Total
10481 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-27146 | 1 Gpac | 1 Gpac | 2023-05-05 | 4.3 MEDIUM | 5.5 MEDIUM |
GPAC mp4box 1.1.0-DEV-rev1759-geb2d1e6dd-has a heap-buffer-overflow vulnerability in function gf_isom_apple_enum_tag. | |||||
CVE-2021-32271 | 1 Gpac | 1 Gpac | 2023-05-05 | 6.8 MEDIUM | 7.8 HIGH |
An issue was discovered in gpac through 20200801. A stack-buffer-overflow exists in the function DumpRawUIConfig located in odf_dump.c. It allows an attacker to cause code Execution. | |||||
CVE-2022-43040 | 1 Gpac | 1 Gpac | 2023-05-05 | N/A | 7.8 HIGH |
GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a heap buffer overflow via the function gf_isom_box_dump_start_ex at /isomedia/box_funcs.c. | |||||
CVE-2023-20872 | 2 Apple, Vmware | 3 Mac Os X, Fusion, Workstation | 2023-05-04 | N/A | 8.8 HIGH |
VMware Workstation and Fusion contain an out-of-bounds read/write vulnerability in SCSI CD/DVD device emulation. | |||||
CVE-2023-20869 | 1 Vmware | 2 Fusion, Workstation | 2023-05-04 | N/A | 8.2 HIGH |
VMware Workstation (17.x) and VMware Fusion (13.x) contain a stack-based buffer-overflow vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine. | |||||
CVE-2023-30414 | 1 Jerryscript | 1 Jerryscript | 2023-05-04 | N/A | 5.5 MEDIUM |
Jerryscript commit 1a2c047 was discovered to contain a stack overflow via the component vm_loop at /jerry-core/vm/vm.c. | |||||
CVE-2023-30410 | 1 Jerryscript | 1 Jerryscript | 2023-05-04 | N/A | 5.5 MEDIUM |
Jerryscript commit 1a2c047 was discovered to contain a stack overflow via the component ecma_op_function_construct at /operations/ecma-function-object.c. | |||||
CVE-2023-30770 | 1 Asustor | 1 Adm | 2023-05-04 | N/A | 9.8 CRITICAL |
A stack-based buffer overflow vulnerability was found in the ASUSTOR Data Master (ADM) due to the lack of data size validation. An attacker can exploit this vulnerability to execute arbitrary code. Affected ADM versions include: 4.0.6.REG2, 4.1.0 and below as well as 4.2.0.RE71 and below. | |||||
CVE-2023-24823 | 1 Riot-os | 1 Riot | 2023-05-03 | N/A | 9.8 CRITICAL |
RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in a type confusion between IPv6 extension headers and a UDP header. This occurs while encoding a 6LoWPAN IPHC header. The type confusion manifests in an out of bounds write in the packet buffer. The overflow can be used to corrupt other packets and the allocator metadata. Corrupting a pointer will easily lead to denial of service. While carefully manipulating the allocator metadata gives an attacker the possibility to write data to arbitrary locations and thus execute arbitrary code. Version 2022.10 fixes this issue. As a workaround, apply the patches manually. | |||||
CVE-2023-24821 | 1 Riot-os | 1 Riot | 2023-05-03 | N/A | 7.5 HIGH |
RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in a large out of bounds write beyond the packet buffer. The write will create a hard fault exception after reaching the last page of RAM. The hard fault is not handled and the system will be stuck until reset, thus the impact is denial of service. Version 2022.10 fixes this issue. As a workaround, disable support for fragmented IP datagrams or apply the patches manually. | |||||
CVE-2023-24820 | 1 Riot-os | 1 Riot | 2023-05-03 | N/A | 7.5 HIGH |
RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. An attacker can send a crafted frame to the device resulting in a large out of bounds write beyond the packet buffer. The write will create a hard fault exception after reaching the last page of RAM. The hard fault is not handled and the system will be stuck until reset. Thus the impact is denial of service. Version 2022.10 fixes this issue. As a workaround, apply the patch manually. | |||||
CVE-2023-24819 | 1 Riot-os | 1 Riot | 2023-05-03 | N/A | 9.8 CRITICAL |
RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in an out of bounds write in the packet buffer. The overflow can be used to corrupt other packets and the allocator metadata. Corrupting a pointer will easily lead to denial of service. While carefully manipulating the allocator metadata gives an attacker the possibility to write data to arbitrary locations and thus execute arbitrary code. Version 2022.10 fixes this issue. As a workaround, disable support for fragmented IP datagrams or apply the patches manually. | |||||
CVE-2023-2194 | 3 Fedoraproject, Linux, Redhat | 3 Fedora, Linux Kernel, Enterprise Linux | 2023-05-03 | N/A | 6.7 MEDIUM |
An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace "data->block[0]" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution. | |||||
CVE-2022-36280 | 2 Debian, Linux | 2 Debian Linux, Linux Kernel | 2023-05-03 | N/A | 5.5 MEDIUM |
An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS). | |||||
CVE-2023-29578 | 1 Mp4v2 Project | 1 Mp4v2 | 2023-05-03 | N/A | 8.8 HIGH |
mp4v2 v2.0.0 was discovered to contain a heap buffer overflow via the mp4v2::impl::MP4StringProperty::~MP4StringProperty() function at src/mp4property.cpp. | |||||
CVE-2022-3520 | 1 Vim | 1 Vim | 2023-05-03 | N/A | 9.8 CRITICAL |
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0765. | |||||
CVE-2022-3491 | 1 Vim | 1 Vim | 2023-05-03 | N/A | 7.8 HIGH |
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0742. | |||||
CVE-2022-3446 | 1 Google | 1 Chrome | 2023-05-03 | N/A | 8.8 HIGH |
Heap buffer overflow in WebSQL in Google Chrome prior to 106.0.5249.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | |||||
CVE-2022-1785 | 2 Debian, Vim | 2 Debian Linux, Vim | 2023-05-03 | 4.6 MEDIUM | 7.8 HIGH |
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977. | |||||
CVE-2021-33657 | 1 Libsdl | 1 Simple Directmedia Layer | 2023-05-03 | 6.8 MEDIUM | 8.8 HIGH |
There is a heap overflow problem in video/SDL_pixels.c in SDL (Simple DirectMedia Layer) 2.x to 2.0.18 versions. By crafting a malicious .BMP file, an attacker can cause the application using this library to crash, denial of service or Code execution. |