Vulnerabilities (CVE)

Filtered by CWE-787
Total 12313 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-20752 2 Google, Mediatek 8 Android, Mt8167, Mt8167s and 5 more 2025-01-07 N/A 6.7 MEDIUM
In keymange, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826586; Issue ID: ALPS07826586.
CVE-2023-20751 2 Google, Mediatek 8 Android, Mt8167, Mt8167s and 5 more 2025-01-07 N/A 6.7 MEDIUM
In keymange, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07825502; Issue ID: ALPS07825502.
CVE-2023-20750 2 Google, Mediatek 23 Android, Mt6835, Mt6886 and 20 more 2025-01-07 N/A 4.1 MEDIUM
In swpm, there is a possible out of bounds write due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07780926; Issue ID: ALPS07780928.
CVE-2023-20749 2 Google, Mediatek 28 Android, Mt6789, Mt6835 and 25 more 2025-01-07 N/A 6.7 MEDIUM
In swpm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07780926; Issue ID: ALPS07780926.
CVE-2023-20716 4 Google, Linux, Linuxfoundation and 1 more 32 Android, Linux Kernel, Iot-yocto and 29 more 2025-01-07 N/A 6.7 MEDIUM
In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07796883; Issue ID: ALPS07796883.
CVE-2023-20715 4 Google, Linux, Linuxfoundation and 1 more 31 Android, Linux Kernel, Iot-yocto and 28 more 2025-01-07 N/A 6.7 MEDIUM
In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07796900; Issue ID: ALPS07796900.
CVE-2023-20712 4 Google, Linux, Linuxfoundation and 1 more 32 Android, Linux Kernel, Iot-yocto and 29 more 2025-01-07 N/A 6.7 MEDIUM
In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07796914; Issue ID: ALPS07796914.
CVE-2022-40655 1 Nikon 1 Nis-elements Viewer 2025-01-07 N/A 7.8 HIGH
This vulnerability allows remote attackers to execute arbitrary code on affected installations of NIKON NIS-Elements Viewer 1.2100.1483.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ND2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15071.
CVE-2023-0668 2 Debian, Wireshark 2 Debian Linux, Wireshark 2025-01-07 N/A 6.5 MEDIUM
Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
CVE-2023-0666 2 Debian, Wireshark 2 Debian Linux, Wireshark 2025-01-07 N/A 6.5 MEDIUM
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
CVE-2024-47398 2025-01-07 N/A 8.8 HIGH
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the device is unable to boot up through out-of-bounds write.
CVE-2023-34568 1 Tenda 2 Ac10, Ac10 Firmware 2025-01-06 N/A 6.7 MEDIUM
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter time at /goform/PowerSaveSet.
CVE-2023-34566 1 Tenda 2 Ac10, Ac10 Firmware 2025-01-06 N/A 9.8 CRITICAL
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter time at /goform/saveParentControlInfo.
CVE-2023-33660 1 Emqx 1 Nanomq 2025-01-06 N/A 7.5 HIGH
A heap buffer overflow vulnerability exists in NanoMQ 0.17.2. The vulnerability can be triggered by calling the function copyn_str() in the file mqtt_parser.c. An attacker could exploit this vulnerability to cause a denial of service attack.
CVE-2023-34571 1 Tenda 2 Ac10, Ac10 Firmware 2025-01-06 N/A 6.7 MEDIUM
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter shareSpeed at /goform/WifiGuestSet.
CVE-2023-34570 1 Tenda 2 Ac10, Ac10 Firmware 2025-01-06 N/A 6.7 MEDIUM
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter devName at /goform/SetOnlineDevName.
CVE-2023-34569 1 Tenda 2 Ac10, Ac10 Firmware 2025-01-06 N/A 6.7 MEDIUM
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter list at /goform/SetNetControlList.
CVE-2023-34567 1 Tenda 2 Ac10, Ac10 Firmware 2025-01-06 N/A 6.7 MEDIUM
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter list at /goform/SetVirtualServerCfg.
CVE-2023-33658 1 Emqx 1 Nanomq 2025-01-06 N/A 7.5 HIGH
A heap buffer overflow vulnerability exists in NanoMQ 0.17.2. The vulnerability can be triggered by calling the function nni_msg_get_pub_pid() in the file message.c. An attacker could exploit this vulnerability to cause a denial of service attack.
CVE-2023-0667 1 Wireshark 1 Wireshark 2025-01-06 N/A 6.5 MEDIUM
Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark