CWE:
 

Topic
Date
Author
High
TP-LINK TDDP Buffer Overflow / Missing Authentication
23.11.2016
Andres Lopez Luksenber...
High
Opera 10.01 Remote Array Overrun (Arbitrary code execution)
24.11.2009
Maksymilian Arciemowic...
High
KDE KDELibs 4.3.3 Remote Array Overrun (Arbitrary code execution)
24.11.2009
Maksymilian Arciemowic...
High
K-Meleon 1.5.3 Remote Array Overrun (Arbitrary code execution)
24.11.2009
Maksymilian Arciemowic...
High
SeaMonkey 1.1.8 Remote Array Overrun (Arbitrary code execution)
20.11.2009
Maksymilian Arciemowic...


CVEMAP Search Results

CVE
Details
Description
2021-10-18
Medium
CVE-2021-38297

Vendor: Golang
Software: GO
 

 
Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used.

 
2021-10-12
High
CVE-2021-37726

Vendor: Arubanetworks
Software: Aruba instant
 

 
A remote buffer overflow vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 8.7.x.x: 8.7.0.0 through 8.7.1.2. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.

 
2021-10-11
Medium
CVE-2020-27372

Vendor: Brandy project
Software: Brandy
 

 
A buffer overflow vulnerability exists in Brandy Basic V Interpreter 1.21 in the run_interpreter function.

 
Medium
CVE-2021-40239

Vendor: Miniftpd project
Software: Miniftpd
 

 
A Buffer Overflow vulnerability exists in the latest version of Miniftpd in the do_retr function in ftpproto.c

 
2021-10-08
Medium
CVE-2021-35977

Vendor: DIGI
Software: Realport
 

 
An issue was discovered in Digi RealPort for Windows through 4.8.488.0. A buffer overflow exists in the handling of ADDP discovery response messages. This could result in arbitrary code execution.

 
2021-10-07
Medium
CVE-2021-41794

Vendor: Open5gs
Software: Open5gs
 

 
ogs_fqdn_parse in Open5GS 1.0.0 through 2.3.3 inappropriately trusts a client-supplied length value, leading to a buffer overflow. The attacker can send a PFCP Session Establishment Request with "internet" as the PDI Network Instance. The first character is interpreted as a length value to be used in a memcpy call. The destination buffer is only 100 bytes long on the stack. Then, 'i' gets interpreted as 105 bytes to copy from the source buffer to the destination buffer.

 
2021-10-06
Medium
CVE-2021-25498

Vendor: Samsung
Software: Notes
 

 
A possible buffer overflow vulnerability in maetd_eco_cb_mode of libSPenBase library of Samsung Notes prior to Samsung Notes version 4.3.02.61 allows arbitrary code execution.

 
Medium
CVE-2021-25497

Vendor: Samsung
Software: Notes
 

 
A possible buffer overflow vulnerability in maetd_cpy_slice of libSPenBase library of Samsung Notes prior to Samsung Notes version 4.3.02.61 allows arbitrary code execution.

 
Medium
CVE-2021-25496

Vendor: Samsung
Software: Notes
 

 
A possible buffer overflow vulnerability in maetd_dec_slice of libSPenBase library of Samsung Notes prior to Samsung Notes version 4.3.02.61 allows arbitrary code execution.

 
Medium
CVE-2021-25494

Vendor: Samsung
Software: Notes
 

 
A possible buffer overflow vulnerability in libSPenBase library of Samsung Notes prior to Samsung Note version 4.3.02.61 allows arbitrary code execution.

 

 


Copyright 2021, cxsecurity.com

 

Back to Top