Vulnerabilities (CVE)

Filtered by CWE-787
Total 10481 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-24081 1 Microsoft 3 Windows 10, Windows Server 2016, Windows Server 2019 2023-12-29 6.8 MEDIUM 7.8 HIGH
Microsoft Windows Codecs Library Remote Code Execution Vulnerability
CVE-2023-49356 1 Glensawyer 1 Mp3gain 2023-12-29 N/A 7.5 HIGH
A stack buffer overflow vulnerability in MP3Gain v1.6.2 allows an attacker to cause a denial of service via the WriteMP3GainAPETag function at apetag.c:592.
CVE-2021-1715 1 Microsoft 8 365 Apps, Office, Office Online Server and 5 more 2023-12-29 9.3 HIGH 7.8 HIGH
Microsoft Word Remote Code Execution Vulnerability
CVE-2023-4154 1 Samba 1 Samba 2023-12-29 N/A 6.5 MEDIUM
A design flaw was found in Samba's DirSync control implementation, which exposes passwords and secrets in Active Directory to privileged users and Read-Only Domain Controllers (RODCs). This flaw allows RODCs and users possessing the GET_CHANGES right to access all attributes, including sensitive secrets and passwords. Even in a default setup, RODC DC accounts, which should only replicate some passwords, can gain access to all domain secrets, including the vital krbtgt, effectively eliminating the RODC / DC distinction. Furthermore, the vulnerability fails to account for error conditions (fail open), like out-of-memory situations, potentially granting access to secret attributes, even under low-privileged attacker influence.
CVE-2021-28452 1 Microsoft 3 365 Apps, Office, Outlook 2023-12-29 6.8 MEDIUM 7.1 HIGH
Microsoft Outlook Memory Corruption Vulnerability
CVE-2021-38653 1 Microsoft 2 365 Apps, Office 2023-12-28 6.8 MEDIUM 7.8 HIGH
Microsoft Office Visio Remote Code Execution Vulnerability
CVE-2021-36952 1 Microsoft 2 Visual Studio 2017, Visual Studio 2019 2023-12-28 6.8 MEDIUM 7.8 HIGH
Visual Studio Remote Code Execution Vulnerability
CVE-2021-34480 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2023-12-28 6.8 MEDIUM 6.8 MEDIUM
Scripting Engine Memory Corruption Vulnerability
CVE-2021-26435 1 Microsoft 9 Windows 10, Windows 7, Windows 8.1 and 6 more 2023-12-28 6.8 MEDIUM 8.1 HIGH
Windows Scripting Engine Memory Corruption Vulnerability
CVE-2020-7121 1 Arubanetworks 12 Cx 6200f, Cx 6200f Firmware, Cx 6300 and 9 more 2023-12-28 5.0 MEDIUM 7.5 HIGH
Two memory corruption vulnerabilities in the Aruba CX Switches Series 6200F, 6300, 6400, 8320, 8325, and 8400 have been found. Successful exploitation of these vulnerabilities could result in Local Denial of Service of the LLDP (Link Layer Discovery Protocol) process in the switch. This applies to firmware versions prior to 10.04.3021.
CVE-2020-7122 1 Arubanetworks 12 Cx 6200f, Cx 6200f Firmware, Cx 6300 and 9 more 2023-12-28 5.0 MEDIUM 7.5 HIGH
Two memory corruption vulnerabilities in the Aruba CX Switches Series 6200F, 6300, 6400, 8320, 8325, and 8400 have been found. Successful exploitation of these vulnerabilities could result in Local Denial of Service of the CDP (Cisco Discovery Protocol) process in the switch. This applies to firmware versions prior to 10.04.1000.
CVE-2021-42279 1 Microsoft 5 Windows 10, Windows 11, Windows Server 2016 and 2 more 2023-12-28 5.1 MEDIUM 4.2 MEDIUM
Chakra Scripting Engine Memory Corruption Vulnerability
CVE-2022-45188 3 Debian, Fedoraproject, Netatalk 3 Debian Linux, Fedora, Netatalk 2023-12-28 N/A 7.8 HIGH
Netatalk through 3.1.13 has an afp_getappl heap-based buffer overflow resulting in code execution via a crafted .appl file. This provides remote root access on some platforms such as FreeBSD (used for TrueNAS).
CVE-2022-23125 2 Debian, Netatalk 2 Debian Linux, Netatalk 2023-12-28 N/A 9.8 CRITICAL
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the copyapplfile function. When parsing the len element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15869.
CVE-2023-33222 1 Idemia 16 Morphowave Compact, Morphowave Compact Firmware, Morphowave Sp and 13 more 2023-12-28 N/A 9.8 CRITICAL
When handling contactless cards, usage of a specific function to get additional information from the card which doesn't check the boundary on the data received while reading. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the targeted device
CVE-2023-4042 2 Artifex, Redhat 9 Ghostscript, Codeready Linux Builder, Codeready Linux Builder For Arm64 and 6 more 2023-12-27 N/A 5.5 MEDIUM
A flaw was found in ghostscript. The fix for CVE-2020-16305 in ghostscript was not included in RHSA-2021:1852-06 advisory as it was claimed to be. This issue only affects the ghostscript package as shipped with Red Hat Enterprise Linux 8.
CVE-2022-39260 4 Apple, Debian, Fedoraproject and 1 more 4 Xcode, Debian Linux, Fedora and 1 more 2023-12-27 N/A 8.8 HIGH
Git is an open source, scalable, distributed revision control system. `git shell` is a restricted login shell that can be used to implement Git's push/pull functionality via SSH. In versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4, the function that splits the command arguments into an array improperly uses an `int` to represent the number of entries in the array, allowing a malicious actor to intentionally overflow the return value, leading to arbitrary heap writes. Because the resulting array is then passed to `execv()`, it is possible to leverage this attack to gain remote code execution on a victim machine. Note that a victim must first allow access to `git shell` as a login shell in order to be vulnerable to this attack. This problem is patched in versions 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 and users are advised to upgrade to the latest version. Disabling `git shell` access via remote logins is a viable short-term workaround.
CVE-2023-48107 1 Zlib-ng 1 Minizip-ng 2023-12-27 N/A 8.8 HIGH
Buffer Overflow vulnerability in zlib-ng minizip-ng v.4.0.2 allows an attacker to execute arbitrary code via a crafted file to the mz_path_has_slash function in the mz_os.c file.
CVE-2023-1801 1 Tcpdump 1 Tcpdump 2023-12-23 N/A 6.5 MEDIUM
The SMB protocol decoder in tcpdump version 4.99.3 can perform an out-of-bounds write when decoding a crafted network packet.
CVE-2022-26475 3 Google, Linuxfoundation, Mediatek 42 Android, Yocto, Mt6761 and 39 more 2023-12-22 N/A 6.7 MEDIUM
In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310743; Issue ID: ALPS07310743.