?` is passed a value crafted by the attacker, Content-Types not included in the `content_type_allowlist` will be allowed. This issue has been patched in versions 2.2.5 and 3.0.5.
Attacker Value
Unknown

CVE-2023-4667

Disclosure Date: November 28, 2023 (last updated February 25, 2025)
The web interface of the PAC Device allows the device administrator user profile to store malicious scripts in some fields. The stored malicious script is then executed when the GUI is opened by any users of the webserver administration interface.  The root cause of the vulnerability is inadequate input validation and output encoding in the web administration interface component of the firmware. This could lead to  unauthorized access and data leakage
Attacker Value
Unknown

CVE-2023-5747

Disclosure Date: November 13, 2023 (last updated February 25, 2025)
Bashis, a Security Researcher at IPVM has found a flaw that allows for a remote code execution during the installation of Wave on the camera device. The Wave server application in camera device was vulnerable to command injection allowing an attacker to run arbitrary code. HanwhaVision has released patched firmware for the highlighted flaw. Please refer to the hanwhavision security report for more information and solution."
Attacker Value
Unknown

CVE-2023-4896

Disclosure Date: October 17, 2023 (last updated October 25, 2023)
A vulnerability exists which allows an authenticated attacker to access sensitive information on the AirWave Management Platform web-based management interface. Successful exploitation allows the attacker to gain access to some data that could be further exploited to laterally access devices managed and monitored by the AirWave server.