Vulnerabilities (CVE)

Filtered by CWE-787
Total 11880 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-38207 1 Microsoft 1 Edge Chromium 2024-09-19 N/A 6.3 MEDIUM
Microsoft Edge (HTML-based) Memory Corruption Vulnerability
CVE-2024-46688 1 Linux 1 Linux Kernel 2024-09-19 N/A 5.5 MEDIUM
In the Linux kernel, the following vulnerability has been resolved: erofs: fix out-of-bound access when z_erofs_gbuf_growsize() partially fails If z_erofs_gbuf_growsize() partially fails on a global buffer due to memory allocation failure or fault injection (as reported by syzbot [1]), new pages need to be freed by comparing to the existing pages to avoid memory leaks. However, the old gbuf->pages[] array may not be large enough, which can lead to null-ptr-deref or out-of-bound access. Fix this by checking against gbuf->nrpages in advance. [1] https://lore.kernel.org/r/000000000000f7b96e062018c6e3@google.com
CVE-2024-5931 1 Zephyrproject 1 Zephyr 2024-09-19 N/A 6.5 MEDIUM
BT: Unchecked user input in bap_broadcast_assistant
CVE-2024-6259 1 Zephyrproject 1 Zephyr 2024-09-19 N/A 6.5 MEDIUM
BT: HCI: adv_ext_report Improper discarding in adv_ext_report
CVE-2024-6137 1 Zephyrproject 1 Zephyr 2024-09-19 N/A 6.5 MEDIUM
BT: Classic: SDP OOB access in get_att_search_list
CVE-2024-45181 2 Microsoft, Wibu 2 Windows, Wibukey 2024-09-18 N/A 7.8 HIGH
An issue was discovered in WibuKey64.sys in WIBU-SYSTEMS WibuKey before v6.70 and fixed in v.6.70. An improper bounds check allows crafted packets to cause an arbitrary address write, resulting in kernel memory corruption.
CVE-2024-39378 3 Adobe, Apple, Microsoft 3 Audition, Mac Os X, Windows 2024-09-18 N/A 7.8 HIGH
Audition versions 24.4.1, 23.6.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-0110 1 Nvidia 1 Cuda Toolkit 2024-09-18 N/A 7.8 HIGH
NVIDIA CUDA Toolkit contains a vulnerability in command `cuobjdump` where a user may cause an out-of-bound write by passing in a malformed ELF file. A successful exploit of this vulnerability may lead to code execution or denial of service.
CVE-2024-44093 1 Google 1 Android 2024-09-18 N/A 7.8 HIGH
In ppmp_unprotect_buf of drm/code/drm_fw.c, there is a possible memory corruption due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-44094 1 Google 1 Android 2024-09-18 N/A 7.8 HIGH
In ppmp_protect_mfcfw_buf of code/drm_fw.c, there is a possible memory corruption due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-7965 2 Google, Microsoft 2 Chrome, Edge Chromium 2024-09-18 N/A 8.8 HIGH
Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-45695 1 Dlink 2 Dir-x4860, Dir-x4860 Firmware 2024-09-17 N/A 9.8 CRITICAL
The web service of certain models of D-Link wireless routers contains a Stack-based Buffer Overflow vulnerability, which allows unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device.
CVE-2023-22351 2024-09-16 N/A 6.1 MEDIUM
Out-of-bounds write in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2024-39384 3 Adobe, Apple, Microsoft 3 Premiere Pro, Macos, Windows 2024-09-16 N/A 7.8 HIGH
Premiere Pro versions 24.5, 23.6.8 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-39377 3 Adobe, Apple, Microsoft 3 Media Encoder, Macos, Windows 2024-09-16 N/A 7.8 HIGH
Media Encoder versions 24.5, 23.6.8 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-43760 3 Adobe, Apple, Microsoft 3 Photoshop, Macos, Windows 2024-09-13 N/A 7.8 HIGH
Photoshop Desktop versions 24.7.4, 25.11 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-45108 3 Adobe, Apple, Microsoft 3 Photoshop, Macos, Windows 2024-09-13 N/A 7.8 HIGH
Photoshop Desktop versions 24.7.4, 25.11 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-45109 3 Adobe, Apple, Microsoft 3 Photoshop, Macos, Windows 2024-09-13 N/A 7.8 HIGH
Photoshop Desktop versions 24.7.4, 25.11 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-39381 3 Adobe, Apple, Microsoft 3 After Effects, Macos, Windows 2024-09-13 N/A 7.8 HIGH
After Effects versions 23.6.6, 24.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-41859 3 Adobe, Apple, Microsoft 3 After Effects, Macos, Windows 2024-09-13 N/A 7.8 HIGH
After Effects versions 23.6.6, 24.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.