Common Vulnerabilities and Exposures (CVE) is a critical tool for maintaining software security, providing a standardized way to track and manage vulnerabilities across systems. Organizations should regularly monitor CVE databases, assess the impact of vulnerabilities, and apply patches promptly to reduce the risk of exploitation.
CVE (Common Vulnerabilities and Exposures) is a public database that provides a standardized method for identifying, tracking, and referencing publicly disclosed security vulnerabilities in software and hardware.
Each vulnerability receives a unique identifier called a CVE ID (e.g., CVE-2023-12345), making it easier to reference specific vulnerabilities across different tools and databases.
Total Search Results: 158437
CVE ID | Description | Severity | Published Date | Affected Vendor | Action |
---|---|---|---|---|---|
CVE-2023-32961 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Katie Seaborn Zotpress plugin <= 7.3.3 versions. | Unknown | N/A | Katie Seaborn | |
CVE-2023-32962 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in HasTheme WishSuite – Wishlist for WooCommerce plugin <= 1.3.4 versions. | Unknown | N/A | HasTheme | |
CVE-2023-32964 | Cross-Site Request Forgery (CSRF) vulnerability in Made with Fuel Better Notifications for WP plugin <= 1.9.2 versions. | Unknown | N/A | Made with Fuel | |
CVE-2023-32965 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in CRUDLab Jazz Popups plugin <= 1.8.7 versions. | Unknown | N/A | CRUDLab | |
CVE-2023-32966 | Cross-Site Request Forgery (CSRF) vulnerability in CRUDLab Jazz Popups leads to Stored XSS.This issue affects Jazz Popups: from n/a through 1.8.7. | Unknown | N/A | CRUDLab | |
CVE-2023-32967 | An incorrect authorization vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to bypass intended access restrictions via a network. QTS 5.x, QuTS hero are not affected. We have already fixed the vulnerability in the following versions: QuTScloud c5.1.5.2651 and later QTS 4.5.4.2627 build 20231225 and later | Unknown | N/A | QNAP Systems Inc. | |
CVE-2023-32968 | A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2514 build 20230906 and later QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.0.1.2515 build 20230907 and later QuTS hero h5.1.2.2534 build 20230927 and later | Unknown | N/A | QNAP Systems Inc. | |
CVE-2023-32969 | A cross-site scripting (XSS) vulnerability has been reported to affect Network & Virtual Switch. If exploited, the vulnerability could allow authenticated administrators to inject malicious code via a network. We have already fixed the vulnerability in the following versions: QuTScloud c5.1.5.2651 and later QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later | Unknown | N/A | QNAP Systems Inc. | |
CVE-2023-3297 | In Ubuntu's accountsservice an unprivileged local attacker can trigger a use-after-free vulnerability in accountsservice by sending a D-Bus message to the accounts-daemon process. | Unknown | N/A | Canonical Ltd. | |
CVE-2023-32970 | A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to launch a denial-of-service (DoS) attack via a network. QES is not affected. We have already fixed the vulnerability in the following versions: QuTS hero h5.0.1.2515 build 20230907 and later QuTS hero h5.1.0.2453 build 20230708 and later QuTS hero h4.5.4.2476 build 20230728 and later QuTScloud c5.1.0.2498 and later QTS 5.1.0.2444 build 20230629 and later QTS 4.5.4.2467 build 20230718 and later | Unknown | N/A | QNAP Systems Inc. | |
CVE-2023-32971 | A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2425 build 20230609 and later QTS 5.1.0.2444 build 20230629 and later QTS 4.5.4.2467 build 20230718 and later QuTS hero h5.0.1.2515 build 20230907 and later QuTS hero h5.1.0.2424 build 20230609 and later QuTS hero h4.5.4.2476 build 20230728 and later QuTScloud c5.1.0.2498 and later | Unknown | N/A | QNAP Systems Inc. | |
CVE-2023-32972 | A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2425 build 20230609 and later QTS 5.1.0.2444 build 20230629 and later QTS 4.5.4.2467 build 20230718 and later QuTS hero h5.0.1.2515 build 20230907 and later QuTS hero h5.1.0.2424 build 20230609 and later QuTS hero h4.5.4.2476 build 20230728 and later QuTScloud c5.1.0.2498 and later | Unknown | N/A | QNAP Systems Inc. | |
CVE-2023-32973 | A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2425 build 20230609 and later QTS 5.1.0.2444 build 20230629 and later QTS 4.5.4.2467 build 20230718 and later QuTS hero h5.0.1.2515 build 20230907 and later QuTS hero h5.1.0.2424 build 20230609 and later QuTS hero h4.5.4.2476 build 20230728 and later QuTScloud c5.1.0.2498 and later | Unknown | N/A | QNAP Systems Inc. | |
CVE-2023-32974 | A path traversal vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to read the contents of unexpected files and expose sensitive data via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.0.2444 build 20230629 and later QuTS hero h5.1.0.2424 build 20230609 and later QuTScloud c5.1.0.2498 and later | Unknown | N/A | QNAP Systems Inc. | |
CVE-2023-32975 | A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2514 build 20230906 and later QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.0.1.2515 build 20230907 and later QuTS hero h5.1.2.2534 build 20230927 and later | Unknown | N/A | QNAP Systems Inc. | |
CVE-2023-32976 | An OS command injection vulnerability has been reported to affect Container Station. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network. We have already fixed the vulnerability in the following version: Container Station 2.6.7.44 and later | Unknown | N/A | QNAP Systems Inc. | |
CVE-2023-32977 | Jenkins Pipeline: Job Plugin does not escape the display name of the build that caused an earlier build to be aborted, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to set build display names immediately. | Unknown | N/A | Jenkins Project | |
CVE-2023-32978 | A cross-site request forgery (CSRF) vulnerability in Jenkins LDAP Plugin allows attackers to connect to an attacker-specified LDAP server using attacker-specified credentials. | Unknown | N/A | Jenkins Project | |
CVE-2023-32979 | Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system. | Unknown | N/A | Jenkins Project | |
CVE-2023-32980 | A cross-site request forgery (CSRF) vulnerability in Jenkins Email Extension Plugin allows attackers to make another user stop watching an attacker-specified job. | Unknown | N/A | Jenkins Project | |
CVE-2023-32981 | An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content. | Unknown | N/A | Jenkins Project | |
CVE-2023-32982 | Jenkins Ansible Plugin 204.v8191fd551eb_f and earlier stores extra variables unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. | Unknown | N/A | Jenkins Project | |
CVE-2023-32983 | Jenkins Ansible Plugin 204.v8191fd551eb_f and earlier does not mask extra variables displayed on the configuration form, increasing the potential for attackers to observe and capture them. | Unknown | N/A | Jenkins Project | |
CVE-2023-32984 | Jenkins TestNG Results Plugin 730.v4c5283037693 and earlier does not escape several values that are parsed from TestNG report files and displayed on the plugin's test information pages, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide a crafted TestNG report file. | Unknown | N/A | Jenkins Project | |
CVE-2023-32985 | Jenkins Sidebar Link Plugin 2.2.1 and earlier does not restrict the path of files in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | Unknown | N/A | Jenkins Project | |
CVE-2023-32986 | Jenkins File Parameter Plugin 285.v757c5b_67a_c25 and earlier does not restrict the name (and resulting uploaded file name) of Stashed File Parameters, allowing attackers with Item/Configure permission to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content. | Unknown | N/A | Jenkins Project | |
CVE-2023-32987 | A cross-site request forgery (CSRF) vulnerability in Jenkins Reverse Proxy Auth Plugin 1.7.4 and earlier allows attackers to connect to an attacker-specified LDAP server using attacker-specified credentials. | Unknown | N/A | Jenkins Project | |
CVE-2023-32988 | A missing permission check in Jenkins Azure VM Agents Plugin 852.v8d35f0960a_43 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | Unknown | N/A | Jenkins Project | |
CVE-2023-32989 | A cross-site request forgery (CSRF) vulnerability in Jenkins Azure VM Agents Plugin 852.v8d35f0960a_43 and earlier allows attackers to connect to an attacker-specified Azure Cloud server using attacker-specified credentials IDs obtained through another method. | Unknown | N/A | Jenkins Project | |
CVE-2023-3299 | HashiCorp Nomad Enterprise 1.2.11 up to 1.5.6, and 1.4.10 ACL policies using a block without a label generates unexpected results. Fixed in 1.6.0, 1.5.7, and 1.4.11. | Unknown | N/A | HashiCorp | |
CVE-2023-32990 | A missing permission check in Jenkins Azure VM Agents Plugin 852.v8d35f0960a_43 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified Azure Cloud server using attacker-specified credentials IDs obtained through another method. | Unknown | N/A | Jenkins Project | |
CVE-2023-32991 | A cross-site request forgery (CSRF) vulnerability in Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier allows attackers to send an HTTP request to an attacker-specified URL and parse the response as XML, or parse a local file on the Jenkins controller as XML. | Unknown | N/A | Jenkins Project | |
CVE-2023-32992 | Missing permission checks in Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier allow attackers with Overall/Read permission to send an HTTP request to an attacker-specified URL and parse the response as XML, or parse a local file on the Jenkins controller as XML. | Unknown | N/A | Jenkins Project | |
CVE-2023-32993 | Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier does not perform hostname validation when connecting to miniOrange or the configured IdP to retrieve SAML metadata, which could be abused using a man-in-the-middle attack to intercept these connections. | Unknown | N/A | Jenkins Project | |
CVE-2023-32994 | Jenkins SAML Single Sign On(SSO) Plugin 2.1.0 and earlier unconditionally disables SSL/TLS certificate validation for connections to miniOrange or the configured IdP to retrieve SAML metadata, which could be abused using a man-in-the-middle attack to intercept these connections. | Unknown | N/A | Jenkins Project | |
CVE-2023-32995 | A cross-site request forgery (CSRF) vulnerability in Jenkins SAML Single Sign On(SSO) Plugin 2.0.0 and earlier allows attackers to send an HTTP POST request with JSON body containing attacker-specified content, to miniOrange's API for sending emails. | Unknown | N/A | Jenkins Project | |
CVE-2023-32996 | A missing permission check in Jenkins SAML Single Sign On(SSO) Plugin 2.0.0 and earlier allows attackers with Overall/Read permission to send an HTTP POST request with JSON body containing attacker-specified content, to miniOrange's API for sending emails. | Unknown | N/A | Jenkins Project | |
CVE-2023-32997 | Jenkins CAS Plugin 1.6.2 and earlier does not invalidate the previous session on login. | Unknown | N/A | Jenkins Project | |
CVE-2023-32998 | A cross-site request forgery (CSRF) vulnerability in Jenkins AppSpider Plugin 1.0.15 and earlier allows attackers to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials. | Unknown | N/A | Jenkins Project | |
CVE-2023-32999 | A missing permission check in Jenkins AppSpider Plugin 1.0.15 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials. | Unknown | N/A | Jenkins Project | |
CVE-2023-3300 | HashiCorp Nomad and Nomad Enterprise 0.11.0 up to 1.5.6 and 1.4.1 HTTP search API can reveal names of available CSI plugins to unauthenticated users or users without the plugin:read policy. Fixed in 1.6.0, 1.5.7, and 1.4.1. | Unknown | N/A | HashiCorp | |
CVE-2023-33000 | Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.149 and earlier does not mask credentials displayed on the configuration form, increasing the potential for attackers to observe and capture them. | Unknown | N/A | Jenkins Project | |
CVE-2023-33001 | Jenkins HashiCorp Vault Plugin 360.v0a_1c04cf807d and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled. | Unknown | N/A | Jenkins Project | |
CVE-2023-33002 | Jenkins TestComplete support Plugin 2.8.1 and earlier does not escape the TestComplete project name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | Unknown | N/A | Jenkins Project | |
CVE-2023-33003 | A cross-site request forgery (CSRF) vulnerability in Jenkins Tag Profiler Plugin 0.2 and earlier allows attackers to reset profiler statistics. | Unknown | N/A | Jenkins Project | |
CVE-2023-33004 | A missing permission check in Jenkins Tag Profiler Plugin 0.2 and earlier allows attackers with Overall/Read permission to reset profiler statistics. | Unknown | N/A | Jenkins Project | |
CVE-2023-33005 | Jenkins WSO2 Oauth Plugin 1.0 and earlier does not invalidate the previous session on login. | Unknown | N/A | Jenkins Project | |
CVE-2023-33006 | A cross-site request forgery (CSRF) vulnerability in Jenkins WSO2 Oauth Plugin 1.0 and earlier allows attackers to trick users into logging in to the attacker's account. | Unknown | N/A | Jenkins Project | |
CVE-2023-33007 | Jenkins LoadComplete support Plugin 1.0 and earlier does not escape the LoadComplete test name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | Unknown | N/A | Jenkins Project | |
CVE-2023-33008 | Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache Johnzon. A malicious attacker can craft up some JSON input that uses large numbers (numbers such as 1e20000000) that Apache Johnzon will deserialize into BigDecimal and maybe use numbers too large which may result in a slow conversion (Denial of service risk). Apache Johnzon 1.2.21 mitigates this by setting a scale limit of 1000 (by default) to the BigDecimal. This issue affects Apache Johnzon: through 1.2.20. | Unknown | N/A | Apache Software Foundation | |
CVE-2023-33009 | A buffer overflow vulnerability in the notification function in Zyxel ATP series firmware versions 4.60 through 5.36 Patch 1, USG FLEX series firmware versions 4.60 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.60 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.60 through 5.36 Patch 1, VPN series firmware versions 4.60 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.60 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device. | Unknown | N/A | Zyxel | |
CVE-2023-3301 | A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and cause a denial of service. | Unknown | N/A | n/a | |
CVE-2023-33010 | A buffer overflow vulnerability in the ID processing function in Zyxel ATP series firmware versions 4.32 through 5.36 Patch 1, USG FLEX series firmware versions 4.50 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.25 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.25 through 5.36 Patch 1, VPN series firmware versions 4.30 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.25 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device. | Unknown | N/A | Zyxel | |
CVE-2023-33011 | A format string vulnerability in the Zyxel ATP series firmware versions 5.10 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.10 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.10 through 5.36 Patch 2, and VPN series firmware versions 5.00 through 5.36 Patch 2, could allow an unauthenticated, LAN-based attacker to execute some OS commands by using a crafted PPPoE configuration on an affected device when the cloud management mode is enabled. | Unknown | N/A | Zyxel | |
CVE-2023-33012 | A command injection vulnerability in the configuration parser of the Zyxel ATP series firmware versions 5.10 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.10 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.10 through 5.36 Patch 2, and VPN series firmware versions 5.00 through 5.36 Patch 2, could allow an unauthenticated, LAN-based attacker to execute some OS commands by using a crafted GRE configuration when the cloud management mode is enabled. | Unknown | N/A | Zyxel | |
CVE-2023-33013 | A post-authentication command injection vulnerability in the NTP feature of Zyxel NBG6604 firmware version V1.01(ABIR.1)C0 could allow an authenticated attacker to execute some OS commands remotely by sending a crafted HTTP request. | Unknown | N/A | Zyxel | |
CVE-2023-33014 | Information disclosure in Core services while processing a Diag command. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33015 | Transient DOS in WLAN Firmware while interpreting MBSSID IE of a received beacon frame. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33016 | Transient DOS in WLAN firmware while parsing MLO (multi-link operation). | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33017 | Memory corruption in Boot while running a ListVars test in UEFI Menu during boot. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33018 | Memory corruption while using the UIM diag command to get the operators name. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33019 | Transient DOS in WLAN Host while doing channel switch announcement (CSA), when a mobile station receives invalid channel in CSA IE. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-3302 | Improper Neutralization of Formula Elements in a CSV File in GitHub repository admidio/admidio prior to 4.2.9. | Unknown | N/A | admidio | |
CVE-2023-33020 | Transient DOS in WLAN Host when an invalid channel (like channel out of range) is received in STA during CSA IE. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33021 | Memory corruption in Graphics while processing user packets for command submission. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33022 | Memory corruption in HLOS while invoking IOCTL calls from user-space. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33023 | Memory corruption while processing finish_sign command to pass a rsp buffer. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33024 | Memory corruption while sending SMS from AP firmware. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33025 | Memory corruption in Data Modem when a non-standard SDP body, during a VOLTE call. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33026 | Transient DOS in WLAN Firmware while parsing a NAN management frame. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33027 | Transient DOS in WLAN Firmware while parsing rsn ies. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33028 | Memory corruption in WLAN Firmware while doing a memory copy of pmk cache. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33029 | Memory corruption in DSP Service during a remote call from HLOS to DSP. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-3303 | Improper Access Control in GitHub repository admidio/admidio prior to 4.2.9. | Unknown | N/A | admidio | |
CVE-2023-33030 | Memory corruption in HLOS while running playready use-case. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33031 | Memory corruption in Automotive Audio while copying data from ADSP shared buffer to the VOC packet data buffer. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33032 | Memory corruption in TZ Secure OS while requesting a memory allocation from TA region. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33033 | Memory corruption in Audio during playback with speaker protection. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33034 | Memory corruption while parsing the ADSP response command. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33035 | Memory corruption while invoking callback function of AFE from ADSP. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33036 | Permanent DOS in Hypervisor while untrusted VM without PSCI support makes a PSCI call. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33037 | Cryptographic issue in Automotive while unwrapping the key secs2d and verifying with RPMB data. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33038 | Memory corruption while receiving a message in Bus Socket Transport Server. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33039 | Memory corruption in Automotive Display while destroying the image handle created using connected display driver. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-3304 | Improper Access Control in GitHub repository admidio/admidio prior to 4.2.9. | Unknown | N/A | admidio | |
CVE-2023-33040 | Transient DOS in Data Modem during DTLS handshake. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33041 | Under certain scenarios the WLAN Firmware will reach an assertion due to state confusion while looking up peer ids. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33042 | Transient DOS in Modem after RRC Setup message is received. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33043 | Transient DOS in Modem when a Beam switch request is made with a non-configured BWP. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33044 | Transient DOS in Data modem while handling TLB control messages from the Network. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33045 | Memory corruption in WLAN Firmware while parsing a NAN management frame carrying a S3 attribute. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33046 | Memory corruption in Trusted Execution Environment while deinitializing an object used for license validation. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33047 | Transient DOS in WLAN Firmware while parsing no-inherit IES. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33048 | Transient DOS in WLAN Firmware while parsing t2lm buffers. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33049 | Transient DOS in Multi-Mode Call Processor due to UE failure because of heap leakage. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-3305 | A vulnerability was found in C-DATA Web Management System up to 20230607. It has been classified as critical. This affects an unknown part of the file /cgi-bin/jumpto.php?class=user&page=config_save&isphp=1 of the component User Creation Handler. The manipulation of the argument user/newpassword leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231801 was assigned to this vulnerability. | Unknown | N/A | C-DATA | |
CVE-2023-33053 | Memory corruption in Kernel while parsing metadata. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33054 | Cryptographic issue in GPS HLOS Driver while downloading Qualcomm GNSS assistance data. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33055 | Memory Corruption in Audio while invoking callback function in driver from ADSP. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2023-33056 | Transient DOS in WLAN Firmware when firmware receives beacon including T2LM IE. | Unknown | N/A | Qualcomm, Inc. |
vunerability-insight.com © 2023 - 2025. All Rights Reserved.
Vulnerability Data Repositories v