Vulnerabilities > Out-of-bounds Write
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-04-27 | CVE-2018-21170 | Out-of-bounds Write vulnerability in Netgear products Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. | 5.8 |
2020-04-27 | CVE-2018-21149 | Out-of-bounds Write vulnerability in Netgear products Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. | 5.2 |
2020-04-27 | CVE-2018-21097 | Out-of-bounds Write vulnerability in Netgear products Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. | 7.5 |
2020-04-27 | CVE-2018-21093 | Out-of-bounds Write vulnerability in Netgear products Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. | 5.8 |
2020-04-27 | CVE-2020-12268 | Out-of-bounds Write vulnerability in multiple products jbig2_image_compose in jbig2_image.c in Artifex jbig2dec before 0.18 has a heap-based buffer overflow. | 7.5 |
2020-04-24 | CVE-2020-6822 | Out-of-bounds Write vulnerability in Mozilla Firefox On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in <code>GMPDecodeData</code>. | 6.8 |
2020-04-24 | CVE-2017-18699 | Out-of-bounds Write vulnerability in Netgear R7800 Firmware and R9000 Firmware Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. | 5.2 |
2020-04-24 | CVE-2017-18698 | Out-of-bounds Write vulnerability in Netgear R6100 Firmware, R7800 Firmware and R9000 Firmware Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. | 5.2 |
2020-04-24 | CVE-2017-18697 | Out-of-bounds Write vulnerability in Netgear R7800 Firmware and R9000 Firmware Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. | 5.2 |
2020-04-24 | CVE-2017-18727 | Out-of-bounds Write vulnerability in Netgear products Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. | 5.8 |