Show filters
420 Total Results
Displaying 101-110 of 420
Sort by:
Attacker Value
Unknown
CVE-2023-33222
Disclosure Date: December 15, 2023 (last updated February 25, 2025)
When handling contactless cards, usage of a specific function to get additional information from the card which doesn't
check the boundary on the data received while reading. This allows a stack-based buffer overflow that could lead to a
potential Remote Code Execution on the targeted device
0
Attacker Value
Unknown
CVE-2023-33221
Disclosure Date: December 15, 2023 (last updated February 25, 2025)
When reading DesFire keys, the function that reads the card isn't properly checking the boundaries when copying
internally the data received. This allows a heap based buffer overflow that could lead to a potential Remote Code
Execution on the targeted device. This is especially problematic if you use Default DESFire key.
0
Attacker Value
Unknown
CVE-2023-33220
Disclosure Date: December 15, 2023 (last updated February 25, 2025)
During the retrofit validation process, the firmware doesn't properly check the boundaries while copying some attributes
to check. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the targeted
device
0
Attacker Value
Unknown
CVE-2023-33219
Disclosure Date: December 15, 2023 (last updated February 25, 2025)
The handler of the retrofit validation command doesn't properly check the boundaries when performing certain validation
operations. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the
targeted device
0
Attacker Value
Unknown
CVE-2023-33218
Disclosure Date: December 15, 2023 (last updated February 25, 2025)
The Parameter Zone Read and Parameter Zone Write command handlers allow performing a Stack buffer overflow.
This could potentially lead to a Remote Code execution on the targeted device.
0
Attacker Value
Unknown
CVE-2023-33217
Disclosure Date: December 15, 2023 (last updated February 25, 2025)
By abusing a design flaw in the firmware upgrade mechanism of the impacted terminal it's possible to cause a permanent
denial of service for the terminal. the only way to recover the terminal is by sending back the terminal to the manufacturer
0
Attacker Value
Unknown
CVE-2023-49090
Disclosure Date: November 29, 2023 (last updated February 25, 2025)
CarrierWave is a solution for file uploads for Rails, Sinatra and other Ruby web frameworks. CarrierWave has a Content-Type allowlist bypass vulnerability, possibly leading to XSS. The validation in `allowlisted_content_type?` determines Content-Type permissions by performing a partial match. If the `content_type` argument of `allowlisted_content_type?` is passed a value crafted by the attacker, Content-Types not included in the `content_type_allowlist` will be allowed. This issue has been patched in versions 2.2.5 and 3.0.5.
0
Attacker Value
Unknown
CVE-2023-4667
Disclosure Date: November 28, 2023 (last updated February 25, 2025)
The web interface of the PAC Device allows the device administrator user profile to store malicious scripts in some fields. The stored malicious script is then executed when the GUI is opened by any users of the webserver administration interface.
The root cause of the vulnerability is inadequate input validation and output encoding in the web administration interface component of the firmware.
This could lead to unauthorized access and data leakage
0
Attacker Value
Unknown
CVE-2023-5747
Disclosure Date: November 13, 2023 (last updated February 25, 2025)
Bashis, a Security Researcher at IPVM has found a flaw that allows for a remote code execution during the installation of Wave on the camera device. The Wave server application in camera device was vulnerable to command injection allowing an attacker to run arbitrary code. HanwhaVision has released patched firmware for the highlighted flaw. Please refer to the hanwhavision security report for more information and solution."
0
Attacker Value
Unknown
CVE-2023-4896
Disclosure Date: October 17, 2023 (last updated October 25, 2023)
A vulnerability exists which allows an authenticated attacker to access sensitive information on the AirWave Management Platform web-based management interface. Successful exploitation allows the attacker to gain access to some data that could be further exploited to laterally access devices managed and monitored by the AirWave server.
0