CVE-2024-53028

CVE-2024-53028

Título es
CVE-2024-53028

Lun, 03/03/2025 – 11:15

Tipo
CWE-367

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2024-53028

Descripción en
Memory corruption may occur while processing message from frontend during allocation.

03/03/2025

03/03/2025

Vector CVSS:3.1
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Gravedad 3.1 (CVSS 3.1 Base Score)
7.80

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
HIGH

Referencias


  • https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html
  • Enviar en el boletín
    Off

    CVE-2024-53027

    CVE-2024-53027

    Título es
    CVE-2024-53027

    Lun, 03/03/2025 – 11:15

    Tipo
    CWE-120

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-53027

    Descripción en
    Transient DOS may occur while processing the country IE.

    03/03/2025

    03/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

    Gravedad 3.1 (CVSS 3.1 Base Score)
    7.50

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Referencias


  • https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html
  • Enviar en el boletín
    Off

    CVE-2025-21424

    CVE-2025-21424

    Título es
    CVE-2025-21424

    Lun, 03/03/2025 – 11:15

    Tipo
    CWE-416

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-21424

    Descripción en
    Memory corruption while calling the NPU driver APIs concurrently.

    03/03/2025

    03/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    Gravedad 3.1 (CVSS 3.1 Base Score)
    7.80

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Referencias


  • https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html
  • Enviar en el boletín
    Off

    CVE-2025-0475

    CVE-2025-0475

    Título es
    CVE-2025-0475

    Lun, 03/03/2025 – 11:15

    Tipo
    CWE-79

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-0475

    Descripción en
    An issue has been discovered in GitLab CE/EE affecting all versions from 15.10 prior to 17.7.6, 17.8 prior to 17.8.4, and 17.9 prior to 17.9.1. A proxy feature could potentially allow unintended content rendering leading to XSS under specific circumstances.

    03/03/2025

    03/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    8.70

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Referencias


  • https://gitlab.com/gitlab-org/gitlab/-/issues/513142

  • https://hackerone.com/reports/2932309
  • Enviar en el boletín
    Off

    CVE-2024-53034

    CVE-2024-53034

    Título es
    CVE-2024-53034

    Lun, 03/03/2025 – 11:15

    Tipo
    CWE-822

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-53034

    Descripción en
    Memory corruption occurs during an Escape call if an invalid Kernel Mode CPU event and sync object handle are passed with the DriverKnownEscape flag reset.

    03/03/2025

    03/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    Gravedad 3.1 (CVSS 3.1 Base Score)
    7.80

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Referencias


  • https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html
  • Enviar en el boletín
    Off

    CVE-2024-53033

    CVE-2024-53033

    Título es
    CVE-2024-53033

    Lun, 03/03/2025 – 11:15

    Tipo
    CWE-822

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-53033

    Descripción en
    Memory corruption while doing Escape call when user provides valid kernel address in the place of valid user buffer address.

    03/03/2025

    03/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    Gravedad 3.1 (CVSS 3.1 Base Score)
    7.80

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Referencias


  • https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html
  • Enviar en el boletín
    Off

    CVE-2024-53032

    CVE-2024-53032

    Título es
    CVE-2024-53032

    Lun, 03/03/2025 – 11:15

    Tipo
    CWE-367

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-53032

    Descripción en
    Memory corruption may occur in keyboard virtual device due to guest VM interaction.

    03/03/2025

    03/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    Gravedad 3.1 (CVSS 3.1 Base Score)
    7.80

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Referencias


  • https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html
  • Enviar en el boletín
    Off

    CVE-2025-1851

    CVE-2025-1851

    Título es
    CVE-2025-1851

    Lun, 03/03/2025 – 05:15

    Tipo
    CWE-119

    Gravedad v2.0
    9.00

    Gravedad 2.0 Txt
    HIGH

    Título en

    CVE-2025-1851

    Descripción en
    A vulnerability, which was classified as critical, was found in Tenda AC7 up to 15.03.06.44. This affects the function formSetFirewallCfg of the file /goform/SetFirewallCfg. The manipulation of the argument firewallEn leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

    03/03/2025

    03/03/2025

    Vector CVSS:4.0
    CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    Vector CVSS:2.0
    AV:N/AC:L/Au:S/C:C/I:C/A:C

    Gravedad 4.0
    8.70

    Gravedad 4.0 txt
    HIGH

    Gravedad 3.1 (CVSS 3.1 Base Score)
    8.80

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Referencias


  • https://github.com/Raining-101/IOT_cve/blob/main/ac7_V15.03.06.44_SetFirewallCfg.md

  • https://vuldb.com/?ctiid_298119=

  • https://vuldb.com/?id_298119=

  • https://vuldb.com/?submit_505271=

  • https://www.tenda.com.cn/
  • Enviar en el boletín
    Off

    CVE-2025-1853

    CVE-2025-1853

    Título es
    CVE-2025-1853

    Lun, 03/03/2025 – 06:15

    Tipo
    CWE-119

    Gravedad v2.0
    9.00

    Gravedad 2.0 Txt
    HIGH

    Título en

    CVE-2025-1853

    Descripción en
    A vulnerability was found in Tenda AC8 16.03.34.06 and classified as critical. This issue affects the function sub_49E098 of the file /goform/SetIpMacBind of the component Parameter Handler. The manipulation of the argument list leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

    03/03/2025

    03/03/2025

    Vector CVSS:4.0
    CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    Vector CVSS:2.0
    AV:N/AC:L/Au:S/C:C/I:C/A:C

    Gravedad 4.0
    8.70

    Gravedad 4.0 txt
    HIGH

    Gravedad 3.1 (CVSS 3.1 Base Score)
    8.80

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Referencias


  • https://github.com/Raining-101/IOT_cve/blob/main/tenda-ac8_sub_49E098.md

  • https://vuldb.com/?ctiid_298121=

  • https://vuldb.com/?id_298121=

  • https://vuldb.com/?submit_505374=

  • https://www.tenda.com.cn/
  • Enviar en el boletín
    Off

    CVE-2025-1852

    CVE-2025-1852

    Título es
    CVE-2025-1852

    Lun, 03/03/2025 – 06:15

    Tipo
    CWE-119

    Gravedad v2.0
    9.00

    Gravedad 2.0 Txt
    HIGH

    Título en

    CVE-2025-1852

    Descripción en
    A vulnerability has been found in Totolink EX1800T 9.1.0cu.2112_B20220316 and classified as critical. This vulnerability affects the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

    03/03/2025

    03/03/2025

    Vector CVSS:4.0
    CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    Vector CVSS:2.0
    AV:N/AC:L/Au:S/C:C/I:C/A:C

    Gravedad 4.0
    8.70

    Gravedad 4.0 txt
    HIGH

    Gravedad 3.1 (CVSS 3.1 Base Score)
    8.80

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Referencias


  • https://github.com/watermelon-happy/cve/blob/main/ex1800tCVE.md

  • https://vuldb.com/?ctiid_298120=

  • https://vuldb.com/?id_298120=

  • https://vuldb.com/?submit_505362=

  • https://www.totolink.net/
  • Enviar en el boletín
    Off