Vulnerabilities > Unchecked Return Value
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-07-29 | CVE-2024-42067 | Unchecked Return Value vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: bpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro() set_memory_rox() can fail, leaving memory unprotected. Check return and bail out when bpf_jit_binary_lock_ro() returns an error. | 5.5 |
2024-07-29 | CVE-2024-42068 | Unchecked Return Value vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro() set_memory_ro() can fail, leaving memory unprotected. Check its return and take it into account as an error. | 5.5 |
2024-02-14 | CVE-2023-26591 | Unchecked Return Value vulnerability in Intel Thunderbolt DCH Driver 1.41.1054.0/72 Unchecked return value in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an unauthenticated user to potentially enable denial of service via physical access. | 2.0 |
2024-02-02 | CVE-2023-50359 | Unchecked Return Value vulnerability in Qnap Qts, Quts Hero and Qutscloud An unchecked return value vulnerability has been reported to affect several QNAP operating system versions. | 6.7 |
2024-01-23 | CVE-2024-0743 | Unchecked Return Value vulnerability in Mozilla Firefox An unchecked return value in TLS handshake code could have caused a potentially exploitable crash. | 7.5 |
2023-12-19 | CVE-2023-6918 | Unchecked Return Value vulnerability in multiple products A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. | 5.3 |
2023-10-13 | CVE-2023-44182 | Unchecked Return Value vulnerability in Juniper Junos and Junos OS Evolved An Unchecked Return Value vulnerability in the user interfaces to the Juniper Networks Junos OS and Junos OS Evolved, the CLI, the XML API, the XML Management Protocol, the NETCONF Management Protocol, the gNMI interfaces, and the J-Web User Interfaces causes unintended effects such as demotion or elevation of privileges associated with an operators actions to occur. Multiple scenarios may occur; for example: privilege escalation over the device or another account, access to files that should not otherwise be accessible, files not being accessible where they should be accessible, code expected to run as non-root may run as root, and so forth. This issue affects: Juniper Networks Junos OS * All versions prior to 20.4R3-S7; * 21.1 versions prior to 21.1R3-S5; * 21.2 versions prior to 21.2R3-S5; * 21.3 versions prior to 21.3R3-S4; * 21.4 versions prior to 21.4R3-S3; * 22.1 versions prior to 22.1R3-S2; * 22.2 versions prior to 22.2R2-S2, 22.2R3; * 22.3 versions prior to 22.3R1-S2, 22.3R2. Juniper Networks Junos OS Evolved * All versions prior to 21.4R3-S3-EVO; * 22.1-EVO version 22.1R1-EVO and later versions prior to 22.2R2-S2-EVO, 22.2R3-EVO; * 22.3-EVO versions prior to 22.3R1-S2-EVO, 22.3R2-EVO. | 8.8 |
2023-09-28 | CVE-2023-5215 | Unchecked Return Value vulnerability in Redhat Enterprise Linux and Libnbd A flaw was found in libnbd. | 6.5 |
2023-08-14 | CVE-2023-40303 | Unchecked Return Value vulnerability in GNU Inetutils GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. | 7.8 |
2023-08-11 | CVE-2023-29243 | Unchecked Return Value vulnerability in Intel Realsense 450 FA Firmware 0.25.0 Unchecked return value in some Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA in version 0.25.0 may allow a priviledged user to potentially enable denial of service via local access. | 4.4 |