Vulnerabilities (CVE)

Filtered by CWE-125
Total 7228 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-48312 1 Huawei 2 Emui, Harmonyos 2025-02-06 N/A 9.1 CRITICAL
The HwPCAssistant module has the out-of-bounds read/write vulnerability. Successful exploitation of this vulnerability may affect confidentiality and integrity.
CVE-2024-24911 2025-02-06 N/A 5.3 MEDIUM
In rare scenarios, the cpca process on the Security Management Server / Domain Management Server may exit unexpectedly, creating a core dump file. When the cpca process is down, VPN and SIC connectivity issues may occur if the CRL is not present in the Security Gateway's CRL cache.
CVE-2024-25629 2 C-ares, Fedoraproject 2 C-ares, Fedora 2025-02-05 N/A 4.4 MEDIUM
c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist.
CVE-2022-26369 1 Intel 2 Xmm 7560, Xmm 7560 Firmware 2025-02-05 N/A 6.2 MEDIUM
Out-of-bounds read in some Intel(R) XMM(TM) 7560 Modem software before version M2_7560_R_01.2146.00 may allow a privileged user to potentially enable escalation of privilege via adjacent access.
CVE-2023-21080 1 Google 1 Android 2025-02-05 N/A 5.5 MEDIUM
In register_notification_rsp of btif_rc.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-245916076
CVE-2023-20935 1 Google 1 Android 2025-02-05 N/A 5.5 MEDIUM
In deserialize of multiple files, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-256589724
CVE-2025-24497 2025-02-05 N/A 7.5 HIGH
When URL categorization is configured on a virtual server, undisclosed requests can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2024-49838 1 Qualcomm 338 Ar8035, Ar8035 Firmware, Fastconnect 6200 and 335 more 2025-02-05 N/A 8.2 HIGH
Information disclosure while parsing the OCI IE with invalid length.
CVE-2024-49839 1 Qualcomm 372 Ar8035, Ar8035 Firmware, Csr8811 and 369 more 2025-02-05 N/A 8.2 HIGH
Memory corruption during management frame processing due to mismatch in T2LM info element.
CVE-2024-38404 1 Qualcomm 80 Ar8035, Ar8035 Firmware, Fastconnect 7800 and 77 more 2025-02-05 N/A 7.5 HIGH
Transient DOS when registration accept OTA is received with incorrect ciphering key data IE in modem.
CVE-2024-38414 1 Qualcomm 58 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 55 more 2025-02-05 N/A 6.1 MEDIUM
Information disclosure while processing information on firmware image during core initialization.
CVE-2024-38416 1 Qualcomm 144 Ar8035, Ar8035 Firmware, C-v2x 9150 and 141 more 2025-02-05 N/A 6.1 MEDIUM
Information disclosure during audio playback.
CVE-2024-38417 1 Qualcomm 112 Ar8035, Ar8035 Firmware, C-v2x 9150 and 109 more 2025-02-05 N/A 6.1 MEDIUM
Information disclosure while processing IO control commands.
CVE-2023-1255 1 Openssl 1 Openssl 2025-02-04 N/A 5.9 MEDIUM
Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM platform contains a bug that could cause it to read past the input buffer, leading to a crash. Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM platform can crash in rare circumstances. The AES-XTS algorithm is usually used for disk encryption. The AES-XTS cipher decryption implementation for 64 bit ARM platform will read past the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16 byte blocks, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext buffer is unmapped, this will trigger a crash which results in a denial of service. If an attacker can control the size and location of the ciphertext buffer being decrypted by an application using AES-XTS on 64 bit ARM, the application is affected. This is fairly unlikely making this issue a Low severity one.
CVE-2023-20870 1 Vmware 2 Fusion, Workstation 2025-02-04 N/A 6.0 MEDIUM
VMware Workstation and Fusion contain an out-of-bounds read vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine.
CVE-2024-32460 2 Fedoraproject, Freerdp 2 Fedora, Freerdp 2025-02-04 N/A 8.1 HIGH
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing path with a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use modern drawing paths (e.g. `/rfx` or `/gfx` options). The workaround requires server side support.
CVE-2024-32459 2 Fedoraproject, Freerdp 2 Fedora, Freerdp 2025-02-04 N/A 9.8 CRITICAL
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients and servers that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. No known workarounds are available.
CVE-2024-32458 2 Fedoraproject, Freerdp 2 Fedora, Freerdp 2025-02-04 N/A 9.8 CRITICAL
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use `/gfx` or `/rfx` modes (on by default, require server side support).
CVE-2024-32041 2 Fedoraproject, Freerdp 2 Fedora, Freerdp 2025-02-04 N/A 9.8 CRITICAL
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, deactivate `/gfx` (on by default, set `/bpp` or `/rfx` options instead.
CVE-2024-32662 2 Fedoraproject, Freerdp 2 Fedora, Freerdp 2025-02-04 N/A 7.5 HIGH
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available.