Total
12281 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-1579 | 1 Gnu | 1 Binutils | 2025-02-13 | N/A | 7.8 HIGH |
Heap based buffer overflow in binutils-gdb/bfd/libbfd.c in bfd_getl64. | |||||
CVE-2024-36274 | 2025-02-12 | N/A | 6.5 MEDIUM | ||
Out-of-bounds write in the Intel(R) 800 Series Ethernet Driver for Intel(R) Ethernet Adapter Complete Driver Pack before versions 29.1 may allow an unauthenticated user to potentially enable denial of service via adjacent access. | |||||
CVE-2024-31858 | 2025-02-12 | N/A | 7.8 HIGH | ||
Out-of-bounds write for some Intel(R) QuickAssist Technology software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2023-25213 | 1 Tenda | 2 Ac5, Ac5 Firmware | 2025-02-12 | N/A | 9.8 CRITICAL |
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the check_param_changed function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | |||||
CVE-2023-25220 | 1 Tenda | 2 Ac5, Ac5 Firmware | 2025-02-12 | N/A | 9.8 CRITICAL |
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the add_white_node function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | |||||
CVE-2023-25219 | 1 Tenda | 2 Ac5, Ac5 Firmware | 2025-02-12 | N/A | 9.8 CRITICAL |
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the fromDhcpListClient function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | |||||
CVE-2023-25218 | 1 Tenda | 2 Ac5, Ac5 Firmware | 2025-02-12 | N/A | 9.8 CRITICAL |
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the form_fast_setting_wifi_set function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | |||||
CVE-2023-25217 | 1 Tenda | 2 Ac5, Ac5 Firmware | 2025-02-12 | N/A | 9.8 CRITICAL |
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the formWifiBasicSet function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | |||||
CVE-2023-25216 | 1 Tenda | 2 Ac5, Ac5 Firmware | 2025-02-12 | N/A | 9.8 CRITICAL |
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the formSetFirewallCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | |||||
CVE-2023-25215 | 1 Tenda | 2 Ac5, Ac5 Firmware | 2025-02-12 | N/A | 9.8 CRITICAL |
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the saveParentControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | |||||
CVE-2023-25214 | 1 Tenda | 2 Ac5, Ac5 Firmware | 2025-02-12 | N/A | 9.8 CRITICAL |
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the setSchedWifi function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | |||||
CVE-2023-27016 | 1 Tenda | 2 Ac10, Ac10 Firmware | 2025-02-12 | N/A | 9.8 CRITICAL |
Tenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the R7WebsSecurityHandler function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | |||||
CVE-2023-27015 | 1 Tenda | 2 Ac10, Ac10 Firmware | 2025-02-12 | N/A | 9.8 CRITICAL |
Tenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the sub_4A75C0 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | |||||
CVE-2023-27014 | 1 Tenda | 2 Ac10, Ac10 Firmware | 2025-02-12 | N/A | 9.8 CRITICAL |
Tenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the sub_46AC38 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | |||||
CVE-2023-27013 | 1 Tenda | 2 Ac10, Ac10 Firmware | 2025-02-12 | N/A | 9.8 CRITICAL |
Tenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the get_parentControl_list_Info function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | |||||
CVE-2023-27012 | 1 Tenda | 2 Ac10, Ac10 Firmware | 2025-02-12 | N/A | 9.8 CRITICAL |
Tenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the setSchedWifi function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | |||||
CVE-2024-24684 | 1 Libigl | 1 Libigl | 2025-02-12 | N/A | 7.8 HIGH |
Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the header parsing occuring while processing an `.off` file via the `readOFF` function. We can see above that at [0] a stack-based buffer called `comment` is defined with an hardcoded size of `1000 bytes`. The call to `fscanf` at [1] is unsafe and if the first line of the header of the `.off` files is longer than 1000 bytes it will overflow the `header` buffer. | |||||
CVE-2021-38406 | 1 Deltaww | 1 Dopsoft | 2025-02-12 | 6.8 MEDIUM | 7.8 HIGH |
Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could result in multiple out-of-bounds write instances. An attacker could leverage this vulnerability to execute code in the context of the current process. | |||||
CVE-2023-34552 | 1 Ezviz | 18 Cs-c6n-a0-1c2wfr-mul, Cs-c6n-a0-1c2wfr-mul Firmware, Cs-c6n-b0-1g2wf and 15 more | 2025-02-12 | N/A | 8.8 HIGH |
In certain EZVIZ products, two stack based buffer overflows in mulicast_parse_sadp_packet and mulicast_get_pack_type functions of the SADP multicast protocol can allow an unauthenticated attacker present on the same local network as the camera to achieve remote code execution. This affects CS-C6N-B0-1G2WF Firmware versions before V5.3.0 build 230215 and CS-C6N-R101-1G2WF Firmware versions before V5.3.0 build 230215 and CS-CV310-A0-1B2WFR Firmware versions before V5.3.0 build 230221 and CS-CV310-A0-1C2WFR-C Firmware versions before V5.3.2 build 230221 and CS-C6N-A0-1C2WFR-MUL Firmware versions before V5.3.2 build 230218 and CS-CV310-A0-3C2WFRL-1080p Firmware versions before V5.2.7 build 230302 and CS-CV310-A0-1C2WFR Wifi IP66 2.8mm 1080p Firmware versions before V5.3.2 build 230214 and CS-CV248-A0-32WMFR Firmware versions before V5.2.3 build 230217 and EZVIZ LC1C Firmware versions before V5.3.4 build 230214. | |||||
CVE-2025-0903 | 1 Pdf-xchange | 1 Pdf-xchange Editor | 2025-02-12 | N/A | 8.8 HIGH |
PDF-XChange Editor RTF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of RTF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25421. |