Vulnerabilities (CVE)

Filtered by CWE-122
Total 773 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-38170 1 Microsoft 2 365 Apps, Office Long Term Servicing Channel 2024-08-16 N/A 7.1 HIGH
Microsoft Excel Remote Code Execution Vulnerability
CVE-2024-38169 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2024-08-16 N/A 7.8 HIGH
Microsoft Office Visio Remote Code Execution Vulnerability
CVE-2024-38121 1 Microsoft 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more 2024-08-16 N/A 8.8 HIGH
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-38120 1 Microsoft 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more 2024-08-16 N/A 8.8 HIGH
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-38116 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-08-16 N/A 8.8 HIGH
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVE-2024-38115 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-08-16 N/A 8.8 HIGH
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVE-2024-38130 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-08-16 N/A 8.8 HIGH
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-38152 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2024-08-14 N/A 7.8 HIGH
Windows OLE Remote Code Execution Vulnerability
CVE-2024-7272 1 Ffmpeg 1 Ffmpeg 2024-08-13 7.5 HIGH 8.8 HIGH
A vulnerability, which was classified as critical, was found in FFmpeg up to 5.1.5. This affects the function fill_audiodata of the file /libswresample/swresample.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. This issue was fixed in version 6.0 by 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 but a backport for 5.1 was forgotten. The exploit has been disclosed to the public and may be used. Upgrading to version 5.1.6 and 6.0 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 is able to address this issue. It is recommended to upgrade the affected component.
CVE-2024-6994 1 Google 1 Chrome 2024-08-07 N/A 8.8 HIGH
Heap buffer overflow in Layout in Google Chrome prior to 127.0.6533.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
CVE-2024-7055 2024-08-06 7.5 HIGH 6.3 MEDIUM
A vulnerability was found in FFmpeg up to 7.0.1. It has been classified as critical. This affects the function pnm_decode_frame in the library /libavcodec/pnmdec.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0.2 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-273651.
CVE-2024-39392 2024-08-02 N/A 7.8 HIGH
InDesign Desktop versions ID18.5.2, ID19.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-6873 2024-08-01 N/A 8.1 HIGH
It is possible to crash or redirect the execution flow of the ClickHouse server process from an unauthenticated vector by sending a specially crafted request to the ClickHouse server native interface. This redirection is limited to what is available within a 256-byte range of memory at the time of execution, and no known remote code execution (RCE) code has been produced or exploited.  Fixes have been merged to all currently supported version of ClickHouse. If you are maintaining your own forked version of ClickHouse or using an older version and cannot upgrade, the fix for this vulnerability can be found in this commit  https://github.com/ClickHouse/ClickHouse/pull/64024 .