Vulnerabilities (CVE)

Filtered by CWE-787
Total 13373 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-50711 1 Rust-vmm 1 Vmm-sys-util 2024-11-21 N/A 5.7 MEDIUM
vmm-sys-util is a collection of modules that provides helpers and utilities used by multiple rust-vmm components. Starting in version 0.5.0 and prior to version 0.12.0, an issue in the `FamStructWrapper::deserialize` implementation provided by the crate for `vmm_sys_util::fam::FamStructWrapper` can lead to out of bounds memory accesses. The deserialization does not check that the length stored in the header matches the flexible array length. Mismatch in the lengths might allow out of bounds memory access through Rust-safe methods. The issue was corrected in version 0.12.0 by inserting a check that verifies the lengths of compared flexible arrays are equal for any deserialized header and aborting deserialization otherwise. Moreover, the API was changed so that header length can only be modified through Rust-unsafe code. This ensures that users cannot trigger out-of-bounds memory access from Rust-safe code.
CVE-2023-50268 1 Jqlang 1 Jq 2024-11-21 N/A 6.2 MEDIUM
jq is a command-line JSON processor. Version 1.7 is vulnerable to stack-based buffer overflow in builds using decNumber. Version 1.7.1 contains a patch for this issue.
CVE-2023-50002 1 Tenda 2 W30e, W30e Firmware 2024-11-21 N/A 9.8 CRITICAL
Tenda W30E V16.01.0.12(4843) was discovered to contain a stack overflow via the function formRebootMeshNode.
CVE-2023-50001 1 Tenda 2 W30e, W30e Firmware 2024-11-21 N/A 9.8 CRITICAL
Tenda W30E V16.01.0.12(4843) was discovered to contain a stack overflow via the function formUpgradeMeshOnline.
CVE-2023-50000 1 Tenda 2 W30e, W30e Firmware 2024-11-21 N/A 9.8 CRITICAL
Tenda W30E V16.01.0.12(4843) was discovered to contain a stack overflow via the function formResetMeshNode.
CVE-2023-4949 2 Gnu, Xen 2 Grub, Xen 2024-11-21 N/A 8.1 HIGH
An attacker with local access to a system (either through a disk or external drive) can present a modified XFS partition to grub-legacy in such a way to exploit a memory corruption in grub’s XFS file system implementation.
CVE-2023-4756 1 Gpac 1 Gpac 2024-11-21 N/A 5.5 MEDIUM
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV.
CVE-2023-4754 1 Gpac 1 Gpac 2024-11-21 N/A 5.5 MEDIUM
Out-of-bounds Write in GitHub repository gpac/gpac prior to 2.3-DEV.
CVE-2023-4751 2 Apple, Vim 2 Macos, Vim 2024-11-21 N/A 7.8 HIGH
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1331.
CVE-2023-4744 1 Tenda 2 Ac8, Ac8 Firmware 2024-11-21 10.0 HIGH 9.8 CRITICAL
A vulnerability was found in Tenda AC8 16.03.34.06_cn_TDC01. It has been declared as critical. Affected by this vulnerability is the function formSetDeviceName. The manipulation leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-238633 was assigned to this vulnerability.
CVE-2023-4735 2 Apple, Vim 2 Macos, Vim 2024-11-21 N/A 7.8 HIGH
Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1847.
CVE-2023-4685 1 Deltaww 2 Cncsoft-b, Dopsoft 2024-11-21 N/A 7.8 HIGH
Delta Electronics' CNCSoft-B version 1.0.0.4 and DOPSoft versions 4.0.0.82 and prior are vulnerable to stack-based buffer overflow, which could allow an attacker to execute arbitrary code.
CVE-2023-4601 2 Microsoft, Ni 2 Windows, System Configuration 2024-11-21 N/A 8.1 HIGH
A stack-based buffer overflow vulnerability exists in NI System Configuration that could result in information disclosure and/or arbitrary code execution. Successful exploitation requires that an attacker can provide a specially crafted response. This affects NI System Configuration 2023 Q3 and all previous versions.
CVE-2023-4585 1 Mozilla 3 Firefox, Firefox Esr, Thunderbird 2024-11-21 N/A 8.8 HIGH
Memory safety bugs present in Firefox 116, Firefox ESR 115.1, and Thunderbird 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.
CVE-2023-4584 1 Mozilla 3 Firefox, Firefox Esr, Thunderbird 2024-11-21 N/A 8.8 HIGH
Memory safety bugs present in Firefox 116, Firefox ESR 102.14, Firefox ESR 115.1, Thunderbird 102.14, and Thunderbird 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 117, Firefox ESR < 102.15, Firefox ESR < 115.2, Thunderbird < 102.15, and Thunderbird < 115.2.
CVE-2023-4362 2 Debian, Google 2 Debian Linux, Chrome 2024-11-21 N/A 8.8 HIGH
Heap buffer overflow in Mojom IDL in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process and gained control of a WebUI process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
CVE-2023-4353 3 Debian, Fedoraproject, Google 3 Debian Linux, Fedora, Chrome 2024-11-21 N/A 8.8 HIGH
Heap buffer overflow in ANGLE in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2023-4322 2 Fedoraproject, Radare 2 Fedora, Radare2 2024-11-21 N/A 9.8 CRITICAL
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0.
CVE-2023-4280 1 Silabs 1 Gecko Software Development Kit 2024-11-21 N/A 9.3 CRITICAL
An unvalidated input in Silicon Labs TrustZone implementation in v4.3.x and earlier of the Gecko SDK allows an attacker to access the trusted region of memory from the untrusted region.
CVE-2023-4273 5 Debian, Fedoraproject, Linux and 2 more 12 Debian Linux, Fedora, Linux Kernel and 9 more 2024-11-21 N/A 6.0 MEDIUM
A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.