Vulnerabilities (CVE)

Filtered by CWE-120
Total 2590 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-43542 2024-11-21 N/A 7.8 HIGH
Memory corruption while copying a keyblob`s material when the key material`s size is not accurately checked.
CVE-2023-43540 2024-11-21 N/A 8.4 HIGH
Memory corruption while processing the IOCTL FM HCI WRITE request.
CVE-2023-43538 2024-11-21 N/A 9.3 CRITICAL
Memory corruption in TZ Secure OS while Tunnel Invoke Manager initialization.
CVE-2023-43526 2024-11-21 N/A 6.7 MEDIUM
Memory corruption while querying module parameters from Listen Sound model client in kernel from user space.
CVE-2023-43525 2024-11-21 N/A 6.7 MEDIUM
Memory corruption while copying the sound model data from user to kernel buffer during sound model register.
CVE-2023-43524 2024-11-21 N/A 6.7 MEDIUM
Memory corruption when the bandpass filter order received from AHAL is not within the expected range.
CVE-2023-43519 1 Qualcomm 268 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 265 more 2024-11-21 N/A 7.3 HIGH
Memory corruption in video while parsing the Videoinfo, when the size of atom is greater than the videoinfo size.
CVE-2023-43515 2024-11-21 N/A 6.6 MEDIUM
Memory corruption in HLOS while running kernel address sanitizers (syzkaller) on tmecom with DEBUG_FS enabled.
CVE-2023-43314 1 Zyxel 2 Pmg2005-t20b, Pmg2005-t20b Firmware 2024-11-21 N/A 7.5 HIGH
** UNSUPPORTED WHEN ASSIGNED **The buffer overflow vulnerability in the Zyxel PMG2005-T20B firmware version V1.00(ABNK.2)b11_C0 could allow an unauthenticated attacker to cause a denial of service condition via a crafted uid.
CVE-2023-43250 1 Xnview 1 Nconvert 2024-11-21 N/A 7.8 HIGH
XNSoft Nconvert 7.136 is vulnerable to Buffer Overflow. There is a User Mode Write AV via a crafted image file. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution.
CVE-2023-43131 1 Maxiguvenlik 1 General Device Manager 2024-11-21 N/A 9.8 CRITICAL
General Device Manager 2.5.2.2 is vulnerable to Buffer Overflow.
CVE-2023-42801 1 Moonlight-stream 8 Moonlight, Moonlight-common-c, Moonlight Embedded and 5 more 2024-11-21 N/A 7.6 HIGH
Moonlight-common-c contains the core GameStream client code shared between Moonlight clients. Moonlight-common-c is vulnerable to buffer overflow starting in commit f57bd745b4cbed577ea654fad4701bea4d38b44c. A malicious game streaming server could exploit a buffer overflow vulnerability to crash a moonlight client. Achieving RCE is possible but unlikely, due to stack canaries in use by modern compiler toolchains. The published binaries for official clients Qt, Android, iOS/tvOS, and Embedded are built with stack canaries, but some unofficial clients may not use stack canaries. This vulnerability takes place after the pairing process, so it requires the client to be tricked into pairing to a malicious host. It is not possible to perform using a man-in-the-middle due to public key pinning that takes place during the pairing process. The bug was addressed in commit b2497a3918a6d79808d9fd0c04734786e70d5954.
CVE-2023-42800 1 Moonlight-stream 7 Moonlight, Moonlight-common-c, Moonlight Embedded and 4 more 2024-11-21 N/A 8.8 HIGH
Moonlight-common-c contains the core GameStream client code shared between Moonlight clients. Moonlight-common-c is vulnerable to buffer overflow starting in commit 50c0a51b10ecc5b3415ea78c21d96d679e2288f9 due to unmitigated usage of unsafe C functions and improper bounds checking. A malicious game streaming server could exploit a buffer overflow vulnerability to crash a moonlight client, or achieve remote code execution (RCE) on the client (with insufficient exploit mitigations or if mitigations can be bypassed). The bug was addressed in commit 24750d4b748fefa03d09fcfd6d45056faca354e0.
CVE-2023-42799 1 Moonlight-stream 7 Moonlight, Moonlight-common-c, Moonlight Embedded and 4 more 2024-11-21 N/A 8.8 HIGH
Moonlight-common-c contains the core GameStream client code shared between Moonlight clients. Moonlight-common-c is vulnerable to buffer overflow starting in commit 50c0a51b10ecc5b3415ea78c21d96d679e2288f9 due to unmitigated usage of unsafe C functions and improper bounds checking. A malicious game streaming server could exploit a buffer overflow vulnerability to crash a moonlight client, or achieve remote code execution (RCE) on the client (with insufficient exploit mitigations or if mitigations can be bypassed). The bug was addressed in commit 02b7742f4d19631024bd766bd2bb76715780004e.
CVE-2023-42320 1 Tenda 2 Ac10, Ac10 Firmware 2024-11-21 N/A 9.8 CRITICAL
Buffer Overflow vulnerability in Tenda AC10V4 v.US_AC10V4.0si_V16.03.10.13_cn_TDC01 allows a remote attacker to cause a denial of service via the mac parameter in the GetParentControlInfo function.
CVE-2023-42299 1 Openimageio 1 Openimageio 2024-11-21 N/A 9.8 CRITICAL
Buffer Overflow vulnerability in OpenImageIO oiio v.2.4.12.0 allows a remote attacker to execute arbitrary code and cause a denial of service via the read_subimage_data function.
CVE-2023-42278 1 Hutool 1 Hutool 2024-11-21 N/A 7.5 HIGH
hutool v5.8.21 was discovered to contain a buffer overflow via the component JSONUtil.parse().
CVE-2023-42277 1 Hutool 1 Hutool 2024-11-21 N/A 9.8 CRITICAL
hutool v5.8.21 was discovered to contain a buffer overflow via the component jsonObject.putByPath.
CVE-2023-42276 1 Hutool 1 Hutool 2024-11-21 N/A 9.8 CRITICAL
hutool v5.8.21 was discovered to contain a buffer overflow via the component jsonArray.
CVE-2023-41913 1 Strongswan 1 Strongswan 2024-11-21 N/A 9.8 CRITICAL
strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected version is 5.3.0. An attack can occur via a crafted IKE_SA_INIT message.