Vulnerabilities (CVE)

Filtered by CWE-120
Total 3128 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-46595 1 Draytek 2 Vigor3910, Vigor3910 Firmware 2025-03-13 N/A 7.5 HIGH
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the saveitem parameter at lan2lan.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVE-2023-52365 1 Huawei 2 Emui, Harmonyos 2025-03-13 N/A 5.3 MEDIUM
Out-of-bounds read vulnerability in the smart activity recognition module.Successful exploitation of this vulnerability may cause features to perform abnormally.
CVE-2024-46557 1 Draytek 2 Vigor3910, Vigor3910 Firmware 2025-03-13 N/A 7.5 HIGH
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sProfileName parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVE-2024-37632 1 Totolink 2 A3700r, A3700r Firmware 2025-03-13 N/A 9.8 CRITICAL
TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via the password parameter in function loginAuth .
CVE-2024-30584 1 Tenda 2 Fh1202, Fh1202 Firmware 2025-03-13 N/A 9.8 CRITICAL
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the security parameter of the formWifiBasicSet function.
CVE-2024-30593 1 Tenda 2 Fh1202, Fh1202 Firmware 2025-03-13 N/A 9.8 CRITICAL
Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability located in the deviceName parameter of the formSetDeviceName function.
CVE-2024-46586 1 Draytek 2 Vigor3910, Vigor3910 Firmware 2025-03-13 N/A 7.5 HIGH
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sCloudPass parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVE-2024-46565 1 Draytek 2 Vigor3910, Vigor3910 Firmware 2025-03-13 N/A 7.5 HIGH
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sSrvName parameter at service.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVE-2024-29645 2025-03-13 N/A 7.8 HIGH
Buffer Overflow vulnerability in radarorg radare2 v.5.8.8 allows an attacker to execute arbitrary code via the parse_die function.
CVE-2023-52364 1 Huawei 2 Emui, Harmonyos 2025-03-13 N/A 6.3 MEDIUM
Vulnerability of input parameters being not strictly verified in the RSMC module. Impact: Successful exploitation of this vulnerability may cause out-of-bounds write.
CVE-2023-52551 1 Huawei 2 Emui, Harmonyos 2025-03-13 N/A 5.3 MEDIUM
Vulnerability of data verification errors in the kernel module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2023-52549 1 Huawei 2 Emui, Harmonyos 2025-03-13 N/A 7.5 HIGH
Vulnerability of data verification errors in the kernel module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2023-52550 1 Huawei 2 Emui, Harmonyos 2025-03-13 N/A 7.5 HIGH
Vulnerability of data verification errors in the kernel module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2024-33809 2025-03-13 N/A 6.5 MEDIUM
PingCAP TiDB v7.5.1 was discovered to contain a buffer overflow vulnerability, which could lead to database crashes and denial of service attacks.
CVE-2023-52377 1 Huawei 2 Emui, Harmonyos 2025-03-13 N/A 7.4 HIGH
Vulnerability of input data not being verified in the cellular data module.Successful exploitation of this vulnerability may cause out-of-bounds access.
CVE-2023-52370 1 Huawei 2 Emui, Harmonyos 2025-03-13 N/A 9.8 CRITICAL
Stack overflow vulnerability in the network acceleration module.Successful exploitation of this vulnerability may cause unauthorized file access.
CVE-2023-52366 1 Huawei 2 Emui, Harmonyos 2025-03-13 N/A 7.5 HIGH
Out-of-bounds read vulnerability in the smart activity recognition module.Successful exploitation of this vulnerability may cause features to perform abnormally.
CVE-2025-25900 2025-03-13 N/A 4.9 MEDIUM
A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11 via the username and password parameters at /userRpm/PPPoEv6CfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
CVE-2025-20115 2025-03-12 N/A 8.6 HIGH
A vulnerability in confederation implementation for the Border Gateway Protocol (BGP) in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to a memory corruption that occurs when a BGP update is created with an AS_CONFED_SEQUENCE attribute that has 255 autonomous system numbers (AS numbers). An attacker could exploit this vulnerability by sending a crafted BGP update message, or the network could be designed in such a manner that the AS_CONFED_SEQUENCE attribute grows to 255 AS numbers or more. A successful exploit could allow the attacker to cause memory corruption, which may cause the BGP process to restart, resulting in a DoS condition. To exploit this vulnerability, an attacker must control a BGP confederation speaker within the same autonomous system as the victim, or the network must be designed in such a manner that the AS_CONFED_SEQUENCE attribute grows to 255 AS numbers or more.
CVE-2025-2017 2025-03-11 N/A 7.8 HIGH
Ashlar-Vellum Cobalt CO File Parsing Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25240.