Vulnerabilities (CVE)

Filtered by CWE-119
Total 13326 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-12147 2025-01-14 6.8 MEDIUM 6.5 MEDIUM
A vulnerability was found in Netgear R6900 1.0.1.26_1.0.20. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file upgrade_check.cgi of the component HTTP Header Handler. The manipulation of the argument Content-Length leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2018-5996 2 7-zip, Debian 3 7-zip, P7zip, Debian Linux 2025-01-10 6.8 MEDIUM 7.8 HIGH
Insufficient exception handling in the method NCompress::NRar3::CDecoder::Code of 7-Zip before 18.00 and p7zip can lead to multiple memory corruptions within the PPMd code, allows remote attackers to cause a denial of service (segmentation fault) or execute arbitrary code via a crafted RAR archive.
CVE-2022-48655 2 Debian, Linux 2 Debian Linux, Linux Kernel 2025-01-10 N/A 7.8 HIGH
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Harden accesses to the reset domains Accessing reset domains descriptors by the index upon the SCMI drivers requests through the SCMI reset operations interface can potentially lead to out-of-bound violations if the SCMI driver misbehave. Add an internal consistency check before any such domains descriptors accesses.
CVE-2017-11076 1 Qualcomm 54 Msm8909w, Msm8909w Firmware, Msm8996au and 51 more 2025-01-09 N/A 9.8 CRITICAL
On some hardware revisions where VP9 decoding is hardware-accelerated, the frame size is not programmed correctly into the decoder hardware which can lead to an invalid memory access by the decoder.
CVE-2024-38218 1 Microsoft 1 Edge Chromium 2025-01-08 N/A 8.4 HIGH
Microsoft Edge (HTML-based) Memory Corruption Vulnerability
CVE-2017-9003 1 Hpe 1 Arubaos 2025-01-07 7.8 HIGH 7.5 HIGH
Multiple memory corruption flaws are present in ArubaOS which could allow an unauthenticated user to crash ArubaOS processes. With sufficient time and effort, it is possible these vulnerabilities could lead to the ability to execute arbitrary code - remote code execution has not yet been confirmed.
CVE-2024-7024 1 Google 1 Chrome 2025-01-02 N/A 9.6 CRITICAL
Inappropriate implementation in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Low)
CVE-2023-32270 1 Fujielectric 2 Tellus, Tellus Lite 2024-12-23 N/A 7.8 HIGH
Access of memory location after end of buffer issue exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted V8 file may lead to information disclosure and/or arbitrary code execution.
CVE-2024-9730 1 Trimble 1 Sketchup 2024-12-20 N/A 7.8 HIGH
Trimble SketchUp Viewer SKP File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SKP files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24146.
CVE-2024-9731 1 Trimble 1 Sketchup 2024-12-20 N/A 7.8 HIGH
Trimble SketchUp Viewer SKP File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SKP files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24145.
CVE-2024-2929 1 Rockwellautomation 1 Arena 2024-12-17 N/A 7.8 HIGH
A memory corruption vulnerability in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code to the software by corrupting the memory triggering an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.
CVE-2024-43053 1 Qualcomm 40 Fastconnect 6700, Fastconnect 6700 Firmware, Fastconnect 6900 and 37 more 2024-12-12 N/A 7.8 HIGH
Memory corruption while invoking IOCTL calls from user space to read WLAN target diagnostic information.
CVE-2024-43049 1 Qualcomm 38 Fastconnect 6700, Fastconnect 6700 Firmware, Fastconnect 6900 and 35 more 2024-12-12 N/A 7.8 HIGH
Memory corruption while invoking IOCTL calls from user space to set generic private command inside WLAN driver.
CVE-2024-12354 1 Razormist 1 Phone Contact Manager System 2024-12-10 4.3 MEDIUM 5.3 MEDIUM
A vulnerability, which was classified as critical, was found in SourceCodester Phone Contact Manager System 1.0. Affected is the function UserInterface::MenuDisplayStart of the component User Menu. The manipulation leads to buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
CVE-2024-12352 1 Totolink 2 Ex1800t, Ex1800t Firmware 2024-12-10 4.0 MEDIUM 4.3 MEDIUM
A vulnerability classified as problematic was found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. This vulnerability affects the function sub_40662C of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-12344 1 Tp-link 2 Vn020 F3v, Vn020 F3v Firmware 2024-12-10 6.5 MEDIUM 6.3 MEDIUM
A vulnerability, which was classified as critical, was found in TP-Link VN020 F3v(T) TT_V6.2.1021. This affects an unknown part of the component FTP USER Command Handler. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-12343 1 Tp-link 2 Vn020 F3v, Vn020 F3v Firmware 2024-12-10 6.1 MEDIUM 6.5 MEDIUM
A vulnerability classified as critical has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected is an unknown function of the file /control/WANIPConnection of the component SOAP Request Handler. The manipulation of the argument NewConnectionType leads to buffer overflow. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.
CVE-2024-12185 1 Code-projects 1 Hotel Management System 2024-12-10 4.3 MEDIUM 5.3 MEDIUM
A vulnerability has been found in code-projects Hotel Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the component Administrator Login Password Handler. The manipulation of the argument Str2 leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.
CVE-2024-12186 1 Code-projects 1 Hotel Management System 2024-12-10 4.3 MEDIUM 5.3 MEDIUM
A vulnerability was found in code-projects Hotel Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file hotelnew.c of the component Available Room Handler. The manipulation of the argument admin_entry leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
CVE-2024-45475 1 Siemens 1 Tecnomatix Plant Simulation 2024-12-10 N/A 7.8 HIGH
A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.