Vulnerabilities (CVE)

Filtered by CWE-120
Total 3613 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2002-0062 5 Debian, Freebsd, Gnu and 2 more 5 Debian Linux, Freebsd, Ncurses and 2 more 2025-04-03 7.2 HIGH N/A
Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."
CVE-2000-0547 3 Cygnus Network Security Project, Kerbnet Project, Mit 4 Cygnus Network Security, Kerbnet, Kerberos and 1 more 2025-04-03 5.0 MEDIUM N/A
Buffer overflow in Kerberos 4 KDC program allows remote attackers to cause a denial of service via the localrealm variable in the process_v4 function.
CVE-2006-0963 1 Stlport Project 1 Stlport 2025-04-03 4.6 MEDIUM N/A
Multiple buffer overflows in STLport 5.0.2 might allow local users to execute arbitrary code via (1) long locale environment variables to a strcpy function call in c_locale_glibc2.c and (2) long arguments to unspecified functions in num_put_float.cpp.
CVE-2000-1216 1 Ibm 1 Aix 2025-04-03 7.2 HIGH N/A
Buffer overflow in portmir for AIX 4.3.0 allows local users to corrupt lock files and gain root privileges via the echo_error routine.
CVE-2006-3404 1 Gimp 1 Gimp 2025-04-03 5.1 MEDIUM N/A
Buffer overflow in the xcf_load_vector function in app/xcf/xcf-load.c for gimp before 2.2.12 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XCF file with a large num_axes value in the VECTORS property.
CVE-2024-25196 2 Opennav, Openrobotics 2 Nav2, Robot Operating System 2025-04-02 N/A 3.3 LOW
Open Robotics Robotic Operating Sytstem 2 (ROS2) and Nav2 humble versions were discovered to contain a buffer overflow via the nav2_controller process. This vulnerability is triggerd via sending a crafted .yaml file.
CVE-2023-52735 1 Linux 1 Linux Kernel 2025-04-02 N/A 9.1 CRITICAL
In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself sock_map proto callbacks should never call themselves by design. Protect against bugs like [1] and break out of the recursive loop to avoid a stack overflow in favor of a resource leak. [1] https://lore.kernel.org/all/00000000000073b14905ef2e7401@google.com/
CVE-2021-47347 1 Linux 1 Linux Kernel 2025-04-02 N/A 8.8 HIGH
In the Linux kernel, the following vulnerability has been resolved: wl1251: Fix possible buffer overflow in wl1251_cmd_scan Function wl1251_cmd_scan calls memcpy without checking the length. Harden by checking the length is within the maximum allowed size.
CVE-2025-29137 1 Tenda 2 Ac7, Ac7 Firmware 2025-04-01 N/A 9.8 CRITICAL
Tenda AC7 V1.0 V15.03.06.44 found a buffer overflow caused by the timeZone parameter in the form_fast_setting_wifi_set function, which can cause RCE.
CVE-2024-38576 1 Linux 1 Linux Kernel 2025-04-01 N/A 7.1 HIGH
In the Linux kernel, the following vulnerability has been resolved: rcu: Fix buffer overflow in print_cpu_stall_info() The rcuc-starvation output from print_cpu_stall_info() might overflow the buffer if there is a huge difference in jiffies difference. The situation might seem improbable, but computers sometimes get very confused about time, which can result in full-sized integers, and, in this case, buffer overflow. Also, the unsigned jiffies difference is printed using %ld, which is normally for signed integers. This is intentional for debugging purposes, but it is not obvious from the code. This commit therefore changes sprintf() to snprintf() and adds a clarifying comment about intention of %ld format. Found by Linux Verification Center (linuxtesting.org) with SVACE.
CVE-2024-50667 1 Trendnet 2 Tew-820ap, Tew-820ap Firmware 2025-04-01 N/A 9.8 CRITICAL
The boa httpd of Trendnet TEW-820AP 1.01.B01 has a stack overflow vulnerability in /boafrm/formIPv6Addr, /boafrm/formIpv6Setup, /boafrm/formDnsv6. The reason is that the check of ipv6 address is not sufficient, which allows attackers to construct payloads for attacks.
CVE-2024-42813 1 Trendnet 2 Tew-752dru, Tew-752dru Firmware 2025-04-01 N/A 9.8 CRITICAL
In TRENDnet TEW-752DRU FW1.03B01, there is a buffer overflow vulnerability due to the lack of length verification for the service field in gena.cgi. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
CVE-2025-27833 1 Artifex 1 Ghostscript 2025-04-01 N/A 7.8 HIGH
An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs for a long TTF font name to pdf/pdf_fmap.c.
CVE-2025-27834 1 Artifex 1 Ghostscript 2025-04-01 N/A 7.8 HIGH
An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs via an oversized Type 4 function in a PDF document to pdf/pdf_func.c.
CVE-2025-26002 1 Telesquare 2 Tlr-2005ksh, Tlr-2005ksh Firmware 2025-04-01 N/A 9.8 CRITICAL
Telesquare TLR-2005KSH 1.1.4 is affected by an unauthorized stack overflow vulnerability when requesting the admin.cgi parameter with setSyncTimeHost.
CVE-2025-26004 1 Telesquare 2 Tlr-2005ksh, Tlr-2005ksh Firmware 2025-04-01 N/A 9.8 CRITICAL
Telesquare TLR-2005KSH 1.1.4 is vulnerable to unauthorized stack buffer overflow vulnerability when requesting admin.cgi parameter with setDdns.
CVE-2025-26005 1 Telesquare 2 Tlr-2005ksh, Tlr-2005ksh Firmware 2025-04-01 N/A 9.8 CRITICAL
Telesquare TLR-2005KSH 1.1.4 is vulnerable to unauthorized stack overflow vulnerability when requesting admin.cgi parameter with setNtp.
CVE-2025-26006 1 Telesquare 2 Tlr-2005ksh, Tlr-2005ksh Firmware 2025-04-01 N/A 9.8 CRITICAL
Telesquare TLR-2005KSH 1.1.4 has an unauthorized stack overflow vulnerability when requesting the admin.cgi parameter with setAutorest.
CVE-2025-26007 1 Telesquare 2 Tlr-2005ksh, Tlr-2005ksh Firmware 2025-04-01 N/A 9.8 CRITICAL
Telesquare TLR-2005KSH 1.1.4 has an unauthorized stack overflow vulnerability in the login interface when requesting systemtil.cgi.
CVE-2025-26008 1 Telesquare 2 Tlr-2005ksh, Tlr-2005ksh Firmware 2025-04-01 N/A 9.8 CRITICAL
In Telesquare TLR-2005KSH 1.1.4, an unauthorized stack overflow vulnerability exists when requesting admin.cgi parameter with setSyncTimeHost.