Show filters
177 Total Results
Displaying 1-10 of 177
Sort by:
Attacker Value
Unknown

CVE-2021-21017

Disclosure Date: February 09, 2021 (last updated February 22, 2025)
Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a heap-based buffer overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
4
Attacker Value
Very High

CVE-2020-8899 Samsung Quarm RCE via MMS

Disclosure Date: May 06, 2020 (last updated February 21, 2025)
There is a buffer overwrite vulnerability in the Quram qmg library of Samsung's Android OS versions O(8.x), P(9.0) and Q(10.0). An unauthenticated, unauthorized attacker sending a specially crafted MMS to a vulnerable phone can trigger a heap-based buffer overflow in the Quram image codec leading to an arbitrary remote code execution (RCE) without any user interaction. The Samsung ID is SVE-2020-16747.
Attacker Value
Unknown

CVE-2021-26691

Disclosure Date: June 10, 2021 (last updated February 22, 2025)
In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow
Attacker Value
Unknown

CVE-2025-1538

Disclosure Date: February 21, 2025 (last updated February 23, 2025)
A vulnerability classified as critical was found in D-Link DAP-1320 1.00. Affected by this vulnerability is the function set_ws_action of the file /dws/api/. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Attacker Value
Unknown

CVE-2021-3984

Disclosure Date: December 01, 2021 (last updated February 23, 2025)
vim is vulnerable to Heap-based Buffer Overflow
Attacker Value
Unknown

CVE-2021-4019

Disclosure Date: December 01, 2021 (last updated February 23, 2025)
vim is vulnerable to Heap-based Buffer Overflow
Attacker Value
Unknown

CVE-2021-3973

Disclosure Date: November 19, 2021 (last updated February 23, 2025)
vim is vulnerable to Heap-based Buffer Overflow
Attacker Value
Unknown

CVE-2021-3968

Disclosure Date: November 19, 2021 (last updated February 23, 2025)
vim is vulnerable to Heap-based Buffer Overflow
Attacker Value
Unknown

CVE-2021-26330

Disclosure Date: November 09, 2021 (last updated February 23, 2025)
AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources.
Attacker Value
Unknown

CVE-2021-41253

Disclosure Date: November 08, 2021 (last updated February 23, 2025)
Zydis is an x86/x86-64 disassembler library. Users of Zydis versions v3.2.0 and older that use the string functions provided in `zycore` in order to append untrusted user data to the formatter buffer within their custom formatter hooks can run into heap buffer overflows. Older versions of Zydis failed to properly initialize the string object within the formatter buffer, forgetting to initialize a few fields, leaving their value to chance. This could then in turn cause zycore functions like `ZyanStringAppend` to make incorrect calculations for the new target size, resulting in heap memory corruption. This does not affect the regular uncustomized Zydis formatter, because Zydis internally doesn't use the string functions in zycore that act upon these fields. However, because the zycore string functions are the intended way to work with the formatter buffer for users of the library that wish to extend the formatter, we still consider this to be a vulnerability in Zydis. This bug is patche…