Vulnerabilities (CVE)

Filtered by CWE-787
Total 13364 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-34970 1 Arm 2 Mali Gpu Kernel Driver, Valhall Gpu Kernel Driver 2025-03-07 N/A 4.7 MEDIUM
A local non-privileged user can make improper GPU processing operations to access a limited amount outside of buffer bounds or to exploit a software race condition. If the system’s memory is carefully prepared by the user, then this in turn could give them access to already freed memory
CVE-2023-24117 1 Heimgardtechnologies 2 Eagle 1200ac, Eagle 1200ac Firmware 2025-03-07 N/A 6.5 MEDIUM
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepauth_5g parameter at /goform/WifiBasicSet.
CVE-2022-47665 1 Struktur 1 Libde265 2025-03-07 N/A 7.8 HIGH
Libde265 1.0.9 has a heap buffer overflow vulnerability in de265_image::set_SliceAddrRS(int, int, int)
CVE-2024-30282 3 Adobe, Apple, Microsoft 3 Animate, Macos, Windows 2025-03-07 N/A 7.8 HIGH
Animate versions 24.0.2, 23.0.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-34773 1 Siemens 1 Solid Edge Se2024 2025-03-07 N/A 7.8 HIGH
A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 2). The affected applications contain a stack overflow vulnerability while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
CVE-2024-34771 1 Siemens 1 Solid Edge Se2024 2025-03-07 N/A 7.8 HIGH
A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 2). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
CVE-2024-33489 1 Siemens 1 Solid Edge Se2024 2025-03-07 N/A 7.8 HIGH
A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 5). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
CVE-2024-53030 1 Qualcomm 88 Msm8996au, Msm8996au Firmware, Qam8255p and 85 more 2025-03-07 N/A 7.8 HIGH
Memory corruption while processing input message passed from FE driver.
CVE-2024-53031 1 Qualcomm 52 Qam8255p, Qam8255p Firmware, Qam8295p and 49 more 2025-03-07 N/A 7.8 HIGH
Memory corruption while reading a type value from a buffer controlled by the Guest Virtual Machine.
CVE-2024-25578 1 Microdicom 1 Dicom Viewer 2025-03-06 N/A 7.8 HIGH
MicroDicom DICOM Viewer versions 2023.3 (Build 9342) and prior contain a lack of proper validation of user-supplied data, which could result in memory corruption within the application.
CVE-2024-22100 1 Microdicom 1 Dicom Viewer 2025-03-06 N/A 7.8 HIGH
MicroDicom DICOM Viewer versions 2023.3 (Build 9342) and prior are affected by a heap-based buffer overflow vulnerability, which could allow an attacker to execute arbitrary code on affected installations of DICOM Viewer. A user must open a malicious DCM file in order to exploit the vulnerability.
CVE-2024-1941 1 Deltaww 1 Cncsoft-b 2025-03-06 N/A 7.8 HIGH
Delta Electronics CNCSoft-B versions 1.0.0.4 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.
CVE-2024-53029 1 Qualcomm 52 Qam8255p, Qam8255p Firmware, Qam8295p and 49 more 2025-03-06 N/A 7.8 HIGH
Memory corruption while reading a value from a buffer controlled by the Guest Virtual Machine.
CVE-2025-22835 1 Openatom 1 Openharmony 2025-03-06 N/A 3.8 LOW
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
CVE-2024-53022 1 Qualcomm 46 Qam8255p, Qam8255p Firmware, Qam8295p and 43 more 2025-03-06 N/A 7.8 HIGH
Memory corruption may occur during communication between primary and guest VM.
CVE-2023-20626 2 Google, Mediatek 27 Android, Mt6739, Mt6761 and 24 more 2025-03-06 N/A 6.7 MEDIUM
In msdc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07405223; Issue ID: ALPS07405223.
CVE-2024-53012 1 Qualcomm 52 Qam8255p, Qam8255p Firmware, Qam8295p and 49 more 2025-03-06 N/A 7.8 HIGH
Memory corruption may occur due to improper input validation in clock device.
CVE-2024-4020 1 Tenda 2 Fh1206, Fh1206 Firmware 2025-03-06 9.0 HIGH 8.8 HIGH
A vulnerability was found in Tenda FH1206 1.2.0.8(8155) and classified as critical. This issue affects the function fromAddressNat of the file /goform/addressNat. The manipulation of the argument entrys leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-261671. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-3874 1 Tenda 2 W20e, W20e Firmware 2025-03-06 9.0 HIGH 8.8 HIGH
A vulnerability was found in Tenda W20E 15.11.0.6. It has been declared as critical. This vulnerability affects the function formSetRemoteWebManage of the file /goform/SetRemoteWebManage. The manipulation of the argument remoteIP leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-260908. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-4236 1 Tenda 2 Ax1803, Ax1803 Firmware 2025-03-06 9.0 HIGH 8.8 HIGH
A vulnerability, which was classified as critical, has been found in Tenda AX1803 1.0.0.1. This issue affects the function formSetSysToolDDNS of the file /goform/SetDDNSCfg. The manipulation of the argument serverName/ddnsUser/ddnsPwd/ddnsDomain leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-262127. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.