Vulnerabilities > Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-11-07 | CVE-2024-10964 | Classic Buffer Overflow vulnerability in Emqx Neuron A vulnerability classified as critical has been found in emqx neuron up to 2.10.0. | 9.8 |
2024-11-05 | CVE-2024-50131 | Classic Buffer Overflow vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: tracing: Consider the NULL character when validating the event length strlen() returns a string length excluding the null byte. | 7.8 |
2024-11-04 | CVE-2024-33030 | Classic Buffer Overflow vulnerability in Qualcomm products Memory corruption while parsing IPC frequency table parameters for LPLH that has size greater than expected size. | 6.7 |
2024-11-04 | CVE-2024-38409 | Classic Buffer Overflow vulnerability in Qualcomm products Memory corruption while station LL statistic handling. | 7.8 |
2024-11-04 | CVE-2024-38423 | Classic Buffer Overflow vulnerability in Qualcomm products Memory corruption while processing GPU page table switch. | 7.8 |
2024-10-31 | CVE-2024-10559 | Classic Buffer Overflow vulnerability in Razormist Airport Booking Management System 1.0 A vulnerability was found in SourceCodester Airport Booking Management System 1.0 and classified as critical. | 7.8 |
2024-10-28 | CVE-2024-44144 | Classic Buffer Overflow vulnerability in Apple products A buffer overflow was addressed with improved size validation. | 5.5 |
2024-10-25 | CVE-2024-10371 | Classic Buffer Overflow vulnerability in Razormist Payroll Management System 1.0 A vulnerability classified as critical has been found in SourceCodester Payroll Management System 1.0. | 9.8 |
2024-10-21 | CVE-2022-48948 | Classic Buffer Overflow vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: usb: gadget: uvc: Prevent buffer overflow in setup handler Setup function uvc_function_setup permits control transfer requests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE), data stage handler for OUT transfer uses memcpy to copy req->actual bytes to uvc_event->data.data array of size 60. | 7.8 |
2024-10-21 | CVE-2022-49023 | Classic Buffer Overflow vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: fix buffer overflow in elem comparison For vendor elements, the code here assumes that 5 octets are present without checking. | 7.8 |