Vulnerabilities (CVE)

Filtered by CWE-119
Total 11900 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2013-4532 3 Canonical, Debian, Qemu 3 Ubuntu Linux, Debian Linux, Qemu 2024-11-21 4.6 MEDIUM 7.8 HIGH
Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.
CVE-2013-3947 1 Ahnlab 1 V3 Internet Security 2024-11-21 7.2 HIGH 7.8 HIGH
Buffer overflow in MedCoreD.sys in AhnLab V3 Internet Security 8.0.7.5 (Build 1373) allows local users to gain privileges via a crafted 0xA3350014 IOCTL call.
CVE-2013-3553 1 Nitropdf 2 Nitro Pro, Nitro Reader 2024-11-21 9.3 HIGH 7.8 HIGH
Nitro Pro 7.5.0.22 and earlier and Nitro Reader 2.5.0.36 and earlier allow remote attackers to execute arbitrary code via a crafted PDF file.
CVE-2013-3552 1 Nitropdf 2 Nitro Pro, Nitro Reader 2024-11-21 9.3 HIGH 7.8 HIGH
Nitro Pro 7.5.0.29 and earlier and Nitro Reader 2.5.0.45 and earlier allow remote attackers to execute arbitrary code via a crafted PDF file.
CVE-2013-2739 2 Debian, Readymedia Project 2 Debian Linux, Readymedia 2024-11-21 7.5 HIGH 9.8 CRITICAL
MiniDLNA has heap-based buffer overflow
CVE-2012-6712 1 Linux 1 Linux Kernel 2024-11-21 7.5 HIGH 9.8 CRITICAL
In the Linux kernel before 3.4, a buffer overflow occurs in drivers/net/wireless/iwlwifi/iwl-agn-sta.c, which will cause at least memory corruption.
CVE-2012-6711 2 Gnu, Redhat 2 Bash, Enterprise Linux 2024-11-21 4.6 MEDIUM 7.0 HIGH
A heap-based buffer overflow exists in GNU Bash before 4.3 when wide characters, not supported by the current locale set in the LC_CTYPE environment variable, are printed through the echo built-in function. A local attacker, who can provide data to print through the "echo -e" built-in function, may use this flaw to crash a script or execute code with the privileges of the bash process. This occurs because ansicstr() in lib/sh/strtrans.c mishandles u32cconv().
CVE-2012-4750 1 Ezhometech 1 Ezserver 2024-11-21 7.5 HIGH 9.8 CRITICAL
A Code Execution vulnerability exists in the memcpy function when processing AMF requests in Ezhometech EzServer 7.0, which could let a remote malicious user execute arbitrary code or cause a Denial of Service
CVE-2012-0771 1 Adobe 1 Shockwave Player 2024-11-21 9.3 HIGH 8.8 HIGH
Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0759.
CVE-2011-5327 1 Linux 1 Linux Kernel 2024-11-21 7.5 HIGH 9.8 CRITICAL
In the Linux kernel before 3.1, an off by one in the drivers/target/loopback/tcm_loop.c tcm_loop_make_naa_tpg() function could result in at least memory corruption.
CVE-2010-5332 1 Linux 1 Linux Kernel 2024-11-21 4.6 MEDIUM 5.6 MEDIUM
In the Linux kernel before 2.6.37, an out of bounds array access happened in drivers/net/mlx4/port.c. When searching for a free entry in either mlx4_register_vlan() or mlx4_register_mac(), and there is no free entry, the loop terminates without updating the local variable free thus causing out of array bounds access.
CVE-2010-0749 3 Debian, Linux, Transmissionbt 3 Debian Linux, Linux Kernel, Transmission 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Transmission before 1.92 allows attackers to prevent download of a file by corrupted data during the endgame.
CVE-2010-0109 1 Symantec 1 Altiris Deployment Solution 2024-11-21 3.3 LOW 6.5 MEDIUM
DBManager in Symantec Altiris Deployment Solution 6.9.x before DS 6.9 SP4 allows remote attackers to cause a denial of service via a crafted request.
CVE-2009-5153 1 Microfocus 1 Netware 2024-11-21 7.5 HIGH 9.8 CRITICAL
In Novell NetWare before 6.5 SP8, a stack buffer overflow in processing of CALLIT RPC calls in the NFS Portmapper daemon in PKERNEL.NLM allowed remote unauthenticated attackers to execute code, because a length field was incorrectly trusted.
CVE-2007-6762 1 Linux 1 Linux Kernel 2024-11-21 7.5 HIGH 9.8 CRITICAL
In the Linux kernel before 2.6.20, there is an off-by-one bug in net/netlabel/netlabel_cipso_v4.c where it is possible to overflow the doi_def->tags[] array.
CVE-2005-3590 1 Gnu 1 Glibc 2024-11-21 7.5 HIGH 9.8 CRITICAL
The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.
CVE-2024-11248 1 Tenda 2 Ac10, Ac10 Firmware 2024-11-19 9.0 HIGH 8.8 HIGH
A vulnerability was found in Tenda AC10 16.03.10.13 and classified as critical. Affected by this issue is the function formSetRebootTimer of the file /goform/SetSysAutoRebbotCfg. The manipulation of the argument rebootTime leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-11237 1 Tp-link 2 Vn020-f3v\(t\), Vn020-f3v\(t\) Firmware 2024-11-19 7.8 HIGH 9.8 CRITICAL
A vulnerability, which was classified as critical, has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected by this issue is some unknown functionality of the component DHCP DISCOVER Packet Parser. The manipulation of the argument hostname leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-11056 1 Tenda 2 Ac10, Ac10 Firmware 2024-11-14 9.0 HIGH 8.8 HIGH
A vulnerability, which was classified as critical, was found in Tenda AC10 16.03.10.13. Affected is the function FUN_0046AC38 of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-11061 1 Tenda 2 Ac10, Ac10 Firmware 2024-11-13 9.0 HIGH 8.8 HIGH
A vulnerability classified as critical was found in Tenda AC10 16.03.10.13. Affected by this vulnerability is the function FUN_0044db3c of the file /goform/fast_setting_wifi_set. The manipulation of the argument timeZone leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.