Search Results (18646 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-7973 1 Google 1 Chrome 2024-10-24 8.8 High
Heap buffer overflow in PDFium in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file. (Chromium security severity: Medium)
CVE-2024-7535 1 Google 1 Chrome 2024-10-24 8.8 High
Inappropriate implementation in V8 in Google Chrome prior to 127.0.6533.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-42986 1 Tenda 2 Fh1206, Fh1206 Firmware 2024-10-24 7.5 High
Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the PPPOEPassword parameter in the fromAdvSetWan function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
CVE-2024-42977 1 Tenda 2 Fh1206, Fh1206 Firmware 2024-10-24 7.5 High
Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the qos parameter in the fromqossetting function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
CVE-2023-29929 1 Kemptechnologies 1 Loadmaster 2024-10-24 7.5 High
Buffer Overflow vulnerability found in Kemptechnologies Loadmaster before v.7.2.60.0 allows a remote attacker to casue a denial of service via the libkemplink.so, isreverse library.
CVE-2024-42642 2 Crucial, Micron 7 Ct1000mx500ssd1, Ct2000mx500ssd1, Ct250mx500ssd1 and 4 more 2024-10-24 9.8 Critical
Micron Crucial MX500 Series Solid State Drives M3CR046 is vulnerable to Buffer Overflow, which can be triggered by sending specially crafted ATA packets from the host to the drive controller.
CVE-2024-10194 1 Wavlink 6 Wn530h4, Wn530h4 Firmware, Wn530hg4 and 3 more 2024-10-23 8.8 High
A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. It has been classified as critical. Affected is the function Goto_chidx of the file login.cgi of the component Front-End Authentication Page. The manipulation of the argument wlanUrl leads to stack-based buffer overflow. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-41902 1 Siemens 1 Jt2go 2024-10-23 7.8 High
A vulnerability has been identified in JT2Go (All versions < V2406.0003). The affected application contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process.
CVE-2024-20461 1 Cisco 5 Ata 190 Firmware, Ata 191, Ata 191 Firmware and 2 more 2024-10-22 6 Medium
A vulnerability in the CLI&nbsp;of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an authenticated, local attacker with high privileges to execute arbitrary commands as the root user. This vulnerability exists because CLI input is not properly sanitized. An attacker could exploit this vulnerability by sending malicious characters to the CLI. A successful exploit could allow the attacker to read and write to the underlying operating system as the root user.
CVE-2024-20459 1 Cisco 5 Ata 190 Firmware, Ata 191, Ata 191 Firmware and 2 more 2024-10-22 6.5 Medium
A vulnerability in the web-based management interface of Cisco ATA 190 Multiplatform Series Analog Telephone Adapter firmware could allow an authenticated, remote attacker with high privileges to execute arbitrary commands as the root user on the underlying operating system. This vulnerability is due to a lack of input sanitization in the web-based management interface. An attacker could exploit this vulnerability by sending a malicious request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user.
CVE-2024-20458 1 Cisco 5 Ata 190 Firmware, Ata 191, Ata 191 Firmware and 2 more 2024-10-22 8.2 High
A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to view or delete the configuration or change the firmware on an affected device. This vulnerability is due to a lack of authentication on specific HTTP endpoints. An attacker could exploit this vulnerability by browsing to a specific URL. A successful exploit could allow the attacker to view or delete the configuration or change the firmware.
CVE-2024-9820 1 Dueclic 1 Wp 2fa With Telegram 2024-10-19 6.5 Medium
The WP 2FA with Telegram plugin for WordPress is vulnerable to Two-Factor Authentication Bypass in versions up to, and including, 3.0. This is due to the two-factor code being stored in a cookie, which makes it possible to bypass two-factor authentication.
CVE-2024-10118 1 Secom 1 Wrtr-304gn-304tw-upsc Firmware 2024-10-18 9.8 Critical
SECOM WRTR-304GN-304TW-UPSC does not properly filter user input in the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
CVE-2024-9464 1 Paloaltonetworks 1 Expedition 2024-10-18 6.5 Medium
An OS command injection vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.
CVE-2024-45144 3 Adobe, Apple, Microsoft 3 Substance 3d Stager, Macos, Windows 2024-10-18 7.8 High
Substance3D - Stager versions 3.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-45143 3 Adobe, Apple, Microsoft 3 Substance 3d Stager, Macos, Windows 2024-10-18 7.8 High
Substance3D - Stager versions 3.0.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-45141 3 Adobe, Apple, Microsoft 3 Substance 3d Stager, Macos, Windows 2024-10-18 7.8 High
Substance3D - Stager versions 3.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-45140 3 Adobe, Apple, Microsoft 3 Substance 3d Stager, Macos, Windows 2024-10-18 7.8 High
Substance3D - Stager versions 3.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-45139 3 Adobe, Apple, Microsoft 3 Substance 3d Stager, Macos, Windows 2024-10-18 7.8 High
Substance3D - Stager versions 3.0.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-45152 3 Adobe, Apple, Microsoft 3 Substance 3d Stager, Macos, Windows 2024-10-18 7.8 High
Substance3D - Stager versions 3.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.