Show filters
8,266 Total Results
Displaying 261-270 of 8,266
Sort by:
Attacker Value
Unknown
CVE-2024-40130
Disclosure Date: July 16, 2024 (last updated February 26, 2025)
open5gs v2.6.4 is vulnerable to Buffer Overflow. via /lib/core/abts.c.
0
Attacker Value
Unknown
CVE-2024-40129
Disclosure Date: July 16, 2024 (last updated February 26, 2025)
Open5GS v2.6.4 is vulnerable to Buffer Overflow. via /lib/pfcp/context.c.
0
Attacker Value
Unknown
CVE-2024-33182
Disclosure Date: July 16, 2024 (last updated February 26, 2025)
Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnerability via the deviceId parameter at ip/goform/addWifiMacFilter.
0
Attacker Value
Unknown
CVE-2024-33180
Disclosure Date: July 16, 2024 (last updated February 26, 2025)
Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnerability via the deviceId parameter at ip/goform/saveParentControlInfo.
0
Attacker Value
Unknown
CVE-2022-48847
Disclosure Date: July 16, 2024 (last updated February 26, 2025)
In the Linux kernel, the following vulnerability has been resolved:
watch_queue: Fix filter limit check
In watch_queue_set_filter(), there are a couple of places where we check
that the filter type value does not exceed what the type_filter bitmap
can hold. One place calculates the number of bits by:
if (tf[i].type >= sizeof(wfilter->type_filter) * 8)
which is fine, but the second does:
if (tf[i].type >= sizeof(wfilter->type_filter) * BITS_PER_LONG)
which is not. This can lead to a couple of out-of-bounds writes due to
a too-large type:
(1) __set_bit() on wfilter->type_filter
(2) Writing more elements in wfilter->filters[] than we allocated.
Fix this by just using the proper WATCH_TYPE__NR instead, which is the
number of types we actually know about.
The bug may cause an oops looking something like:
BUG: KASAN: slab-out-of-bounds in watch_queue_set_filter+0x659/0x740
Write of size 4 at addr ffff88800d2c66bc by task watch_queue_oob/611
...
Call Trace:
<TA…
0
Attacker Value
Unknown
CVE-2024-40416
Disclosure Date: July 15, 2024 (last updated February 26, 2025)
A vulnerability in /goform/SetVirtualServerCfg in the sub_6320C function in Tenda AX1806 1.0.0.1 firmware leads to stack-based buffer overflow.
0
Attacker Value
Unknown
CVE-2024-40415
Disclosure Date: July 15, 2024 (last updated February 26, 2025)
A vulnerability in /goform/SetStaticRouteCfg in the sub_519F4 function in Tenda AX1806 1.0.0.1 firmware leads to stack-based buffer overflow.
0
Attacker Value
Unknown
CVE-2024-40414
Disclosure Date: July 15, 2024 (last updated February 26, 2025)
A vulnerability in /goform/SetNetControlList in the sub_656BC function in Tenda AX1806 1.0.0.1 firmware leads to stack-based buffer overflow.
0
Attacker Value
Unknown
CVE-2024-6744
Disclosure Date: July 15, 2024 (last updated February 26, 2025)
The SMTP Listener of Secure Email Gateway from Cellopoint does not properly validate user input, leading to a Buffer Overflow vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the remote server.
0
Attacker Value
Unknown
CVE-2024-40955
Disclosure Date: July 12, 2024 (last updated February 26, 2025)
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix slab-out-of-bounds in ext4_mb_find_good_group_avg_frag_lists()
We can trigger a slab-out-of-bounds with the following commands:
mkfs.ext4 -F /dev/$disk 10G
mount /dev/$disk /tmp/test
echo 2147483647 > /sys/fs/ext4/$disk/mb_group_prealloc
echo test > /tmp/test/file && sync
==================================================================
BUG: KASAN: slab-out-of-bounds in ext4_mb_find_good_group_avg_frag_lists+0x8a/0x200 [ext4]
Read of size 8 at addr ffff888121b9d0f0 by task kworker/u2:0/11
CPU: 0 PID: 11 Comm: kworker/u2:0 Tainted: GL 6.7.0-next-20240118 #521
Call Trace:
dump_stack_lvl+0x2c/0x50
kasan_report+0xb6/0xf0
ext4_mb_find_good_group_avg_frag_lists+0x8a/0x200 [ext4]
ext4_mb_regular_allocator+0x19e9/0x2370 [ext4]
ext4_mb_new_blocks+0x88a/0x1370 [ext4]
ext4_ext_map_blocks+0x14f7/0x2390 [ext4]
ext4_map_blocks+0x569/0xea0 [ext4]
ext4_do_writepages+0x10f6/0x1bc0 [ext4]
[...]
==…
0