U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
There are 244,230 matching records.
Displaying matches 28,041 through 28,060.
Vuln ID Summary CVSS Severity
CVE-2023-33047

Transient DOS in WLAN Firmware while parsing no-inherit IES.

Published: November 07, 2023; 1:15:10 AM -0500
V4.0:(not available)
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33045

Memory corruption in WLAN Firmware while parsing a NAN management frame carrying a S3 attribute.

Published: November 07, 2023; 1:15:10 AM -0500
V4.0:(not available)
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-33031

Memory corruption in Automotive Audio while copying data from ADSP shared buffer to the VOC packet data buffer.

Published: November 07, 2023; 1:15:10 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-28574

Memory corruption in core services when Diag handler receives a command to configure event listeners.

Published: November 07, 2023; 1:15:10 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-28572

Memory corruption in WLAN HOST while processing the WLAN scan descriptor list.

Published: November 07, 2023; 1:15:10 AM -0500
V4.0:(not available)
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-28570

Memory corruption while processing audio effects.

Published: November 07, 2023; 1:15:10 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-28569

Information disclosure in WLAN HAL while handling command through WMI interfaces.

Published: November 07, 2023; 1:15:10 AM -0500
V4.0:(not available)
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-28568

Information disclosure in WLAN HAL when reception status handler is called.

Published: November 07, 2023; 1:15:09 AM -0500
V4.0:(not available)
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-28566

Information disclosure in WLAN HAL while handling the WMI state info command.

Published: November 07, 2023; 1:15:09 AM -0500
V4.0:(not available)
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-28563

Information disclosure in IOE Firmware while handling WMI command.

Published: November 07, 2023; 1:15:09 AM -0500
V4.0:(not available)
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-28556

Cryptographic issue in HLOS during key management.

Published: November 07, 2023; 1:15:09 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-28554

Information Disclosure in Qualcomm IPC while reading values from shared memory in VM.

Published: November 07, 2023; 1:15:09 AM -0500
V4.0:(not available)
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-28553

Information Disclosure in WLAN Host when processing WMI event command.

Published: November 07, 2023; 1:15:08 AM -0500
V4.0:(not available)
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-28545

Memory corruption in TZ Secure OS while loading an app ELF.

Published: November 07, 2023; 1:15:08 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-24852

Memory Corruption in Core due to secure memory access by user while loading modem image.

Published: November 07, 2023; 1:15:08 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-22388

Memory Corruption in Multi-mode Call Processor while processing bit mask API.

Published: November 07, 2023; 1:15:08 AM -0500
V4.0:(not available)
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-21671

Memory Corruption in Core during syscall for Sectools Fuse comparison feature.

Published: November 07, 2023; 1:15:08 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2019-25156

A vulnerability classified as problematic was found in dstar2018 Agency up to 61. Affected by this vulnerability is an unknown functionality of the file search.php. The manipulation of the argument QSType/QuickSearch leads to cross site scripting. The attack can be launched remotely. The patch is named 975b56953efabb434519d9feefcc53685fb8d0ab. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-244495.

Published: November 07, 2023; 1:15:07 AM -0500
V4.0:(not available)
V3.1: 6.1 MEDIUM
V2.0:(not available)
CVE-2023-46998

Cross Site Scripting vulnerability in BootBox Bootbox.js v.3.2 through 6.0 allows a remote attacker to execute arbitrary code via a crafted payload to alert(), confirm(), prompt() functions.

Published: November 07, 2023; 12:15:13 AM -0500
V4.0:(not available)
V3.1: 6.1 MEDIUM
V2.0:(not available)
CVE-2023-35140

The improper privilege management vulnerability in the Zyxel GS1900-24EP switch firmware version V2.70(ABTO.5) could allow an authenticated local user with read-only access to modify system settings on a vulnerable device.

Published: November 07, 2023; 12:15:12 AM -0500
V4.0:(not available)
V3.1: 5.5 MEDIUM
V2.0:(not available)