Export limit exceeded: 349371 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Export limit exceeded: 349371 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Search
Search Results (4493 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2012-6122 | 1 Call-cc | 1 Chicken | 2024-11-21 | 7.5 High |
| Buffer overflow in the thread scheduler in Chicken before 4.8.0.1 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value. | ||||
| CVE-2012-3407 | 1 Plow Project | 1 Plow | 2024-11-21 | 7.8 High |
| plow has local buffer overflow vulnerability | ||||
| CVE-2011-1145 | 4 Debian, Opensuse, Redhat and 1 more | 4 Debian Linux, Opensuse, Enterprise Linux and 1 more | 2024-11-21 | 7.8 High |
| The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string. | ||||
| CVE-2010-5333 | 2 Integard Home Project, Integard Pro Project | 2 Integard Home, Integard Pro | 2024-11-21 | 9.8 Critical |
| The web server in Integard Pro and Home before 2.0.0.9037 and 2.2.x before 2.2.0.9037 has a buffer overflow via a long password in an administration login POST request, leading to arbitrary code execution. An SEH-overwrite buffer overflow already existed for the vulnerable software. This CVE is to track an alternate exploitation method, utilizing an EIP-overwrite buffer overflow. | ||||
| CVE-2010-5331 | 1 Linux | 1 Linux Kernel | 2024-11-21 | 7.8 High |
| In the Linux kernel before 2.6.34, a range check issue in drivers/gpu/drm/radeon/atombios.c could cause an off by one (buffer overflow) problem. NOTE: At least one Linux maintainer believes that this CVE is incorrectly assigned and should be rejected because the value is hard coded and are not user-controllable where it is used | ||||
| CVE-2010-3844 | 2 Debian, Ettercap-project | 2 Debian Linux, Ettercap | 2024-11-21 | 8.8 High |
| An unchecked sscanf() call in ettercap before 0.7.5 allows an insecure temporary settings file to overflow a static-sized buffer on the stack. | ||||
| CVE-2009-5041 | 1 Debian | 1 Overkill | 2024-11-21 | 9.8 Critical |
| overkill has buffer overflow via long player names that can corrupt data on the server machine | ||||
| CVE-2009-4067 | 2 Linux, Redhat | 2 Linux Kernel, Enterprise Linux | 2024-11-21 | 6.8 Medium |
| Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux kernel before 2.6.27 allows physically proximate attackers to execute arbitrary code, cause a denial of service via a crafted USB device, or take full control of the system. | ||||
| CVE-2009-0948 | 1 Apple | 1 Files | 2024-11-21 | 9.8 Critical |
| Multiple buffer overflows in the (1) cdf_read_sat, (2) cdf_read_long_sector_chain, and (3) cdf_read_ssat function in file before 5.02. | ||||
| CVE-2006-3100 | 1 Termpkg Project | 1 Termpkg | 2024-11-21 | 9.8 Critical |
| termpkg 3.3 suffers from buffer overflow. | ||||
| CVE-2005-3590 | 1 Gnu | 1 Glibc | 2024-11-21 | N/A |
| The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory. | ||||
| CVE-2024-52714 | 1 Tenda | 3 Ac6, Ac6 Firmware, Ac6v2.0 Firmware | 2024-11-20 | 8.1 High |
| Tenda AC6 v2.0 v15.03.06.50 was discovered to contain a buffer overflow in the function 'fromSetSysTime. | ||||
| CVE-2024-38409 | 1 Qualcomm | 51 Fastconnect 6700, Fastconnect 6700 Firmware, Fastconnect 6900 and 48 more | 2024-11-16 | 7.8 High |
| Memory corruption while station LL statistic handling. | ||||
| CVE-2024-8882 | 1 Zyxel | 20 Gs1900-10hp, Gs1900-10hp Firmware, Gs1900-16 and 17 more | 2024-11-14 | 4.5 Medium |
| A buffer overflow vulnerability in the CGI program in the Zyxel GS1900-48 switch firmware version V2.80(AAHN.1)C0 and earlier could allow an authenticated, LAN-based attacker with administrator privileges to cause denial of service (DoS) conditions via a crafted URL. | ||||
| CVE-2024-46952 | 3 Artifex, Debian, Redhat | 3 Ghostscript, Debian Linux, Enterprise Linux | 2024-11-14 | 8.4 High |
| An issue was discovered in pdf/pdf_xref.c in Artifex Ghostscript before 10.04.0. There is a buffer overflow during handling of a PDF XRef stream (related to W array values). | ||||
| CVE-2024-33030 | 1 Qualcomm | 44 Ar8035, Ar8035 Firmware, Fastconnect 6900 and 41 more | 2024-11-08 | 6.7 Medium |
| Memory corruption while parsing IPC frequency table parameters for LPLH that has size greater than expected size. | ||||
| CVE-2024-38423 | 1 Qualcomm | 416 205 Mobile Platform, 205 Mobile Platform Firmware, 215 Mobile Platform and 413 more | 2024-11-07 | 7.8 High |
| Memory corruption while processing GPU page table switch. | ||||
| CVE-2024-10371 | 2 Razormist, Sourcecodester | 2 Payroll Management System, Payroll Management System | 2024-10-30 | 6.3 Medium |
| A vulnerability classified as critical has been found in SourceCodester Payroll Management System 1.0. This affects the function login of the file main. The manipulation leads to buffer overflow. The exploit has been disclosed to the public and may be used. | ||||
| CVE-2024-21274 | 1 Oracle | 1 Weblogic Server | 2024-10-18 | 7.5 High |
| Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). | ||||
| CVE-2024-23375 | 1 Qualcomm | 28 Sa4150p, Sa4150p Firmware, Sa4155p and 25 more | 2024-10-16 | 6.7 Medium |
| Memory corruption during the network scan request. | ||||