Vulnerabilities > Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

DATE CVE VULNERABILITY TITLE RISK
2024-11-04 CVE-2024-38409 Classic Buffer Overflow vulnerability in Qualcomm products
Memory corruption while station LL statistic handling.
local
low complexity
qualcomm CWE-120
7.8
2024-11-04 CVE-2024-38423 Classic Buffer Overflow vulnerability in Qualcomm products
Memory corruption while processing GPU page table switch.
local
low complexity
qualcomm CWE-120
7.8
2024-10-31 CVE-2024-10559 Classic Buffer Overflow vulnerability in Razormist Airport Booking Management System 1.0
A vulnerability was found in SourceCodester Airport Booking Management System 1.0 and classified as critical.
local
low complexity
razormist CWE-120
7.8
2024-10-28 CVE-2024-44144 Classic Buffer Overflow vulnerability in Apple products
A buffer overflow was addressed with improved size validation.
local
low complexity
apple CWE-120
5.5
2024-10-25 CVE-2024-10371 Classic Buffer Overflow vulnerability in Razormist Payroll Management System 1.0
A vulnerability classified as critical has been found in SourceCodester Payroll Management System 1.0.
network
low complexity
razormist CWE-120
critical
9.8
2024-10-21 CVE-2022-48948 Classic Buffer Overflow vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: uvc: Prevent buffer overflow in setup handler Setup function uvc_function_setup permits control transfer requests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE), data stage handler for OUT transfer uses memcpy to copy req->actual bytes to uvc_event->data.data array of size 60.
local
low complexity
linux CWE-120
7.8
2024-10-21 CVE-2022-49023 Classic Buffer Overflow vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: fix buffer overflow in elem comparison For vendor elements, the code here assumes that 5 octets are present without checking.
local
low complexity
linux CWE-120
7.8
2024-10-21 CVE-2024-49869 Classic Buffer Overflow vulnerability in Linux Kernel 6.11
In the Linux kernel, the following vulnerability has been resolved: btrfs: send: fix buffer overflow detection when copying path to cache entry Starting with commit c0247d289e73 ("btrfs: send: annotate struct name_cache_entry with __counted_by()") we annotated the variable length array "name" from the name_cache_entry structure with __counted_by() to improve overflow detection.
local
low complexity
linux CWE-120
7.8
2024-10-21 CVE-2024-49996 Classic Buffer Overflow vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix buffer overflow when parsing NFS reparse points ReparseDataLength is sum of the InodeType size and DataBuffer size. So to get DataBuffer size it is needed to subtract InodeType's size from ReparseDataLength. Function cifs_strndup_from_utf16() is currentlly accessing buf->DataBuffer at position after the end of the buffer because it does not subtract InodeType size from the length.
local
low complexity
linux CWE-120
7.8
2024-10-21 CVE-2024-47751 Classic Buffer Overflow vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port() Within kirin_pcie_parse_port(), the pcie->num_slots is compared to pcie->gpio_id_reset size (MAX_PCI_SLOTS) which is correct and would lead to an overflow. Thus, fix condition to pcie->num_slots + 1 >= MAX_PCI_SLOTS and move pcie->num_slots increment below the if-statement to avoid out-of-bounds array access. Found by Linux Verification Center (linuxtesting.org) with SVACE. [kwilczynski: commit log]
local
low complexity
linux CWE-120
7.8