Vulnerabilities (CVE)

Filtered by CWE-120
Total 3807 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-28582 1 Qualcomm 86 Ar8035, Ar8035 Firmware, Fastconnect 6700 and 83 more 2025-01-10 N/A 9.8 CRITICAL
Memory corruption in Data Modem while verifying hello-verify message during the DTLS handshake.
CVE-2024-21464 1 Qualcomm 42 Fastconnect 6700, Fastconnect 6700 Firmware, Fastconnect 6900 and 39 more 2025-01-10 N/A 8.4 HIGH
Memory corruption while processing IPA statistics, when there are no active clients registered.
CVE-2021-45039 1 Uniview 1 Camera Firmware 2025-01-10 N/A 9.8 CRITICAL
Multiple models of the Uniview IP Camera (e.g., IPC_G6103 B6103.16.10.B25.201218, IPC_G61, IPC21, IPC23, IPC32, IPC36, IPC62, and IPC_HCMN) offer an undocumented UDP service on port 7788 that allows a remote unauthenticated attacker to overflow an internal buffer and achieve code execution. By using this buffer overflow, a remote attacker can start the telnetd service. This service has a hardcoded default username and password (root/123456). Although it has a restrictive shell, this can be easily bypassed via the built-in ECHO shell command.
CVE-2024-30962 1 Openrobotics 1 Robot Operating System 2025-01-09 N/A 7.8 HIGH
Buffer Overflow vulnerability in Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble and navigation 2-humble allows a local attacker to execute arbitrary code via the nav2_amcl process
CVE-2021-47040 1 Linux 1 Linux Kernel 2025-01-09 N/A 7.8 HIGH
In the Linux kernel, the following vulnerability has been resolved: io_uring: fix overflows checks in provide buffers Colin reported before possible overflow and sign extension problems in io_provide_buffers_prep(). As Linus pointed out previous attempt did nothing useful, see d81269fecb8ce ("io_uring: fix provide_buffers sign extension"). Do that with help of check_<op>_overflow helpers. And fix struct io_provide_buf::len type, as it doesn't make much sense to keep it signed.
CVE-2024-10106 2025-01-09 N/A 3.7 LOW
A buffer overflow vulnerability in the packet handoff plugin allows an attacker to overwrite memory outside the plugin's buffer.
CVE-2024-6350 2025-01-08 N/A 6.5 MEDIUM
A malformed 802.15.4 packet causes a buffer overflow to occur leading to an assert and a denial of service. A watchdog reset clears the error condition automatically.
CVE-2023-33457 1 Sogou 1 C\+\+ Workflow 2025-01-08 N/A 8.8 HIGH
In Sogou Workflow v0.10.6, memcpy a negtive size in URIParser::parse , may cause buffer-overflow and crash.
CVE-2024-0156 1 Dell 1 Digital Delivery 2025-01-08 N/A 7.0 HIGH
Dell Digital Delivery, versions prior to 5.2.0.0, contain a Buffer Overflow Vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to arbitrary code execution and/or privilege escalation.
CVE-2022-48439 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-01-07 N/A 4.4 MEDIUM
In cp_dump driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed.
CVE-2021-47485 1 Linux 1 Linux Kernel 2025-01-06 N/A 7.8 HIGH
In the Linux kernel, the following vulnerability has been resolved: IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields Overflowing either addrlimit or bytes_togo can allow userspace to trigger a buffer overflow of kernel memory. Check for overflows in all the places doing math on user controlled buffers.
CVE-2023-25434 1 Libtiff 1 Libtiff 2025-01-06 N/A 8.8 HIGH
libtiff 4.5.0 is vulnerable to Buffer Overflow via extractContigSamplesBytes() at /libtiff/tools/tiffcrop.c:3215.
CVE-2022-28550 1 Jhead Project 1 Jhead 2025-01-03 N/A 9.8 CRITICAL
Matthias-Wandel/jhead jhead 3.06 is vulnerable to Buffer Overflow via shellescape(), jhead.c, jhead. jhead copies strings to a stack buffer when it detects a &i or &o. However, jhead does not check the boundary of the stack buffer. As a result, there will be a stack buffer overflow problem when multiple `&i` or `&o` are given.
CVE-2023-32674 1 Hp 1 Pc Hardware Diagnostics 2025-01-03 N/A 9.8 CRITICAL
Certain versions of HP PC Hardware Diagnostics Windows are potentially vulnerable to buffer overflow.
CVE-2024-26134 2 Agronholm, Fedoraproject 2 Cbor2, Fedora 2025-01-02 N/A 7.5 HIGH
cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) (RFC 8949) serialization format. Starting in version 5.5.1 and prior to version 5.6.2, an attacker can crash a service using cbor2 to parse a CBOR binary by sending a long enough object. Version 5.6.2 contains a patch for this issue.
CVE-2023-1329 1 Hp 1914 Laserjet Managed Mfp E62665 3gy14a, Laserjet Managed Mfp E62665 3gy14a Firmware, Laserjet Managed Mfp E62665 3gy15a and 1911 more 2024-12-31 N/A 9.8 CRITICAL
A potential security vulnerability has been identified for certain HP multifunction printers (MFPs). The vulnerability may lead to Buffer Overflow and/or Remote Code Execution when running HP Workpath solutions on potentially affected products.
CVE-2022-48501 1 Huawei 1 Emui 2024-12-26 N/A 7.5 HIGH
Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability.
CVE-2024-27045 1 Linux 1 Linux Kernel 2024-12-23 N/A 7.8 HIGH
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()' Tell snprintf() to store at most 10 bytes in the output buffer instead of 30. Fixes the below: drivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm_debugfs.c:1508 dp_dsc_clock_en_read() error: snprintf() is printing too much 30 vs 10
CVE-2024-47864 2024-12-23 N/A 5.3 MEDIUM
home 5G HR02, Wi-Fi STATION SH-52B, and Wi-Fi STATION SH-54C contain a buffer overflow vulnerability in the hidden debug function. A remote unauthenticated attacker may get the web console of the product down.
CVE-2024-32664 1 Oisf 1 Suricata 2024-12-19 N/A 5.3 MEDIUM
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.5 and 6.0.19, specially crafted traffic or datasets can cause a limited buffer overflow. This vulnerability is fixed in 7.0.5 and 6.0.19. Workarounds include not use rules with `base64_decode` keyword with `bytes` option with value 1, 2 or 5 and for 7.0.x, setting `app-layer.protocols.smtp.mime.body-md5` to false.