Vulnerabilities (CVE)

Filtered by CWE-120
Total 2995 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-28759 2025-03-28 N/A 4.3 MEDIUM
A crafted network packet may cause a buffer overrun in Wind River VxWorks 7 through 23.09.
CVE-2023-24169 1 Tenda 2 Ac18, Ac18 Firmware 2025-03-28 N/A 9.8 CRITICAL
Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/FUN_0007343c.
CVE-2024-28564 1 Freeimage Project 1 Freeimage 2025-03-28 N/A 6.2 MEDIUM
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to cause a denial of service (DoS) via the Imf_2_2::CharPtrIO::readChars() function when reading images in EXR format.
CVE-2024-28565 1 Freeimage Project 1 Freeimage 2025-03-28 N/A 5.5 MEDIUM
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to cause a denial of service (DoS) via the psdParser::ReadImageData() function when reading images in PSD format.
CVE-2024-28569 1 Freeimage Project 1 Freeimage 2025-03-28 N/A 7.8 HIGH
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to execute arbitrary code via the Imf_2_2::Xdr::read() function when reading images in EXR format.
CVE-2024-28570 1 Freeimage Project 1 Freeimage 2025-03-28 N/A 5.5 MEDIUM
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to cause a denial of service (DoS) via the processMakerNote() function when reading images in JPEG format.
CVE-2024-28576 1 Freeimage Project 1 Freeimage 2025-03-28 N/A 5.5 MEDIUM
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to cause a denial of service (DoS) via the opj_j2k_tcp_destroy() function when reading images in J2K format.
CVE-2024-28583 1 Freeimage Project 1 Freeimage 2025-03-28 N/A 7.8 HIGH
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to execute arbitrary code via the readLine() function when reading images in XPM format.
CVE-2022-47035 1 Dlink 2 Dir-825, Dir-825 Firmware 2025-03-27 N/A 9.8 CRITICAL
Buffer Overflow Vulnerability in D-Link DIR-825 v1.33.0.44ebdd4-embedded and below allows attacker to execute arbitrary code via the GetConfig method to the /CPE endpoint.
CVE-2021-45429 1 Virustotal 1 Yara 2025-03-27 4.3 MEDIUM 5.5 MEDIUM
A Buffer Overflow vulnerablity exists in VirusTotal YARA git commit: 605b2edf07ed8eb9a2c61ba22eb2e7c362f47ba7 via yr_set_configuration in yara/libyara/libyara.c, which could cause a Denial of Service.
CVE-2023-42757 2025-03-26 N/A 4.2 MEDIUM
Process Explorer before 17.04 allows attackers to make it functionally unavailable (a denial of service for analysis) by renaming an executable file to a new extensionless 255-character name and launching it with NtCreateUserProcess. This can occur through an issue in wcscat_s error handling.
CVE-2021-37311 1 Fcitx 5 Project 1 Fcitx 5 2025-03-26 N/A 7.5 HIGH
Buffer Overflow vulnerability in fcitx5 5.0.8 allows attackers to cause a denial of service via crafted message to the application's listening port.
CVE-2024-28639 1 Totolink 4 A7000r, A7000r Firmware, X5000r and 1 more 2025-03-26 N/A 9.8 CRITICAL
Buffer Overflow vulnerability in TOTOLink X5000R V9.1.0u.6118-B20201102 and A7000R V9.1.0u.6115-B20201022, allow remote attackers to execute arbitrary code and cause a denial of service (DoS) via the IP field.
CVE-2024-46431 1 Tenda 2 W18e, W18e Firmware 2025-03-25 N/A 8.0 HIGH
Tenda W18E V16.01.0.8(1625) is vulnerable to Buffer Overflow. An attacker with access to the web management portal can exploit this vulnerability by sending specially crafted data to the delWewifiPic function.
CVE-2022-42444 3 Ibm, Linux, Microsoft 4 Aix, App Connect Enterprise, Linux Kernel and 1 more 2025-03-25 N/A 4.9 MEDIUM
IBM App Connect Enterprise 11.0.0.8 through 11.0.0.19 and 12.0.1.0 through 12.0.5.0 is vulnerable to a buffer overflow. A remote privileged user could overflow a buffer and cause the application to crash. IBM X-Force ID: 238538.
CVE-2024-30620 1 Tenda 2 Ax1803, Ax1803 Firmware 2025-03-25 N/A 9.8 CRITICAL
Tenda AX1803 v1.0.0.1 contains a stack overflow via the serviceName parameter in the function fromAdvSetMacMtuWan.
CVE-2024-40724 1 Assimp 1 Assimp 2025-03-25 N/A 7.8 HIGH
Heap-based buffer overflow vulnerability in Assimp versions prior to 5.4.2 allows a local attacker to execute arbitrary code by inputting a specially crafted file into the product.
CVE-2024-24418 1 Linuxfoundation 1 Magma 2025-03-24 N/A 7.5 HIGH
The Linux Foundation Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) was discovered to contain a buffer overflow in the decode_pdn_address function at /nas/ies/PdnAddress.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet.
CVE-2024-56557 1 Linux 1 Linux Kernel 2025-03-24 N/A 5.5 MEDIUM
In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer The AD7923 was updated to support devices with 8 channels, but the size of tx_buf and ring_xfer was not increased accordingly, leading to a potential buffer overflow in ad7923_update_scan_mode().
CVE-2024-53192 1 Linux 1 Linux Kernel 2025-03-24 N/A 5.5 MEDIUM
In the Linux kernel, the following vulnerability has been resolved: clk: clk-loongson2: Fix potential buffer overflow in flexible-array member access Flexible-array member `hws` in `struct clk_hw_onecell_data` is annotated with the `counted_by()` attribute. This means that when memory is allocated for this array, the _counter_, which in this case is member `num` in the flexible structure, should be set to the maximum number of elements the flexible array can contain, or fewer. In this case, the total number of elements for the flexible array is determined by variable `clks_num` when allocating heap space via `devm_kzalloc()`, as shown below: 289 struct loongson2_clk_provider *clp; ... 296 for (p = data; p->name; p++) 297 clks_num++; 298 299 clp = devm_kzalloc(dev, struct_size(clp, clk_data.hws, clks_num), 300 GFP_KERNEL); So, `clp->clk_data.num` should be set to `clks_num` or less, and not exceed `clks_num`, as is currently the case. Otherwise, if data is written into `clp->clk_data.hws[clks_num]`, the instrumentation provided by the compiler won't detect the overflow, leading to a memory corruption bug at runtime. Fix this issue by setting `clp->clk_data.num` to `clks_num`.