Vulnerabilities (CVE)

Filtered by CWE-787
Total 12512 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-25050 1 Rtl 433 Project 1 Rlt 433 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
rtl_433 21.12 was discovered to contain a stack overflow in the function somfy_iohc_decode(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file.
CVE-2022-25044 1 Espruino 1 Espruino 2024-11-21 6.8 MEDIUM 7.8 HIGH
Espruino 2v11.251 was discovered to contain a stack buffer overflow via src/jsvar.c in jsvNewFromString.
CVE-2022-25023 1 Audio File Project 1 Audio File 2024-11-21 6.8 MEDIUM 8.8 HIGH
Audio File commit 004065d was discovered to contain a heap-buffer overflow in the function fouBytesToInt():AudioFile.h.
CVE-2022-24995 1 Tenda 2 Ax3, Ax3 Firmware 2024-11-21 7.5 HIGH 9.8 CRITICAL
Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function fromSetSysTime. This vulnerability allows attackers to cause a Denial of Service (DoS) via the time parameter.
CVE-2022-24954 2 Foxit, Microsoft 3 Pdf Editor, Pdf Reader, Windows 2024-11-21 7.5 HIGH 9.8 CRITICAL
Foxit PDF Reader before 11.2.1 and Foxit PDF Editor before 11.2.1 have a Stack-Based Buffer Overflow related to XFA, for the 'subform colSpan="-2"' and 'draw colSpan="1"' substrings.
CVE-2022-24942 1 Silabs 1 Micrium Uc-http 2024-11-21 N/A 9.1 CRITICAL
Heap based buffer overflow in HTTP Server functionality in Micrium uC-HTTP 3.01.01 allows remote code execution via HTTP request.
CVE-2022-24939 1 Silabs 2 Gecko Software Development Kit, Zigbee Emberznet 2024-11-21 N/A 5.7 MEDIUM
 A malformed packet containing an invalid destination address, causes a stack overflow in the Ember ZNet stack. This causes an assert which leads to a reset, immediately clearing the error.
CVE-2022-24938 1 Silabs 1 Emberznet 2024-11-21 N/A 6.5 MEDIUM
A malformed packet causes a stack overflow in the Ember ZNet stack. This causes an assert which leads to a reset, immediately clearing the error.
CVE-2022-24936 1 Silabs 1 Gecko Bootloader 2024-11-21 N/A 8.3 HIGH
Out-of-Bounds error in GBL parser in Silicon Labs Gecko Bootloader version 4.0.1 and earlier allows attacker to overwrite flash Sign key and OTA decryption key via malicious bootloader upgrade.
CVE-2022-24893 1 Espressif 1 Esp-idf 2024-11-21 8.3 HIGH 7.5 HIGH
ESP-IDF is the official development framework for Espressif SoCs. In Espressif’s Bluetooth Mesh SDK (`ESP-BLE-MESH`), a memory corruption vulnerability can be triggered during provisioning, because there is no check for the `SegN` field of the Transaction Start PDU. This can result in memory corruption related attacks and potentially attacker gaining control of the entire system. Patch commits are available on the 4.1, 4.2, 4.3 and 4.4 branches and users are recommended to upgrade. The upgrade is applicable for all applications and users of `ESP-BLE-MESH` component from `ESP-IDF`. As it is implemented in the Bluetooth Mesh stack, there is no workaround for the user to fix the application layer without upgrading the underlying firmware.
CVE-2022-24786 2 Debian, Pjsip 2 Debian Linux, Pjsip 2024-11-21 7.5 HIGH 9.8 CRITICAL
PJSIP is a free and open source multimedia communication library written in C. PJSIP versions 2.12 and prior do not parse incoming RTCP feedback RPSI (Reference Picture Selection Indication) packet, but any app that directly uses pjmedia_rtcp_fb_parse_rpsi() will be affected. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds.
CVE-2022-24764 2 Debian, Teluu 2 Debian Linux, Pjsip 2024-11-21 5.0 MEDIUM 7.5 HIGH
PJSIP is a free and open source multimedia communication library written in C. Versions 2.12 and prior contain a stack buffer overflow vulnerability that affects PJSUA2 users or users that call the API `pjmedia_sdp_print(), pjmedia_sdp_media_print()`. Applications that do not use PJSUA2 and do not directly call `pjmedia_sdp_print()` or `pjmedia_sdp_media_print()` should not be affected. A patch is available on the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds.
CVE-2022-24674 1 Canon 152 1435i\+, 1435i\+ Firmware, 1435if and 149 more 2024-11-21 N/A 8.8 HIGH
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Canon imageCLASS MF644Cdw 10.02 printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the privet API. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15834.
CVE-2022-24673 1 Canon 152 1435i\+, 1435i\+ Firmware, 1435if and 149 more 2024-11-21 N/A 9.8 CRITICAL
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Canon imageCLASS MF644Cdw 10.02 printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the SLP protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15845.
CVE-2022-24672 1 Canon 152 1435i\+, 1435i\+ Firmware, 1435if and 149 more 2024-11-21 N/A 8.8 HIGH
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Canon imageCLASS MF644Cdw 10.02 printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CADM service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15802.
CVE-2022-24661 1 Siemens 1 Simcenter Star-ccm\+ Viewer 2024-11-21 6.8 MEDIUM 7.8 HIGH
A vulnerability has been identified in Simcenter STAR-CCM+ Viewer (All versions < V2022.1). The starview+.exe contains a memory corruption vulnerability while parsing specially crafted .SCE files. This could allow an attacker to execute code in the context of the current process.
CVE-2022-24655 1 Netgear 8 Cax80, Cax80 Firmware, Dc112a and 5 more 2024-11-21 7.2 HIGH 7.8 HIGH
A stack overflow vulnerability exists in the upnpd service in Netgear EX6100v1 201.0.2.28, CAX80 2.1.2.6, and DC112A 1.0.0.62, which may lead to the execution of arbitrary code without authentication.
CVE-2022-24578 1 Gpac 1 Gpac 2024-11-21 6.8 MEDIUM 7.8 HIGH
GPAC 1.0.1 is affected by a heap-based buffer overflow in SFS_AddString () at bifs/script_dec.c.
CVE-2022-24575 1 Gpac 1 Gpac 2024-11-21 6.8 MEDIUM 7.8 HIGH
GPAC 1.0.1 is affected by a stack-based buffer overflow through MP4Box.
CVE-2022-24457 1 Microsoft 1 Heif Image Extension 2024-11-21 6.8 MEDIUM 7.8 HIGH
HEIF Image Extensions Remote Code Execution Vulnerability