CVE ID | CVSS | Vendor | Exploit | Patch | Trends |
---|---|---|---|---|---|
CVE-2024-9843A buffer over-read in Ivanti Secure Access Client before 22.7R4 allows a local unauthenticated attacker to cause a denial of service. | CVSS 5 | Ivanti | - | - | |
CVE-2024-9029A flaw was found in freeimage library. Processing a crafted image can cause a buffer over-read of 1 byte in the read_iptc_profile function in the Source/Metadata/IPTC.cpp file because the size of the profile is not being sanitized, causing a crash in the application linked to the library, resulting in a denial of service. | CVSS 7.5 | Freeimage project | - | - | |
CVE-2024-7347NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | CVSS 4.7 | Nginx, et al | - | Patched | |
CVE-2024-6874libcurl's URL API function
[curl_url_get()](https://curl.se/libcurl/c/curl_url_get.html) offers punycode
conversions, to and from IDN. Asking to convert a name that is exactly 256
bytes, libcurl ends up reading outside of a stack based buffer when built to
use the *macidn* IDN backend. The conversion function then fills up the
provided buffer exactly - but does not null terminate the string.
This flaw can lead to stack contents accidently getting returned as part of
the converted string. | CVSS 4.3 | Haxx | Exploit | Patched | |
CVE-2024-49031Microsoft Office Graphics Remote Code Execution Vulnerability | CVSS 7.8 | Microsoft | - | Patched | |
CVE-2024-43595Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | CVSS 6.5 | Microsoft | - | Patched | |
CVE-2024-43500Windows Resilient File System (ReFS) Information Disclosure Vulnerability | CVSS 5.5 | Microsoft | - | Patched | |
CVE-2024-43475Microsoft Windows Admin Center Information Disclosure Vulnerability | CVSS 7.3 | Microsoft | - | Patched | |
CVE-2024-38405[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 6.5 | Cisco, et al | - | Patched | |
CVE-2024-38403[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 6.5 | Citrix, et al | - | Patched | |
CVE-2024-38397Transient DOS while parsing probe response and assoc response frame. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-38373FreeRTOS-Plus-TCP is a lightweight TCP/IP stack for FreeRTOS. FreeRTOS-Plus-TCP versions 4.0.0 through 4.1.0 contain a buffer over-read issue in the DNS Response Parser when parsing domain names in a DNS response. A carefully crafted DNS response with domain name length value greater than the actual domain name length, could cause the parser to read beyond the DNS response buffer. This issue affects applications using DNS functionality of the FreeRTOS-Plus-TCP stack. Applications that do not use DNS functionality are not affected, even when the DNS functionality is enabled. This vulnerability has been patched in version 4.1.1. | CVSS 8.1 | Amazon | - | Patched | |
CVE-2024-38265Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | CVSS 8.8 | Microsoft | - | Patched | |
CVE-2024-38261Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | CVSS 7.8 | Microsoft | - | Patched | |
CVE-2024-38250Windows Graphics Component Elevation of Privilege Vulnerability | CVSS 7.8 | Microsoft | - | Patched | |
CVE-2024-38135Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability | CVSS 7.8 | Microsoft | - | Patched | |
CVE-2024-38127Windows Hyper-V Elevation of Privilege Vulnerability | CVSS 7.8 | Microsoft | Exploit | Patched | |
CVE-2024-38071Windows Remote Desktop Licensing Service Denial of Service Vulnerability | CVSS 7.5 | Microsoft | - | Patched | |
CVE-2024-34459An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c. | CVSS 7.5 | Tenable | - | Patched | |
CVE-2024-33427This CVE ID has been rejected or withdrawn by its CVE Numbering Authority for the following reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. | CVSS 6.2 | - | Patched | ||
CVE-2024-33073Information disclosure while parsing the BSS parameter change count or MLD capabilities fields of the ML IE. | CVSS 8.2 | Qualcomm | - | Patched | |
CVE-2024-33071Transient DOS while parsing the MBSSID IE from the beacons when IE length is 0. | CVSS 7.5 | Arubanetworks, et al | - | Patched | |
CVE-2024-33070Transient DOS while parsing ESP IE from beacon/probe response frame. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-33064Information disclosure while parsing the multiple MBSSID IEs from the beacon. | CVSS 8.2 | Google, et al | - | Patched | |
CVE-2024-33057[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-33051[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Cisco, et al | - | Patched | |
CVE-2024-33050[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-33049[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-33048[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-33047Memory corruption when the captureRead QDCM command is invoked from user-space. | CVSS 7.8 | Qualcomm | - | Patched | |
CVE-2024-33043[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 5.5 | Apache | - | Patched | |
CVE-2024-33026[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-33025[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-33020[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Cisco | - | Patched | |
CVE-2024-33019[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-33018[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-33015[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-33014[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-33013[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-33012[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-33011[HIGH] These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Cisco | - | Patched | |
CVE-2024-31082A heap-based buffer over-read vulnerability was found in the X.org server's ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads. | CVSS 7.3 | X.org | - | - | |
CVE-2024-31081A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads. | CVSS 7.3 | - | - | ||
CVE-2024-31080A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads. | CVSS 7.3 | - | Patched | ||
CVE-2024-3077An malicious BLE device can crash BLE victim device by sending malformed gatt packet | CVSS 6.8 | - | - | ||
CVE-2024-30079Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | CVSS 7.8 | Microsoft | - | Patched | |
CVE-2024-30071Windows Remote Access Connection Manager Information Disclosure Vulnerability | CVSS 4.7 | Microsoft | - | Patched | |
CVE-2024-30069Windows Remote Access Connection Manager Information Disclosure Vulnerability | CVSS 4.7 | Microsoft | - | Patched | |
CVE-2024-30039Windows Remote Access Connection Manager Information Disclosure Vulnerability | CVSS 5.5 | - | Patched | ||
CVE-2024-28902Windows Remote Access Connection Manager Information Disclosure Vulnerability | CVSS 5.5 | - | Patched | ||
CVE-2024-28901Windows Remote Access Connection Manager Information Disclosure Vulnerability | CVSS 5.5 | - | Patched | ||
CVE-2024-28900Windows Remote Access Connection Manager Information Disclosure Vulnerability | CVSS 5.5 | - | Patched | ||
CVE-2024-27280An issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The ungetbyte and ungetc methods on a StringIO can read past the end of a string, and a subsequent call to StringIO.gets may return the memory value. This vulnerability is not affected StringIO 3.0.3 and later, and Ruby 3.2.x and later. We recommend to update the StringIO gem to version 3.0.3 or later. In order to ensure compatibility with bundled version in older Ruby series, you may update as follows instead: For Ruby 3.0 users: Update to stringio 3.0.1.1
For Ruby 3.1 users: Update to stringio 3.1.0.2
You can use gem update stringio to update it. If you are using bundler, please add gem "stringio", ">= 3.0.1.2" to your Gemfile. | CVSS 9.8 | Almapay | - | Patched | |
CVE-2024-26255Windows Remote Access Connection Manager Information Disclosure Vulnerability | CVSS 5.5 | - | Patched | ||
CVE-2024-26243Windows USB Print Driver Elevation of Privilege Vulnerability | CVSS 7 | - | Patched | ||
CVE-2024-26176Windows Kernel Elevation of Privilege Vulnerability | CVSS 7.8 | - | Patched | ||
CVE-2024-26160Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability | CVSS 5.5 | Microsoft | - | Patched | |
CVE-2024-23364Transient DOS when processing the non-transmitted BSSID profile sub-elements present within the MBSSID Information Element (IE) of a beacon frame that is received from over-the-air (OTA). | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-23363[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-23359[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 8.2 | Dell, et al | - | Patched | |
CVE-2024-23358[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-23353[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-21479Transient DOS during music playback of ALAC content. | CVSS 7.5 | Dell, et al | - | - | |
CVE-2024-21477[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | - | Patched | ||
CVE-2024-21467Information disclosure while handling beacon probe frame during scan entry generation in client side. | CVSS 6.5 | Qualcomm | - | - | |
CVE-2024-21465[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.8 | Qualcomm | - | Patched | |
CVE-2024-21462[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 5.5 | Qualcomm | - | Patched | |
CVE-2024-21459Information disclosure while handling beacon or probe response frame in STA. | CVSS 6.5 | Dell, et al | - | - | |
CVE-2024-21458Information disclosure while handling SA query action frame. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-21457INformation disclosure while handling Multi-link IE in beacon frame. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2024-21456Information Disclosure while parsing beacon frame in STA. | CVSS 9.1 | Qualcomm | - | Patched | |
CVE-2024-21340Windows Kernel Information Disclosure Vulnerability | CVSS 4.6 | Microsoft | - | Patched | |
CVE-2024-20290A vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to an incorrect check for end-of-string values during scanning, which may result in a heap buffer over-read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software and consuming available system resources.
For a description of this vulnerability, see the ClamAV blog . | CVSS 7.5 | Fedoraproject, et al | - | Patched | |
CVE-2023-6992Cloudflare version of zlib library was found to be vulnerable to memory corruption issues affecting the deflation algorithm implementation (deflate.c). The issues resulted from improper input validation and heap-based buffer overflow.
A local attacker could exploit the problem during compression using a crafted malicious file potentially leading to denial of service of the software.
Patches: The issue has been patched in commit 8352d10 https://github.com/cloudflare/zlib/commit/8352d108c05db1bdc5ac3bdf834dad641694c13c . The upstream repository is not affected.
| CVSS 5.5 | Cloudflare | - | Patched | |
CVE-2023-51773BACnet Stack before 1.3.2 has a decode function APDU buffer over-read in bacapp_decode_application_data in bacapp.c. | CVSS 9.1 | - | - | ||
CVE-2023-49285Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Buffer Overread bug Squid is vulnerable to a Denial of Service attack against Squid HTTP Message processing. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS 8.6 | Squid-cache | - | Patched | |
CVE-2023-4758Buffer Over-read in GitHub repository gpac/gpac prior to 2.3-DEV. | CVSS 5.5 | Gpac | Exploit | Patched | |
CVE-2023-45919Mesa 23.0.4 was discovered to contain a buffer over-read in glXQueryServerString(). NOTE: this is disputed because there are no common situations in which users require uninterrupted operation with an attacker-controller server. | CVSS 5.3 | - | - | ||
CVE-2023-43555Information disclosure in Video while parsing mp2 clip with invalid section length. | CVSS 8.2 | - | - | ||
CVE-2023-43539[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | - | Patched | ||
CVE-2023-43537Information disclosure while handling T2LM Action Frame in WLAN Host. | CVSS 6.5 | - | - | ||
CVE-2023-43536[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2023-43533[HIGH] These vulnerabilities affect Qualcomm closed-source components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2023-43528Information disclosure when the ADSP payload size received in HLOS in response to Audio Stream Manager matrix session is less than this expected size. | CVSS 6.1 | - | - | ||
CVE-2023-43527Information disclosure while parsing dts header atom in Video. | CVSS 6.8 | - | - | ||
CVE-2023-43512Transient DOS while parsing GATT service data when the total amount of memory that is required by the multiple services is greater than the actual size of the services buffer. | CVSS 7.5 | Qualcomm | - | Patched | |
CVE-2023-39541A denial of service vulnerability exists in the ICMP and ICMPv6 parsing functionality of Weston Embedded uC-TCP-IP v3.06.01. A specially crafted network packet can lead to an out-of-bounds read. An attacker can send a malicious packet to trigger this vulnerability. | CVSS 5.9 | Weston-embedded | - | - | |
CVE-2023-39540A denial of service vulnerability exists in the ICMP and ICMPv6 parsing functionality of Weston Embedded uC-TCP-IP v3.06.01. A specially crafted network packet can lead to an out-of-bounds read. An attacker can send a malicious packet to trigger this vulnerability. | CVSS 5.9 | Weston-embedded | - | - | |
CVE-2023-38172Microsoft Message Queuing Denial of Service Vulnerability | CVSS 7.5 | Microsoft | - | Patched | |
CVE-2023-38152DHCP Server Service Information Disclosure Vulnerability | CVSS 5.3 | Microsoft | - | Patched | |
CVE-2023-38144Windows Common Log File System Driver Elevation of Privilege Vulnerability | CVSS 7.8 | Microsoft | - | Patched | |
CVE-2023-36904Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | CVSS 7.8 | Microsoft | - | Patched | |
CVE-2023-36803Windows Kernel Information Disclosure Vulnerability | CVSS 5.5 | Microsoft | Exploit | Patched | |
CVE-2023-36801DHCP Server Service Information Disclosure Vulnerability | CVSS 5.3 | Microsoft | - | Patched | |
CVE-2023-367733D Builder Remote Code Execution Vulnerability | CVSS 7.8 | Microsoft | - | Patched | |
CVE-2023-36581Microsoft Message Queuing Denial of Service Vulnerability | CVSS 7.5 | Microsoft | - | Patched | |
CVE-2023-36397Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability | CVSS 9.8 | Microsoft | - | Patched | |
CVE-2023-36392DHCP Server Service Denial of Service Vulnerability | CVSS 7.5 | Microsoft | - | Patched | |
CVE-2023-35643DHCP Server Service Information Disclosure Vulnerability | CVSS 7.5 | Microsoft | - | Patched | |
CVE-2023-35638DHCP Server Service Denial of Service Vulnerability | CVSS 7.5 | Microsoft | - | Patched |