Show filters
11 Total Results
Displaying 1-10 of 11
Sort by:
Attacker Value
Unknown
CVE-2023-33222
Disclosure Date: December 15, 2023 (last updated December 29, 2023)
When handling contactless cards, usage of a specific function to get additional information from the card which doesn't
check the boundary on the data received while reading. This allows a stack-based buffer overflow that could lead to a
potential Remote Code Execution on the targeted device
0
Attacker Value
Unknown
CVE-2023-33221
Disclosure Date: December 15, 2023 (last updated December 22, 2023)
When reading DesFire keys, the function that reads the card isn't properly checking the boundaries when copying
internally the data received. This allows a heap based buffer overflow that could lead to a potential Remote Code
Execution on the targeted device. This is especially problematic if you use Default DESFire key.
0
Attacker Value
Unknown
CVE-2023-33220
Disclosure Date: December 15, 2023 (last updated December 22, 2023)
During the retrofit validation process, the firmware doesn't properly check the boundaries while copying some attributes
to check. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the targeted
device
0
Attacker Value
Unknown
CVE-2023-33219
Disclosure Date: December 15, 2023 (last updated December 22, 2023)
The handler of the retrofit validation command doesn't properly check the boundaries when performing certain validation
operations. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the
targeted device
0
Attacker Value
Unknown
CVE-2023-33218
Disclosure Date: December 15, 2023 (last updated December 22, 2023)
The Parameter Zone Read and Parameter Zone Write command handlers allow performing a Stack buffer overflow.
This could potentially lead to a Remote Code execution on the targeted device.
0
Attacker Value
Unknown
CVE-2023-33217
Disclosure Date: December 15, 2023 (last updated December 22, 2023)
By abusing a design flaw in the firmware upgrade mechanism of the impacted terminal it's possible to cause a permanent
denial of service for the terminal. the only way to recover the terminal is by sending back the terminal to the manufacturer
0
Attacker Value
Unknown
CVE-2023-4667
Disclosure Date: November 28, 2023 (last updated December 06, 2023)
The web interface of the PAC Device allows the device administrator user profile to store malicious scripts in some fields. The stored malicious script is then executed when the GUI is opened by any users of the webserver administration interface.
The root cause of the vulnerability is inadequate input validation and output encoding in the web administration interface component of the firmware.
This could lead to unauthorized access and data leakage
0
Attacker Value
Unknown
CVE-2021-35522
Disclosure Date: July 22, 2021 (last updated February 23, 2025)
A Buffer Overflow in Thrift command handlers in IDEMIA Morpho Wave Compact and VisionPass devices before 2.6.2, Sigma devices before 4.9.4, and MA VP MD devices before 4.9.7 allows remote attackers to achieve code execution, denial of services, and information disclosure via TCP/IP packets.
0
Attacker Value
Unknown
CVE-2021-35521
Disclosure Date: July 22, 2021 (last updated February 23, 2025)
A path traversal in Thrift command handlers in IDEMIA Morpho Wave Compact and VisionPass devices before 2.6.2 allows remote authenticated attackers to achieve denial of services and information disclosure via TCP/IP packets.
0
Attacker Value
Unknown
CVE-2021-35520
Disclosure Date: July 22, 2021 (last updated February 23, 2025)
A Buffer Overflow in Thrift command handlers in IDEMIA Morpho Wave Compact and VisionPass devices before 2.6.2 allows physically proximate authenticated attackers to achieve code execution, denial of services, and information disclosure via serial ports.
0