Vulnerabilities (CVE)

Filtered by CWE-120
Total 2592 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-2211 2 Libguestfs, Redhat 2 Libguestfs, Enterprise Linux 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor.
CVE-2022-29797 1 Huawei 2 Cv81-wdm, Cv81-wdm Firmware 2024-11-21 10.0 HIGH 9.8 CRITICAL
There is a buffer overflow vulnerability in CV81-WDM FW 01.70.49.29.46. Successful exploitation of this vulnerability may lead to privilege escalation.
CVE-2022-29654 1 Nasm 1 Netwide Assembler 2024-11-21 N/A 5.5 MEDIUM
Buffer overflow vulnerability in quote_for_pmake in asm/nasm.c in nasm before 2.15.05 allows attackers to cause a denial of service via crafted file.
CVE-2022-29591 1 Tenda 2 Tx9 Pro, Tx9 Pro Firmware 2024-11-21 10.0 HIGH 9.8 CRITICAL
Tenda TX9 Pro 22.03.02.10 devices have a SetNetControlList buffer overflow.
CVE-2022-29246 1 Microsoft 1 Azure Rtos Usbx 2024-11-21 7.5 HIGH 9.8 CRITICAL
Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack. Prior to version 6.1.11, he USBX DFU UPLOAD functionality may be utilized to introduce a buffer overflow resulting in overwrite of memory contents. In particular cases this may allow an attacker to bypass security features or execute arbitrary code. The implementation of `ux_device_class_dfu_control_request` function does not assure that a buffer overflow will not occur during handling of the DFU UPLOAD command. When an attacker issues the `UX_SLAVE_CLASS_DFU_COMMAND_UPLOAD` control transfer request with `wLenght` larger than the buffer size (`UX_SLAVE_REQUEST_CONTROL_MAX_LENGTH`, 256 bytes), depending on the actual implementation of `dfu -> ux_slave_class_dfu_read`, a buffer overflow may occur. In example `ux_slave_class_dfu_read` may read 4096 bytes (or more up to 65k) to a 256 byte buffer ultimately resulting in an overflow. Furthermore in case an attacker has some control over the read flash memory, this may result in execution of arbitrary code and platform compromise. A fix for this issue has been included in USBX release 6.1.11. As a workaround, align request and buffer size to assure that buffer boundaries are respected.
CVE-2022-29242 1 Gost Engine Project 1 Gost Engine 2024-11-21 5.0 MEDIUM 5.9 MEDIUM
GOST engine is a reference implementation of the Russian GOST crypto algorithms for OpenSSL. TLS clients using GOST engine when ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is agreed and the server uses 512 bit GOST secret keys are vulnerable to buffer overflow. GOST engine version 3.0.1 contains a patch for this issue. Disabling ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is a possible workaround.
CVE-2022-29223 1 Microsoft 1 Azure Rtos Usbx 2024-11-21 7.5 HIGH 7.5 HIGH
Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack. In versions prior to 6.1.10, an attacker can cause a buffer overflow by providing the Azure RTOS USBX host stack a HUB descriptor with `bNbPorts` set to a value greater than `UX_MAX_TT` which defaults to 8. For a `bNbPorts` value of 255, the implementation of `ux_host_class_hub_descriptor_get` function will modify the contents of `hub` -> `ux_host_class_hub_device` -> `ux_device_hub_tt` array violating the end boundary by 255 - `UX_MAX_TT` items. The USB host stack needs to validate the number of ports reported by the hub, and if the value is larger than UX_MAX_TT, USB stack needs to reject the request. This fix has been included in USBX release 6.1.10.
CVE-2022-29189 1 Pion 1 Dtls 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.4, a buffer that was used for inbound network traffic had no upper limit. Pion DTLS would buffer all network traffic from the remote user until the handshake completes or timed out. An attacker could exploit this to cause excessive memory usage. Version 2.1.4 contains a patch for this issue. There are currently no known workarounds available.
CVE-2022-29023 1 Openrazer Project 1 Openrazer 2024-11-21 7.5 HIGH 9.8 CRITICAL
A buffer overflow vulnerability exists in the razermouse driver of OpenRazer up to version v3.3.0 allows attackers to cause a Denial of Service (DoS) and possibly escalate their privileges via a crafted buffer sent to the matrix_custom_frame device.
CVE-2022-29022 1 Openrazer Project 1 Openrazer 2024-11-21 7.5 HIGH 9.8 CRITICAL
A buffer overflow vulnerability exists in the razeraccessory driver of OpenRazer up to version v3.3.0 allows attackers to cause a Denial of Service (DoS) and possibly escalate their privileges via a crafted buffer sent to the matrix_custom_frame device.
CVE-2022-29021 1 Openrazer Project 1 Openrazer 2024-11-21 7.5 HIGH 9.8 CRITICAL
A buffer overflow vulnerability exists in the razerkbd driver of OpenRazer up to version v3.3.0 allows attackers to cause a Denial of Service (DoS) and possibly escalate their privileges via a crafted buffer sent to the matrix_custom_frame device.
CVE-2022-28994 1 Smallsrv 1 Small Http Server 2024-11-21 7.5 HIGH 9.8 CRITICAL
Small HTTP Server version 3.06 suffers from a remote buffer overflow vulnerability via long GET request.
CVE-2022-28722 1 Hp 198 A7w93a, A7w93a Firmware, D3q15a and 195 more 2024-11-21 N/A 9.8 CRITICAL
Certain HP Print Products are potentially vulnerable to Buffer Overflow.
CVE-2022-28480 1 Allmediaserver 1 Allmediaserver 2024-11-21 7.5 HIGH 9.8 CRITICAL
ALLMediaServer 1.6 is vulnerable to Buffer Overflow via MediaServer.exe.
CVE-2022-28463 2 Debian, Imagemagick 2 Debian Linux, Imagemagick 2024-11-21 6.8 MEDIUM 7.8 HIGH
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
CVE-2022-27881 1 Openbsd 1 Openbsd 2024-11-21 5.0 MEDIUM 7.5 HIGH
engine.c in slaacd in OpenBSD 6.9 and 7.0 before 2022-02-21 has a buffer overflow triggerable by an IPv6 router advertisement with more than seven nameservers. NOTE: privilege separation and pledge can prevent exploitation.
CVE-2022-27643 1 Netgear 54 D6220, D6220 Firmware, D6400 and 51 more 2024-11-21 N/A 8.8 HIGH
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SOAP requests. When parsing the SOAPAction header, the process does not properly validate the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15692.
CVE-2022-27612 1 Synology 1 Audio Station 2024-11-21 N/A 7.3 HIGH
Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in cgi component in Synology Audio Station before 6.5.4-3367 allows remote attackers to execute arbitrary commands via unspecified vectors.
CVE-2022-27387 2 Debian, Mariadb 2 Debian Linux, Mariadb 2024-11-21 5.0 MEDIUM 7.5 HIGH
MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements.
CVE-2022-27242 1 Siemens 1 Openv2g 2024-11-21 2.1 LOW 5.5 MEDIUM
A vulnerability has been identified in OpenV2G (V0.9.4). The OpenV2G EXI parsing feature is missing a length check when parsing X509 serial numbers. Thus, an attacker could introduce a buffer overflow that leads to memory corruption.