Vulnerabilities > Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

DATE CVE VULNERABILITY TITLE RISK
2024-11-07 CVE-2024-10964 Classic Buffer Overflow vulnerability in Emqx Neuron
A vulnerability classified as critical has been found in emqx neuron up to 2.10.0.
network
low complexity
emqx CWE-120
critical
9.8
2024-11-05 CVE-2024-50131 Classic Buffer Overflow vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: tracing: Consider the NULL character when validating the event length strlen() returns a string length excluding the null byte.
local
low complexity
linux CWE-120
7.8
2024-11-04 CVE-2024-33030 Classic Buffer Overflow vulnerability in Qualcomm products
Memory corruption while parsing IPC frequency table parameters for LPLH that has size greater than expected size.
local
low complexity
qualcomm CWE-120
6.7
2024-11-04 CVE-2024-38409 Classic Buffer Overflow vulnerability in Qualcomm products
Memory corruption while station LL statistic handling.
local
low complexity
qualcomm CWE-120
7.8
2024-11-04 CVE-2024-38423 Classic Buffer Overflow vulnerability in Qualcomm products
Memory corruption while processing GPU page table switch.
local
low complexity
qualcomm CWE-120
7.8
2024-10-31 CVE-2024-10559 Classic Buffer Overflow vulnerability in Razormist Airport Booking Management System 1.0
A vulnerability was found in SourceCodester Airport Booking Management System 1.0 and classified as critical.
local
low complexity
razormist CWE-120
7.8
2024-10-28 CVE-2024-44144 Classic Buffer Overflow vulnerability in Apple products
A buffer overflow was addressed with improved size validation.
local
low complexity
apple CWE-120
5.5
2024-10-25 CVE-2024-10371 Classic Buffer Overflow vulnerability in Razormist Payroll Management System 1.0
A vulnerability classified as critical has been found in SourceCodester Payroll Management System 1.0.
network
low complexity
razormist CWE-120
critical
9.8
2024-10-21 CVE-2022-48948 Classic Buffer Overflow vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: uvc: Prevent buffer overflow in setup handler Setup function uvc_function_setup permits control transfer requests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE), data stage handler for OUT transfer uses memcpy to copy req->actual bytes to uvc_event->data.data array of size 60.
local
low complexity
linux CWE-120
7.8
2024-10-21 CVE-2022-49023 Classic Buffer Overflow vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: fix buffer overflow in elem comparison For vendor elements, the code here assumes that 5 octets are present without checking.
local
low complexity
linux CWE-120
7.8