Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2004-1189

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-31 Dec, 2004 | 05:00
Updated At-08 Aug, 2024 | 00:46
Rejected At-
Credits

The add_to_history function in svr_principal.c in libkadm5srv for MIT Kerberos 5 (krb5) up to 1.3.5, when performing a password change, does not properly track the password policy's history count and the maximum number of keys, which can cause an array index out-of-bounds error and may allow authenticated users to execute arbitrary code via a heap-based buffer overflow.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:31 Dec, 2004 | 05:00
Updated At:08 Aug, 2024 | 00:46
Rejected At:
▼CVE Numbering Authority (CNA)

The add_to_history function in svr_principal.c in libkadm5srv for MIT Kerberos 5 (krb5) up to 1.3.5, when performing a password change, does not properly track the password policy's history count and the maximum number of keys, which can cause an array index out-of-bounds error and may allow authenticated users to execute arbitrary code via a heap-based buffer overflow.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000917
vendor-advisory
x_refsource_CONECTIVA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11911
vdb-entry
signature
x_refsource_OVAL
https://exchange.xforce.ibmcloud.com/vulnerabilities/18621
vdb-entry
x_refsource_XF
http://www.redhat.com/support/errata/RHSA-2005-012.html
vendor-advisory
x_refsource_REDHAT
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
vendor-advisory
x_refsource_APPLE
http://marc.info/?l=bugtraq&m=110548298407590&w=2
mailing-list
x_refsource_BUGTRAQ
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txt
x_refsource_CONFIRM
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
vendor-advisory
x_refsource_APPLE
http://www.trustix.org/errata/2004/0069
vendor-advisory
x_refsource_TRUSTIX
http://www.redhat.com/support/errata/RHSA-2005-045.html
vendor-advisory
x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=110358420909358&w=2
mailing-list
x_refsource_BUGTRAQ
http://www.mandriva.com/security/advisories?name=MDKSA-2004:156
vendor-advisory
x_refsource_MANDRAKE
Hyperlink: http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000917
Resource:
vendor-advisory
x_refsource_CONECTIVA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11911
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/18621
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-012.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://marc.info/?l=bugtraq&m=110548298407590&w=2
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txt
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://www.trustix.org/errata/2004/0069
Resource:
vendor-advisory
x_refsource_TRUSTIX
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-045.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://marc.info/?l=bugtraq&m=110358420909358&w=2
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2004:156
Resource:
vendor-advisory
x_refsource_MANDRAKE
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000917
vendor-advisory
x_refsource_CONECTIVA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11911
vdb-entry
signature
x_refsource_OVAL
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/18621
vdb-entry
x_refsource_XF
x_transferred
http://www.redhat.com/support/errata/RHSA-2005-012.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://marc.info/?l=bugtraq&m=110548298407590&w=2
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txt
x_refsource_CONFIRM
x_transferred
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://www.trustix.org/errata/2004/0069
vendor-advisory
x_refsource_TRUSTIX
x_transferred
http://www.redhat.com/support/errata/RHSA-2005-045.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://marc.info/?l=bugtraq&m=110358420909358&w=2
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2004:156
vendor-advisory
x_refsource_MANDRAKE
x_transferred
Hyperlink: http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000917
Resource:
vendor-advisory
x_refsource_CONECTIVA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11911
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/18621
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-012.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=110548298407590&w=2
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txt
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://www.trustix.org/errata/2004/0069
Resource:
vendor-advisory
x_refsource_TRUSTIX
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-045.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=110358420909358&w=2
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2004:156
Resource:
vendor-advisory
x_refsource_MANDRAKE
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:31 Dec, 2004 | 05:00
Updated At:03 Apr, 2025 | 01:03

The add_to_history function in svr_principal.c in libkadm5srv for MIT Kerberos 5 (krb5) up to 1.3.5, when performing a password change, does not properly track the password policy's history count and the maximum number of keys, which can cause an array index out-of-bounds error and may allow authenticated users to execute arbitrary code via a heap-based buffer overflow.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 7.2
Base severity: HIGH
Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

MIT (Massachusetts Institute of Technology)
mit
>>kerberos_5>>Versions up to 1.3.5(inclusive)
cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-787Primarynvd@nist.gov
CWE ID: CWE-787
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000917cve@mitre.org
Broken Link
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.htmlcve@mitre.org
Mailing List
Third Party Advisory
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.htmlcve@mitre.org
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=110358420909358&w=2cve@mitre.org
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=110548298407590&w=2cve@mitre.org
Issue Tracking
Mailing List
Third Party Advisory
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txtcve@mitre.org
Patch
Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2004:156cve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2005-012.htmlcve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2005-045.htmlcve@mitre.org
Third Party Advisory
http://www.trustix.org/errata/2004/0069cve@mitre.org
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/18621cve@mitre.org
Third Party Advisory
VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11911cve@mitre.org
Broken Link
Third Party Advisory
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000917af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=110358420909358&w=2af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mailing List
Third Party Advisory
http://marc.info/?l=bugtraq&m=110548298407590&w=2af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mailing List
Third Party Advisory
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txtaf854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2004:156af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2005-012.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2005-045.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.trustix.org/errata/2004/0069af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/18621af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11911af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
Hyperlink: http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000917
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=110358420909358&w=2
Source: cve@mitre.org
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=110548298407590&w=2
Source: cve@mitre.org
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txt
Source: cve@mitre.org
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2004:156
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-012.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-045.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.trustix.org/errata/2004/0069
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/18621
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11911
Source: cve@mitre.org
Resource:
Broken Link
Third Party Advisory
Hyperlink: http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000917
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=110358420909358&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=110548298407590&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2004:156
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-012.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2005-045.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.trustix.org/errata/2004/0069
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/18621
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11911
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

345Records found

CVE-2000-0392
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.11% / 30.77%
||
7 Day CHG~0.00%
Published-12 Jul, 2000 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in ksu in Kerberos 5 allows local users to gain root privileges.

Action-Not Available
Vendor-cygnusn/aRed Hat, Inc.MIT (Massachusetts Institute of Technology)
Product-cygnus_network_securitykerberoslinuxkerbnetkerberos_5n/a
CVE-1999-1296
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 19.75%
||
7 Day CHG~0.00%
Published-12 Sep, 2001 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Kerberos IV compatibility libraries as used in Kerberos V allows local users to gain root privileges via a long line in a kerberos configuration file, which can be specified via the KRB_CONF environmental variable.

Action-Not Available
Vendor-n/aMIT (Massachusetts Institute of Technology)
Product-kerberos_5n/a
CVE-1999-0713
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.04% / 9.94%
||
7 Day CHG~0.00%
Published-04 Jan, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The dtlogin program in Compaq Tru64 UNIX allows local users to gain root privileges.

Action-Not Available
Vendor-digitalcdetransarcn/aMIT (Massachusetts Institute of Technology)
Product-cdeafskerberos_5unixn/a
CVE-2021-32471
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-5.43% / 89.78%
||
7 Day CHG~0.00%
Published-10 May, 2021 | 04:49
Updated-03 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in the Marvin Minsky 1967 implementation of the Universal Turing Machine allows program users to execute arbitrary code via crafted data. For example, a tape head may have an unexpected location after the processing of input composed of As and Bs (instead of 0s and 1s). NOTE: the discoverer states "this vulnerability has no real-world implications."

Action-Not Available
Vendor-n/aMIT (Massachusetts Institute of Technology)
Product-universal_turing_machinen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2007-3149
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 13.85%
||
7 Day CHG~0.00%
Published-11 Jun, 2007 | 18:00
Updated-07 Aug, 2024 | 14:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment variable settings. NOTE: another researcher disputes this vulnerability, stating that the attacker must be "a user, who can already log into your system, and can already use sudo."

Action-Not Available
Vendor-todd_millern/aMIT (Massachusetts Institute of Technology)
Product-kerberos_5sudon/a
CVE-2006-3084
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.21% / 43.09%
||
7 Day CHG~0.00%
Published-09 Aug, 2006 | 10:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) ftpd and (2) ksu programs in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fail to drop privileges. NOTE: as of 20060808, it is not known whether an exploitable attack scenario exists for these issues.

Action-Not Available
Vendor-heimdaln/aMIT (Massachusetts Institute of Technology)
Product-heimdalkerberos_5n/a
CVE-2006-3083
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.07% / 22.03%
||
7 Day CHG-0.01%
Published-09 Aug, 2006 | 10:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) krshd and (2) v4rcp applications in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, when running on Linux and AIX, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which allows local users to gain privileges by causing setuid to fail to drop privileges using attacks such as resource exhaustion.

Action-Not Available
Vendor-heimdaln/aMIT (Massachusetts Institute of Technology)
Product-heimdalkerberos_5n/a
CVE-2007-0957
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9||HIGH
EPSS-13.22% / 93.88%
||
7 Day CHG~0.00%
Published-06 Apr, 2007 | 01:00
Updated-07 Aug, 2024 | 12:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library, as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC), in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via crafted arguments, possibly involving certain format string specifiers.

Action-Not Available
Vendor-n/aMIT (Massachusetts Institute of Technology)Debian GNU/LinuxCanonical Ltd.
Product-kerberos_5ubuntu_linuxdebian_linuxn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2007-2798
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9||HIGH
EPSS-14.89% / 94.27%
||
7 Day CHG~0.00%
Published-26 Jun, 2007 | 22:00
Updated-07 Aug, 2024 | 13:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.

Action-Not Available
Vendor-n/aMIT (Massachusetts Institute of Technology)Debian GNU/LinuxCanonical Ltd.
Product-kerberos_5ubuntu_linuxdebian_linuxn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9522
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 2.94%
||
7 Day CHG~0.00%
Published-14 Nov, 2018 | 18:00
Updated-05 Aug, 2024 | 07:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the serialization functions of StatsLogEventWrapper.java, there is a possible out-of-bounds write due to unnecessary functionality which may be abused. This could lead to local escalation of privilege in the system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-112550251

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9363
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-8.4||HIGH
EPSS-0.05% / 15.04%
||
7 Day CHG-0.00%
Published-06 Nov, 2018 | 17:00
Updated-16 Sep, 2024 | 18:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel.

Action-Not Available
Vendor-Linux Kernel Organization, IncGoogle LLCDebian GNU/LinuxCanonical Ltd.
Product-androiddebian_linuxlinux_kernelubuntu_linuxAndroid
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2018-9558
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.96%
||
7 Day CHG~0.00%
Published-06 Dec, 2018 | 14:00
Updated-05 Aug, 2024 | 07:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In rw_t2t_handle_tlv_detect of rw_t2t_ndef.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to local escalation of privilege in the NFC kernel with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-112161557.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-22423
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.08%
||
7 Day CHG~0.00%
Published-03 Aug, 2021 | 17:21
Updated-03 Aug, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A component of the HarmonyOS has a Out-of-bounds Write Vulnerability. Local attackers may exploit this vulnerability to cause integer overflow.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosHarmonyOS
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9516
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.43%
||
7 Day CHG-0.00%
Published-06 Nov, 2018 | 17:00
Updated-16 Sep, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-71361580.

Action-Not Available
Vendor-Canonical Ltd.Google LLCDebian GNU/Linux
Product-androiddebian_linuxubuntu_linuxAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9357
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.10% / 27.33%
||
7 Day CHG~0.00%
Published-06 Nov, 2018 | 17:00
Updated-16 Sep, 2024 | 17:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In BNEP_Write of bnep_api.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-6.0 Android-6.0.1 Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android ID: A-74947856.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2011-1017
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.2||HIGH
EPSS-0.05% / 14.21%
||
7 Day CHG~0.00%
Published-01 Mar, 2011 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel 2.6.37.2 and earlier might allow local users to gain privileges or obtain sensitive information via a crafted LDM partition table.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncCanonical Ltd.
Product-linux_kernelubuntu_linuxn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9518
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.21%
||
7 Day CHG~0.00%
Published-07 Dec, 2018 | 23:00
Updated-05 Aug, 2024 | 07:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In nfc_llcp_build_sdreq_tlv of llcp_commands.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-73083945.

Action-Not Available
Vendor-Canonical Ltd.Google LLC
Product-androidubuntu_linuxAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2010-4656
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.23%
||
7 Day CHG~0.00%
Published-18 Jul, 2011 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The iowarrior_write function in drivers/usb/misc/iowarrior.c in the Linux kernel before 2.6.37 does not properly allocate memory, which might allow local users to trigger a heap-based buffer overflow, and consequently cause a denial of service or gain privileges, via a long report.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncCanonical Ltd.
Product-linux_kernelubuntu_linuxn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-6973
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-8.8||HIGH
EPSS-0.16% / 37.81%
||
7 Day CHG~0.00%
Published-15 Aug, 2018 | 12:00
Updated-17 Sep, 2024 | 02:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware Workstation (14.x before 14.1.3) and Fusion (10.x before 10.1.3) contain an out-of-bounds write vulnerability in the e1000 device. This issue may allow a guest to execute code on the host.

Action-Not Available
Vendor-VMware (Broadcom Inc.)
Product-workstationfusionFusionWorkstation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2010-4398
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-12.17% / 93.57%
||
7 Day CHG~0.00%
Published-03 Dec, 2010 | 20:00
Updated-30 Jul, 2025 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-04-21||Apply updates per vendor instructions.

Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges, and bypass the User Account Control (UAC) feature, via a crafted REG_BINARY value for a SystemDefaultEUDCFont registry key, aka "Driver Improper Interaction with Windows Kernel Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_7windows_xpwindows_server_2008windows_server_2003windows_vistan/aWindows
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-5410
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-7.8||HIGH
EPSS-1.11% / 77.21%
||
7 Day CHG~0.00%
Published-07 Jan, 2019 | 14:00
Updated-05 Aug, 2024 | 05:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Dokan file system driver contains a stack-based buffer overflow

Dokan, versions between 1.0.0.5000 and 1.2.0.1000, are vulnerable to a stack-based buffer overflow in the dokan1.sys driver. An attacker can create a device handle to the system driver and send arbitrary input that will trigger the vulnerability. This vulnerability was introduced in the 1.0.0.5000 version update.

Action-Not Available
Vendor-dokan_projectDokan
Product-dokanOpen Source File System
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-0329
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.03% / 5.78%
||
7 Day CHG~0.00%
Published-10 Feb, 2021 | 16:50
Updated-03 Aug, 2024 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In several native functions called by AdvertiseManager.java, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege in the Bluetooth server with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-171400004

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-5332
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 24.02%
||
7 Day CHG~0.00%
Published-11 Jan, 2018 | 07:00
Updated-05 Aug, 2024 | 05:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kerneln/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-5282
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.80% / 73.05%
||
7 Day CHG~0.00%
Published-08 Jan, 2018 | 09:00
Updated-05 Aug, 2024 | 05:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Kentico 9.0 through 11.0 has a stack-based buffer overflow via the SqlName, SqlPswd, Database, UserName, or Password field in a SilentInstall XML document. NOTE: the vendor disputes this issue because neither a buffer overflow nor a crash can be reproduced; also, reading XML documents is implemented exclusively with managed code within the Microsoft .NET Framework

Action-Not Available
Vendor-n/aKentico Software
Product-kentico_cmsn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-6235
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.92%
||
7 Day CHG~0.00%
Published-25 May, 2018 | 15:00
Updated-05 Aug, 2024 | 06:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Out-of-Bounds write privilege escalation vulnerability in Trend Micro Maximum Security (Consumer) 2018 could allow a local attacker to escalate privileges on vulnerable installations due to a flaw within processing of IOCTL 0x222814 by the tmnciesc.sys driver. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-premium_securityinternet_securityantivirus\+windowsmaximum_securityTrend Micro Maximum Security
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-32458
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.59%
||
7 Day CHG~0.00%
Published-27 May, 2021 | 10:34
Updated-03 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl which could lead to code execution on affected devices. An attacker must first obtain the ability to execute low-privileged code on the target device in order to exploit this vulnerability.

Action-Not Available
Vendor-Trend Micro Incorporated
Product-home_network_securityTrend Micro Home Network Security
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-3861
Matching Score-4
Assigner-Zephyr Project
ShareView Details
Matching Score-4
Assigner-Zephyr Project
CVSS Score-8.2||HIGH
EPSS-0.05% / 14.67%
||
7 Day CHG~0.00%
Published-07 Feb, 2022 | 22:00
Updated-16 Sep, 2024 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
The RNDIS USB device class includes a buffer overflow vulnerability

The RNDIS USB device class includes a buffer overflow vulnerability. Zephyr versions >= v2.6.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hvfp-w4h8-gxvj

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-3914
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.16% / 37.45%
||
7 Day CHG~0.00%
Published-21 Sep, 2018 | 15:00
Updated-16 Sep, 2024 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in the video-core HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy call overflows the destination buffer, which has a size of 2000 bytes. An attacker can send an arbitrarily long "sessionToken" value in order to exploit this vulnerability.

Action-Not Available
Vendor-Samsung
Product-sth-eth-250sth-eth-250_firmwareSmartThings Hub STH-ETH-250
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-3916
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.16% / 37.45%
||
7 Day CHG~0.00%
Published-28 Aug, 2018 | 20:00
Updated-16 Sep, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in the video-core HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy call overflows the destination buffer, which has a size of 136 bytes. An attacker can send an arbitrarily long 'directory' value in order to exploit this vulnerability. An attacker can send an HTTP request to trigger this vulnerability.

Action-Not Available
Vendor-Samsung
Product-sth-eth-250sth-eth-250_firmwareSamsung
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-3906
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.14% / 34.92%
||
7 Day CHG~0.00%
Published-21 Sep, 2018 | 15:00
Updated-16 Sep, 2024 | 17:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable stack-based buffer overflow vulnerability exists in the retrieval of a database field in video-core's HTTP server of Samsung SmartThings Hub. The video-core process insecurely extracts the shard.videoHostURL field from its SQLite database, leading to a buffer overflow on the stack. An attacker can send an HTTP request to trigger this vulnerability.

Action-Not Available
Vendor-Samsung
Product-sth-eth-250sth-eth-250_firmwareSmartThings Hub STH-ETH-250
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-6240
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.60%
||
7 Day CHG~0.00%
Published-06 Sep, 2019 | 14:18
Updated-05 Aug, 2024 | 06:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Tegra contains a vulnerability in BootRom where a user with kernel level privileges can write an arbitrary value to an arbitrary physical address

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-3632
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.08% / 23.25%
||
7 Day CHG~0.00%
Published-10 Jul, 2018 | 21:00
Updated-05 Aug, 2024 | 04:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x / 7.x / 8.x / 9.x / 10.x / 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20 could be triggered by an attacker with local administrator permission on the system.

Action-Not Available
Vendor-Intel Corporation
Product-core_2_quadcore_2_soloxeon_silvercore_2_duocore_i5xeonxeon_goldcore_i9xeon_platinumactive_management_technology_firmwarecore_duocore_i7core_2_extremecore_solocore_i3Intel Active Management Technology
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-3913
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.05% / 16.45%
||
7 Day CHG~0.00%
Published-21 Sep, 2018 | 15:00
Updated-05 Aug, 2024 | 04:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in the video-core HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy call overflows the destination buffer, which has a size of 32 bytes. An attacker can send an arbitrarily long "accessKey" value in order to exploit this vulnerability.

Action-Not Available
Vendor-n/aSamsung
Product-sth-eth-250sth-eth-250_firmwaren/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-37576
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.03%
||
7 Day CHG~0.00%
Published-26 Jul, 2021 | 21:35
Updated-04 Aug, 2024 | 01:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.

Action-Not Available
Vendor-n/aFedora ProjectLinux Kernel Organization, Inc
Product-fedoralinux_kerneln/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-3915
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.05% / 16.45%
||
7 Day CHG~0.00%
Published-21 Sep, 2018 | 15:00
Updated-16 Sep, 2024 | 22:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in the video-core HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy call overflows the destination buffer, which has a size of 64 bytes. An attacker can send an arbitrarily long "bucket" value in order to exploit this vulnerability.

Action-Not Available
Vendor-Samsung
Product-sth-eth-250sth-eth-250_firmwareSmartThings Hub STH-ETH-250
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-35103
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.52%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 04:40
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible out of bound write due to improper validation of number of timer values received from firmware while syncing timers in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa6150p_firmwareipq4028_firmwareqca8337ar9380ipq8173_firmwarewcd9360_firmwaresdx65qcn5124qca4024_firmwarewcn3950_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqca6595au_firmwaresa6155qcs6125_firmwaresa415mwcn3998qca6554a_firmwarewcn3950ipq8076aqcn6024_firmwaresd_8_gen1_5g_firmwaresm6375_firmwaresd460_firmwaresm7315_firmwareqca6574au_firmwareqcn5164_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwarewcd9360ipq8070_firmwareipq8065ipq8078a_firmwareqrb5165_firmwareipq5028qca7500ipq4029_firmwareqcs6125qrb5165m_firmwaresa4155p_firmwaresa8155_firmwareipq6010sd662_firmwareipq8068qcn6132sd765gsw5100qca6436wcn6851sa6155pqca9888_firmwareqcn6122ipq8068_firmwareqca6696_firmwaresd870_firmwareqcn5154_firmwaresa8150pwsa8830_firmwareqca9992_firmwaresd865_5g_firmwarewcn3988sa8195p_firmwaresm8475qca9898qcn5022_firmwarewcn6750_firmwareipq4028ipq5018_firmwaresm6375qca9985_firmwarewcn3991ipq4018_firmwareqca8337_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwaresw5100pipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164qca6574csr8811_firmwarewcd9380qcn5054_firmwareipq4019_firmwareqcn5024qca8072_firmwareqca9985qcn9012_firmwareqcn5052_firmwarewcn3980ipq6018_firmwarewsa8815wcn6850pmp8074_firmwareqcn6112qca6426_firmwareqca9984ipq6028ipq8064qcn9024pmp8074wcn3980_firmwaresdx55mipq8064_firmwarewcn6740_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareipq8070qca9994qca9980qcn9024_firmwareipq8174_firmwareqca9880sd480sd870wcn6855sw5100p_firmwareipq6018sa6145pqca9886_firmwareqca6595_firmwaresa8145pqca6391_firmwaresa4150p_firmwareqca4024sd780g_firmwarewcd9370_firmwaresdx55sd888_firmwareqcn5021_firmwaresa8155psa4155par8035_firmwareqcn5024_firmwarewcn3991_firmwarewsa8830qcn9070sa8145p_firmwarecsrb31024qcn9072qca9880_firmwareqca9992sd765g_firmwareqca6390_firmwarewcd9370qcn5152_firmwareqca6426qca6584au_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareipq5018wcd9385_firmwaresdxr2_5g_firmwareipq8074asd662qcn5124_firmwareqcn6100_firmwareqcn6102_firmwareqcn9011_firmwaresa8155qcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwaresm7250p_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwareqca6584ausa6155p_firmwaresd778gsm6225sa515m_firmwareipq8174qca9990sdxr2_5gqcs6490qcn5052qcn6112_firmwaresa415m_firmwarewcn3988_firmwareqcn9074sa6145p_firmwaresd778g_firmwaresa8195pwsa8810_firmwaresd765_firmwareqca8081ipq8071aqcn6023ipq8071a_firmwarewcd9385qcs6490_firmwarear8035csr8811qca6390qca9898_firmwareipq4019wcd9375qcn9100_firmwareipq5010_firmwareipq8074a_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresa4150pqcm6125_firmwareqca8072qcn9000sd780gqca6554asd865_5gqca6595ar9380_firmwareqcn9012sd888qcn6122_firmwareipq8065_firmwarewsa8835sd888_5gqcn5154qca8075_firmwareipq4018qca6574awcn6855_firmwareqca9889sm7325pqcn6132_firmwareqca9888qca9994_firmwarewcn6750ipq8070a_firmwareipq8076_firmwaresa515mqca6574_firmwareqca9886sm7325p_firmwareipq8076sd765qca6574a_firmwareqcn5021qcn5152sd768g_firmwareqrb5165msm7315sd460qca6391qcn6102qcn9100sdx65_firmwarecsrb31024_firmwareqcm6490_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwareqcn9011sm6225_firmwareqca6574auqca9889_firmwaresa8155p_firmwareqcn5122qcm6125wsa8810wcn6856qcn5022ipq6010_firmwaresd768gwcn6740qca6696sa6150pqca8075qcn9022_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn6100qcn9072_firmwaresm7250psw5100_firmwareqcn9074_firmwareipq4029Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-34202
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.25% / 47.70%
||
7 Day CHG~0.00%
Published-16 Jun, 2021 | 18:56
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640) 1.01B04. Ordinary permissions can be elevated to administrator permissions, resulting in local arbitrary code execution. An attacker can combine other vulnerabilities to further achieve the purpose of remote code execution.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-2640-usdir-2640-us_firmwaren/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-19087
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.11% / 30.31%
||
7 Day CHG~0.00%
Published-10 Nov, 2018 | 03:00
Updated-05 Aug, 2024 | 11:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

RegFilter.sys in IOBit Malware Fighter 6.2 is susceptible to a stack-based buffer overflow when an attacker uses IOCTL 0x8006E044 with a size larger than 8 bytes. This can lead to denial of service or code execution with root privileges.

Action-Not Available
Vendor-iobitn/a
Product-malware_fightern/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-19086
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.11% / 30.31%
||
7 Day CHG~0.00%
Published-10 Nov, 2018 | 03:00
Updated-05 Aug, 2024 | 11:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

RegFilter.sys in IOBit Malware Fighter 6.2 is susceptible to a stack-based buffer overflow when an attacker uses IOCTL 0x8006E040 with a size larger than 8 bytes. This can lead to denial of service or code execution with root privileges.

Action-Not Available
Vendor-iobitn/a
Product-malware_fightern/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-19085
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.11% / 30.31%
||
7 Day CHG~0.00%
Published-10 Nov, 2018 | 03:00
Updated-05 Aug, 2024 | 11:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

RegFilter.sys in IOBit Malware Fighter 6.2 is susceptible to a stack-based buffer overflow when an attacker uses IOCTL 0x8006E048 with a size larger than 8 bytes. This can lead to denial of service or code execution with root privileges.

Action-Not Available
Vendor-iobitn/a
Product-malware_fightern/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-19650
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.92%
||
7 Day CHG~0.00%
Published-05 Dec, 2018 | 22:00
Updated-05 Aug, 2024 | 11:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Local attackers can trigger a stack-based buffer overflow on vulnerable installations of Antiy-AVL ATool security management v1.0.0.22. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the processing of IOCTL 0x80002000 by the IRPFile.sys Antiy-AVL ATool kernel driver. The bug is caused by failure to properly validate the length of the user-supplied data, which results in a kernel stack buffer overflow. An attacker can leverage this vulnerability to execute arbitrary code in the context of the kernel, which could lead to privilege escalation and a failed exploit could lead to denial of service.

Action-Not Available
Vendor-antiyn/a
Product-anti_virus_lab_atooln/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-33909
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-2.12% / 83.44%
||
7 Day CHG-0.87%
Published-20 Jul, 2021 | 18:01
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.

Action-Not Available
Vendor-n/aFedora ProjectSonicWall Inc.Linux Kernel Organization, IncNetApp, Inc.Debian GNU/LinuxOracle Corporation
Product-debian_linuxlinux_kernelhci_management_nodefedorasma1000_firmwarecommunications_session_border_controllersma1000solidfiren/a
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-3491
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.70%
||
7 Day CHG~0.00%
Published-04 Jun, 2021 | 01:40
Updated-16 Sep, 2024 | 22:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linux kernel io_uring PROVIDE_BUFFERS MAX_RW_COUNT bypass

The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/<PID>/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b ("io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c ("io_uring: add IORING_OP_PROVIDE_BUFFERS") (v5.7-rc1).

Action-Not Available
Vendor-Linux Kernel Organization, IncCanonical Ltd.
Product-ubuntu_linuxlinux_kernelLinux kernel
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-3489
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-7.8||HIGH
EPSS-0.10% / 27.75%
||
7 Day CHG+0.01%
Published-04 Jun, 2021 | 01:40
Updated-16 Sep, 2024 | 20:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linux kernel eBPF RINGBUF map oversized allocation

The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee ("bpf, ringbuf: Deny reserve of buffers larger than ringbuf") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 ("bpf: Implement BPF ring buffer and verifier support for it") (v5.8-rc1).

Action-Not Available
Vendor-Linux Kernel Organization, IncCanonical Ltd.
Product-ubuntu_linuxlinux_kernelLinux kernel
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-3490
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-7.8||HIGH
EPSS-4.15% / 88.20%
||
7 Day CHG~0.00%
Published-04 Jun, 2021 | 01:40
Updated-16 Sep, 2024 | 22:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linux kernel eBPF bitwise ops ALU32 bounds tracking

The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e ("bpf: Fix alu32 const subreg bound tracking on bitwise operations") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 ("bpf: Verifier, do explicit ALU32 bounds tracking") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 ("bpf:Fix a verifier failure with xor") ( 5.10-rc1).

Action-Not Available
Vendor-Linux Kernel Organization, IncCanonical Ltd.
Product-ubuntu_linuxlinux_kernelLinux kernel
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-3345
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-5.71% / 90.06%
||
7 Day CHG~0.00%
Published-29 Jan, 2021 | 14:20
Updated-03 Aug, 2024 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.

Action-Not Available
Vendor-gnupgn/aOracle Corporation
Product-libgcryptcommunications_billing_and_revenue_managementn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-33265
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-5.98% / 90.31%
||
7 Day CHG~0.00%
Published-01 Dec, 2021 | 21:20
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_80046eb4 in /formSetPortTr. This vulnerability is triggered via a crafted POST request.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-809_firmwaredir-809n/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2015-2387
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-24.30% / 95.88%
||
7 Day CHG~0.00%
Published-14 Jul, 2015 | 22:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-24||Apply updates per vendor instructions.

ATMFD.DLL in the Adobe Type Manager Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "ATMFD.DLL Memory Corruption Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_rtwindows_7windows_8windows_server_2008windows_rt_8.1windows_vistawindows_server_2003windows_server_2012windows_8.1n/aATM Font Driver
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-33124
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 15.59%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1565l_v5xeon_e-2286gcore_i7-7700t_firmwarecore_i3-10100core_i7-8850h_firmwarecore_i5-1038ng7xeon_e5-2603_v4_firmwarecore_i9-7900xxeon_d-2733nt_firmwarecore_i7-10710u_firmwarexeon_e-2174g_firmwarexeon_d-1633nxeon_w-1270p_firmwarexeon_d-2173it_firmwarexeon_d-2145nt_firmwarexeon_e-2246gxeon_e5-2637_v4core_i9-9960xxeon_w-2123xeon_platinum_8353hcore_i7-9700k_firmwarecore_i5-8500t_firmwarexeon_d-1749nt_firmwarecore_i3-9300t_firmwarexeon_e-2236xeon_platinum_8280_firmwarexeon_e3-1220_v5_firmwarexeon_e-2374g_firmwarexeon_e5-4640_v4xeon_w-1270exeon_silver_4209t_firmwarecore_i5-7500xeon_e5-2650_v4_firmwarecore_i9-9900kf_firmwarecore_i5-7440hqcore_i7-8709gxeon_d-2786nte_firmwarexeon_gold_6230txeon_silver_4210rxeon_w-1270xeon_e3-1505l_v6xeon_e-2254me_firmwarexeon_e5-4650_v4core_i5-8200ycore_i5-10500t_firmwarecore_i5-9400t_firmwarecore_i7-8809g_firmwarecore_i5-8260uxeon_gold_6226r_firmwarexeon_e3-1235l_v5core_i5-7287u_firmwarecore_i9-10900xxeon_gold_6256_firmwarexeon_w-3335xeon_e7-8891_v4_firmwarexeon_w-11555mrecore_i5-10500hcore_i7-6800k_firmwarecore_i5-10600kfxeon_e5-2648l_v4core_i5-1035g1_firmwarexeon_w-2123_firmwarexeon_e-2146gxeon_d-2752nte_firmwarecore_i5-8210y_firmwarecore_i3-10100exeon_silver_4316_firmwarexeon_w-3365_firmwarecore_i7-10700kf_firmwarexeon_e-2286g_firmwarecore_i7-9700txeon_gold_6238core_i5-7600tcore_i7-4820kxeon_e3-1260l_v5_firmwarexeon_w-2195_firmwarexeon_e3-1240l_v5xeon_platinum_8256xeon_w-2275_firmwarexeon_e-2276mxeon_d-2163itcore_i7-3930kxeon_gold_6334_firmwarexeon_e3-1505m_v5xeon_w-2235_firmwarexeon_gold_6328hlxeon_d-1623nxeon_e3-1535m_v6_firmwarexeon_gold_6230n_firmwarecore_i7-10810ucore_i3-10300txeon_e5-2628l_v4core_i3-8100xeon_e-2378g_firmwarecore_i5-9600kxeon_e5-2658_v4xeon_gold_5218r_firmwarecore_i3-7100xeon_e5-1630_v4_firmwarecore_i7-7600u_firmwarecore_i7-9700kf_firmwarecore_i5-9300hcore_i5-10500exeon_silver_4214y_firmwarecore_i9-10850kcore_i5-8500bcore_i3-7100e_firmwarexeon_d-2143itxeon_silver_4209txeon_e-2226gexeon_platinum_8368q_firmwarecore_i5-8250u_firmwarecore_i7-7820hk_firmwarexeon_w-1390_firmwarexeon_gold_6212uxeon_w-2175_firmwarecore_i3-8100hcore_i3-7300t_firmwarexeon_e5-2695_v4core_i7-9700f_firmwarexeon_d-2177nt_firmwarecore_i7-3930k_firmwarexeon_e3-1270_v5_firmwarecore_i9-10920xxeon_d-1712tr_firmwarecore_i3-8130u_firmwarecore_i5-10310ucore_i7-6950x_firmwarexeon_e7-8860_v4_firmwarecore_i7-8557ucore_i3-8350k_firmwarexeon_e5-2683_v4core_i9-9820x_firmwarexeon_d-2779_firmwarecore_i5-1030g7xeon_d-1602_firmwarexeon_platinum_8376hl_firmwarecore_i9-10980hkxeon_d-2733ntxeon_w-11155mlexeon_d-1559_firmwarecore_i7-10700k_firmwarexeon_gold_5320tcore_i3-10305_firmwarecore_i3-7100u_firmwarexeon_e-2274gcore_i3-10325_firmwarexeon_e5-2630l_v4core_i7-10510y_firmwarexeon_e7-8893_v4core_i7-1060g7_firmwarecore_i7-8500yxeon_w-3323xeon_gold_6330h_firmwarexeon_platinum_8276_firmwarecore_i7-1068ng7_firmwarecore_i5-7400_firmwarexeon_w-2133_firmwarecore_i5-9600xeon_w-3375core_i5-8600tcore_i5-7200u_firmwarexeon_e3-1585_v5_firmwarexeon_gold_6258r_firmwarecore_i3-10320_firmwarexeon_gold_5218bxeon_platinum_8360hl_firmwarexeon_gold_6328hxeon_d-1734nt_firmwarexeon_e-2288gxeon_w-1370pcore_i7-7500uxeon_e-2274g_firmwarexeon_gold_5318s_firmwarexeon_e3-1225_v6xeon_e3-1280_v6xeon_gold_5218rxeon_d-2752ntexeon_e-2124g_firmwarexeon_e5-2695_v4_firmwarexeon_w-2235xeon_e5-2608l_v4_firmwarexeon_w-3175xxeon_platinum_8362_firmwarexeon_w-3225core_i3-7101texeon_e5-2609_v4core_i7-7700xeon_d-1540xeon_gold_6246r_firmwarexeon_gold_6246rcore_i5-7300hqxeon_d-1513ncore_i5-10505_firmwarexeon_e5-2643_v4_firmwarexeon_e3-1505m_v6xeon_e7-8860_v4xeon_e5-2690_v4core_i9-9900xcore_i9-9900t_firmwarexeon_e5-2699a_v4_firmwarecore_i5-9600_firmwarexeon_e3-1505m_v6_firmwarecore_i7-9700exeon_e-2254mexeon_platinum_8260l_firmwarecore_i7-8500y_firmwarexeon_d-1748te_firmwarexeon_e5-4667_v4_firmwarexeon_e5-2618l_v4xeon_w-3235_firmwarexeon_platinum_9222xeon_gold_5318ncore_i3-10105tcore_i3-8100h_firmwarecore_i7-10510u_firmwarexeon_platinum_8358_firmwarecore_i7-7700_firmwarecore_i3-1000g4core_i3-7100t_firmwarecore_i9-10900kfcore_i3-9100hlcore_i9-9980hk_firmwarexeon_e-2144gxeon_gold_6314ucore_i5-8300h_firmwarexeon_e3-1270_v6_firmwarexeon_d-2752tercore_i5-8279u_firmwarecore_i5-8500b_firmwarexeon_w-11555mlexeon_w-1390txeon_silver_4216xeon_e5-2640_v4xeon_e5-2697a_v4_firmwarexeon_platinum_8362core_i7-10610uxeon_platinum_8276lxeon_platinum_8351n_firmwarecore_i7-7740xxeon_e5-2637_v4_firmwarecore_i7-7y75xeon_d-1713nte_firmwarexeon_e3-1575m_v5xeon_e-2124gxeon_platinum_9221_firmwarecore_i7-4930kcore_i5-9400core_i5-8500_firmwarexeon_d-1557xeon_e5-2623_v4core_i3-10105f_firmwarexeon_w-3245mxeon_d-2752ter_firmwarexeon_d-1637_firmwarexeon_gold_5318sxeon_w-11555mle_firmwarecore_i5-7300hq_firmwarexeon_w-1350core_i5-1035g1xeon_w-3345_firmwarexeon_w-1290xeon_e-2314_firmwarecore_i3-10110ucore_i7-8665u_firmwarecore_i7-8086k_firmwarexeon_w-2223_firmwarexeon_d-1718t_firmwarexeon_gold_6234core_i3-10100y_firmwarecore_i7-7567u_firmwarecore_i3-9100e_firmwarecore_i5-7442eq_firmwarexeon_gold_6252n_firmwarecore_i7-4930mxcore_i9-10900xeon_e3-1230_v6_firmwarexeon_w-1250core_i7-1065g7_firmwarexeon_e3-1565l_v5_firmwarecore_i5-7360uxeon_e3-1275_v6xeon_e5-1660_v4xeon_e5-4628l_v4_firmwarexeon_e5-1680_v4core_i5-7300uxeon_e5-2698_v4_firmwarexeon_e5-2618l_v4_firmwarexeon_e5-2623_v4_firmwarexeon_e3-1230_v5_firmwarexeon_d-1736ntcore_i3-7100h_firmwarecore_i7-8565uxeon_e3-1578l_v5core_i9-10940x_firmwarexeon_d-1747ntexeon_bronze_3206r_firmwarecore_i7-7700kxeon_w-3323_firmwarecore_i3-10100fcore_i9-9900_firmwarexeon_gold_5217core_i7-6850kcore_i7-9750hf_firmwarexeon_gold_6210ucore_i5-7200uxeon_d-1548_firmwarecore_i7-9700fcore_i5-8265u_firmwarexeon_platinum_8352s_firmwarexeon_platinum_8380h_firmwarecore_i5-10210ucore_i3-7300_firmwarecore_i7-7740x_firmwarexeon_w-11155mre_firmwarecore_i5-8400bcore_i3-7100hxeon_gold_5215core_i5-10400t_firmwarecore_i9-9900ksxeon_d-1531_firmwarexeon_d-1527_firmwarecore_i9-7920xxeon_d-1633n_firmwarexeon_platinum_8352vcore_i9-7960x_firmwarexeon_e3-1230_v6xeon_d-1513n_firmwarecore_i9-8950hkxeon_e7-4809_v4_firmwarexeon_platinum_8360ycore_i5-10600tcore_i5-10600kf_firmwarexeon_d-1747nte_firmwarecore_i5-7640xxeon_w-3275mcore_i5-9500te_firmwarecore_i7-7700k_firmwarexeon_w-1290_firmwarexeon_e-2386g_firmwarexeon_d-1726_firmwarexeon_gold_6336yxeon_gold_6209ucore_i9-10900e_firmwarexeon_gold_6250lxeon_e-2176m_firmwarexeon_e-2278g_firmwarexeon_e3-1240_v6core_i9-9920xxeon_e3-1230_v5xeon_d-2146nt_firmwarexeon_e3-1240_v5_firmwarecore_i7-7660uxeon_e3-1275_v5_firmwarexeon_e-2278gel_firmwarexeon_d-1518_firmwarexeon_platinum_8376h_firmwarecore_i7-7700hqxeon_e-2236_firmwarexeon_e-2244g_firmwarecore_i7-6900k_firmwarexeon_e5-2660_v4xeon_d-1715ter_firmwarexeon_gold_6238l_firmwarecore_m3-7y30core_i5-8269u_firmwarexeon_w-11155mrexeon_gold_6252xeon_w-2135xeon_e3-1505l_v6_firmwarexeon_e3-1285_v6xeon_e5-4627_v4xeon_e-2276mlxeon_e3-1225_v5_firmwarexeon_silver_4214rxeon_e3-1245_v6_firmwarecore_i9-10920x_firmwarecore_i3-7101e_firmwarecore_i9-9880h_firmwarexeon_silver_4210r_firmwarecore_i7-5820k_firmwarecore_i3-8300xeon_e3-1545m_v5core_i3-7102e_firmwarexeon_e3-1515m_v5_firmwarexeon_e-2334_firmwarexeon_gold_6230rxeon_gold_6346_firmwarexeon_e-2276me_firmwarecore_i5-8400txeon_d-2775texeon_w-1370p_firmwarecore_i7-1065g7core_i7-9800xxeon_silver_4208xeon_e-2136_firmwarexeon_w-1270_firmwarexeon_gold_6210u_firmwarexeon_w-1250ecore_i5-8257u_firmwarecore_i5-1038ng7_firmwarecore_i5-9400f_firmwarecore_i7-8706g_firmwarexeon_gold_5215lcore_i5-7287uxeon_e5-4660_v4xeon_e-2146g_firmwarecore_i7-3970xcore_i7-3960xxeon_gold_6330n_firmwarexeon_platinum_8253_firmwarexeon_e-2126g_firmwarecore_i5-9600t_firmwarexeon_d-2753nt_firmwarexeon_w-1350p_firmwarecore_i7-10610u_firmwarecore_i5-10500e_firmwarexeon_d-1529_firmwarexeon_gold_6240lxeon_w-3265mxeon_gold_6248xeon_e5-4640_v4_firmwarexeon_d-1712trxeon_e-2378_firmwarexeon_gold_6240l_firmwarexeon_d-1736_firmwarecore_i3-8145ucore_i3-9300xeon_d-2173itxeon_d-2766ntcore_i7-7567ucore_i7-10870h_firmwarecore_i3-9300tcore_i7-7820hqcore_i7-7820eqcore_i7-9700kxeon_gold_6252_firmwarexeon_e5-2650_v4xeon_d-2776ntcore_i7-3820xeon_e7-4820_v4_firmwarexeon_e-2144g_firmwarecore_i7-10700te_firmwarecore_i7-10700ecore_i3-7320xeon_e3-1585l_v5core_i7-3940xmxeon_gold_6348h_firmwarexeon_e-2388gcore_i7-9700te_firmwarexeon_platinum_8268xeon_d-2786ntexeon_e-2226gxeon_gold_6240rcore_i3-10100te_firmwarexeon_gold_6238_firmwarexeon_silver_4215rxeon_e-2278gcore_i9-10900ecore_i3-9100core_i5-8600core_i5-8250uxeon_platinum_8380xeon_w-3265core_m3-8100y_firmwarecore_i7-3940xm_firmwarecore_i5-10500tecore_i7-7500u_firmwarecore_i5-10210y_firmwarecore_i7-8700k_firmwarecore_i7-8700bcore_i5-10500txeon_e3-1501l_v6_firmwarexeon_e5-1660_v4_firmwarexeon_w-1250texeon_platinum_8352mxeon_gold_6208ucore_i3-9100tecore_i5-9300hf_firmwarexeon_d-1749ntxeon_gold_6242core_i7-10700kxeon_d-1627xeon_e3-1575m_v5_firmwarexeon_e-2186mcore_i3-8109u_firmwarexeon_e3-1558l_v5xeon_gold_6250_firmwarexeon_d-1623n_firmwarecore_i3-9350k_firmwarecore_i5-7442eqxeon_d-1702core_i7-8665uecore_i3-8130uxeon_e7-4830_v4core_i3-7167uxeon_e5-2699_v4_firmwarecore_i3-8300txeon_d-1528_firmwarexeon_gold_6342xeon_e5-4628l_v4xeon_d-1732te_firmwarexeon_e3-1268l_v5core_i9-9900kxeon_silver_4316xeon_gold_6240_firmwarecore_i7-5930kcore_i5-10400fxeon_w-2265_firmwarexeon_e-2278ge_firmwarexeon_gold_6330ncore_i5-9400_firmwarexeon_gold_6226rxeon_bronze_3204xeon_w-1270e_firmwarexeon_e-2276m_firmwarecore_i3-7350k_firmwarexeon_d-1567core_i5-8400t_firmwarexeon_w-3365core_i7-9850hlxeon_w-2135_firmwarexeon_e-2286m_firmwarecore_i5-8400hxeon_e3-1245_v5xeon_w-2175xeon_d-2141i_firmwarexeon_silver_4214r_firmwarexeon_w-3335_firmwarecore_i3-10110yxeon_d-2776nt_firmwarexeon_gold_6334core_i7-7820hkcore_i5-9300h_firmwarexeon_d-1734ntxeon_w-11855mxeon_gold_6240yxeon_e5-4655_v4_firmwarexeon_gold_6238lxeon_w-1390xeon_gold_5218n_firmwarexeon_gold_6328h_firmwarexeon_gold_5318h_firmwarexeon_gold_6354core_i7-8665ucore_i3-10305tcore_i3-9350kf_firmwarecore_i7-5960x_firmwarexeon_w-1370_firmwarecore_i5-7440eq_firmwarexeon_d-1649n_firmwarecore_i3-8140uxeon_gold_5320hcore_i7-8086kcore_i5-7360u_firmwarecore_i3-8350kcore_i5-10600kxeon_gold_5222xeon_e7-8870_v4_firmwarecore_i7-10850hxeon_gold_6256xeon_d-1523ncore_i3-1005g1_firmwarexeon_gold_6338n_firmwarecore_i3-9100hl_firmwarecore_i9-9900x_firmwarecore_i5-10500te_firmwarecore_i3-10300t_firmwarecore_i3-8100bcore_i5-8279ucore_i3-10100f_firmwarecore_i5-8600kcore_i7-8700tcore_i3-7100_firmwarecore_i3-9320_firmwarexeon_d-1541xeon_d-1543n_firmwarexeon_gold_5320t_firmwarexeon_d-2799_firmwarexeon_e3-1245_v5_firmwarexeon_d-1622xeon_gold_5222_firmwarecore_i7-8700t_firmwarecore_i5-1030g7_firmwarecore_i5-8600t_firmwarexeon_platinum_8352v_firmwarexeon_w-2223xeon_gold_5318n_firmwarexeon_gold_6238tcore_i5-8500xeon_silver_4310t_firmwarecore_i5-9400h_firmwarecore_i5-10400f_firmwarecore_i9-10980xe_firmwarexeon_gold_6240r_firmwarecore_i5-8257uxeon_gold_5318yxeon_gold_6212u_firmwarexeon_gold_6208u_firmwarecore_i7-8569uxeon_silver_4310core_i9-9900tcore_i7-10700t_firmwarexeon_d-2796ntxeon_e3-1240_v5xeon_w-2133xeon_platinum_8260lxeon_e-2336_firmwarexeon_platinum_8270xeon_gold_6248r_firmwarecore_i5-8500txeon_e3-1501m_v6core_i7-4930k_firmwarexeon_d-2766nt_firmwarexeon_w-11555mre_firmwarexeon_d-2166ntxeon_gold_6348_firmwarecore_i3-10305core_i7-9850he_firmwarexeon_e5-2608l_v4xeon_w-1390pcore_i3-9100_firmwarexeon_e5-2658_v4_firmwarecore_i7-7560u_firmwarexeon_gold_6262vxeon_platinum_8354h_firmwarecore_i7-10710uxeon_e5-2620_v4xeon_e7-4809_v4core_i5-10300hxeon_platinum_8358pcore_i5-10210yxeon_silver_4210_firmwarexeon_d-1702_firmwarexeon_platinum_8380hl_firmwarexeon_w-1270texeon_e-2224core_i9-9900ks_firmwarexeon_e-2124_firmwarexeon_gold_6238rxeon_e-2278gelxeon_d-1553ncore_i5-1030g4xeon_gold_6222v_firmwarexeon_d-2798nt_firmwarecore_i9-10980hk_firmwarexeon_d-2166nt_firmwarexeon_e5-2699a_v4core_i5-10400_firmwarexeon_gold_5317xeon_gold_6242r_firmwarexeon_w-2155core_i3-7102exeon_w-11155mle_firmwarexeon_platinum_8376hlxeon_e7-8894_v4_firmwarexeon_silver_4216_firmwarexeon_d-1746tercore_i9-10900k_firmwarexeon_gold_5215l_firmwarexeon_d-2738_firmwarexeon_w-2225_firmwarexeon_gold_6230xeon_d-1714_firmwarexeon_e5-2650l_v4xeon_e7-4820_v4core_i3-9100ecore_i3-7300xeon_d-1548core_i7-10510yxeon_e3-1220_v5core_i5-7y57_firmwarecore_i7-7820x_firmwarexeon_platinum_8260yxeon_d-1653nxeon_e-2276ml_firmwarexeon_e3-1505m_v5_firmwarexeon_e3-1578l_v5_firmwarecore_i9-10900_firmwarexeon_gold_5218txeon_e-2374gxeon_e-2254ml_firmwarexeon_d-1557_firmwarecore_i5-9500t_firmwarexeon_gold_5218ncore_i7-8709g_firmwarexeon_d-2163it_firmwarexeon_w-2295_firmwarexeon_d-1531core_i7-10875h_firmwarexeon_e7-8891_v4xeon_silver_4314_firmwarexeon_d-1533n_firmwarexeon_e-2278gexeon_e3-1545m_v5_firmwarexeon_silver_4214yxeon_w-10855mxeon_d-2177ntxeon_e5-2630l_v4_firmwarexeon_w-3275_firmwarecore_i5-10600t_firmwarexeon_platinum_8270_firmwarecore_i5-10300h_firmwarexeon_d-2775te_firmwarexeon_w-3235xeon_e5-2680_v4_firmwarecore_i9-10900txeon_d-1571_firmwarexeon_e-2126gxeon_e7-8893_v4_firmwarecore_i7-10700tecore_i9-10900kcore_i5-10600_firmwarexeon_e5-4650_v4_firmwarexeon_gold_5220rxeon_w-11955mcore_i5-10400txeon_w-1290ecore_i7-9700kfxeon_d-2796texeon_d-1541_firmwarexeon_w-1290te_firmwarexeon_gold_6328hl_firmwarexeon_platinum_9221xeon_d-2142itcore_i5-7600k_firmwarexeon_platinum_9222_firmwarecore_i5-8305g_firmwarexeon_e5-2699r_v4core_i3-8100b_firmwarecore_i9-10900te_firmwarexeon_e5-2640_v4_firmwarecore_i3-8300t_firmwarecore_i3-7167u_firmwarexeon_d-1726xeon_platinum_8380_firmwarecore_i7-10700_firmwarexeon_d-1735tr_firmwarexeon_silver_4314core_i3-1005g1core_i7-1068ng7xeon_d-2796nt_firmwarexeon_e7-8880_v4_firmwarecore_i7-7820eq_firmwarexeon_d-1637core_i5-9400fxeon_d-1539_firmwarexeon_e3-1515m_v5core_i5-9500f_firmwarecore_i7-6800kcore_i7-7560uxeon_platinum_8368_firmwarecore_i7-8550u_firmwarexeon_d-1602xeon_e5-4655_v4core_i5-8365uxeon_platinum_8376hxeon_w-2245xeon_d-2799xeon_gold_6312u_firmwarexeon_d-2145ntcore_i5-9600kfxeon_e5-2697a_v4xeon_e-2288g_firmwarexeon_w-1250te_firmwarexeon_e-2224gcore_i5-8600_firmwarecore_i3-8100_firmwarecore_i5-8269uxeon_gold_6254_firmwarexeon_e5-1620_v4xeon_e5-4669_v4xeon_gold_5220_firmwarexeon_e5-2609_v4_firmwarexeon_gold_6338ncore_i5-7600t_firmwarecore_i7-9700t_firmwarecore_i7-8665ue_firmwarecore_i7-4820k_firmwarexeon_gold_6330core_i7-7820hq_firmwarexeon_silver_4208_firmwarexeon_d-1521core_i3-8145uexeon_w-2155_firmwarexeon_e5-2687w_v4_firmwarexeon_d-1713nt_firmwarecore_i5-8265ucore_i7-10700txeon_e-2246g_firmwarecore_i9-9900kfxeon_e5-4620_v4_firmwarecore_i7-10750hxeon_e-2226ge_firmwarexeon_d-2753ntxeon_e3-1225_v6_firmwarexeon_gold_6338xeon_gold_5315ycore_i5-8400b_firmwarecore_i7-8706gcore_i7-5930k_firmwarecore_i5-7400t_firmwarexeon_silver_4215xeon_gold_6230ncore_i5-8365u_firmwarexeon_platinum_8280l_firmwarexeon_e5-2667_v4_firmwarecore_i9-10885hxeon_gold_6338tcore_i5-9500_firmwarecore_i5-7440eqxeon_d-1739_firmwarexeon_e-2386gcore_i3-9100t_firmwarecore_m3-7y32xeon_gold_6242_firmwarexeon_d-1733nt_firmwarecore_i7-10750h_firmwarexeon_e-2134xeon_w-1290texeon_w-3265_firmwarexeon_d-2142it_firmwarexeon_platinum_8360y_firmwarecore_i7-8557u_firmwarecore_m3-7y32_firmwarexeon_w-11865mre_firmwarexeon_platinum_8360hxeon_e-2176mxeon_gold_6230t_firmwarecore_i3-1000g1_firmwarexeon_gold_5218_firmwarecore_i9-10900t_firmwarexeon_silver_4210txeon_w-3275m_firmwarexeon_e-2134_firmwarexeon_e5-4669_v4_firmwarexeon_e5-4667_v4xeon_d-2795ntcore_i5-7267u_firmwarecore_i5-7640x_firmwarexeon_d-2779xeon_w-3245m_firmwarecore_i5-9600txeon_e-2226g_firmwarexeon_e5-1650_v4core_i9-7960xxeon_gold_6336y_firmwarexeon_w-1370xeon_d-1715terxeon_d-1559xeon_platinum_9242_firmwarexeon_e-2174gxeon_e3-1220_v6core_i7-7y75_firmwarexeon_d-1537xeon_e7-4850_v4xeon_e3-1220_v6_firmwarexeon_gold_6230_firmwarexeon_e7-4850_v4_firmwarexeon_e-2176gxeon_gold_6254xeon_e7-8880_v4core_i3-10320xeon_gold_6342_firmwarexeon_e5-2667_v4core_i3-10105fxeon_w-1390t_firmwarexeon_gold_5320xeon_e-2224_firmwarexeon_gold_5320h_firmwarexeon_d-1649nxeon_e7-8890_v4core_i7-10875hxeon_d-1736nt_firmwarecore_i5-10400hxeon_d-2712t_firmwarecore_i5-9600kf_firmwarecore_i7-9800x_firmwarexeon_w-10885mxeon_gold_6234_firmwarexeon_e-2224g_firmwarexeon_d-1527core_i9-9940xcore_i9-9980xe_firmwarexeon_gold_6312uxeon_e3-1535m_v5core_i9-7940xxeon_gold_5220r_firmwarexeon_platinum_8380hlxeon_e3-1505l_v5core_i7-9700texeon_e7-4830_v4_firmwarexeon_gold_6248rxeon_silver_4214xeon_w-2125core_i9-9900k_firmwarexeon_gold_5220sxeon_platinum_8260core_i7-7800x_firmwarecore_i3-10105t_firmwarecore_i5-10400h_firmwarexeon_silver_4309yxeon_e5-2699_v4xeon_e5-2603_v4xeon_d-2146ntcore_i3-10100txeon_d-1713ntcore_i3-9100f_firmwarecore_i7-7700hq_firmwarecore_i9-9980hkxeon_e-2244gcore_i3-7100txeon_w-2125_firmwarecore_i5-1035g4_firmwarexeon_platinum_8358p_firmwarexeon_e3-1235l_v5_firmwarecore_i7-9850h_firmwarexeon_d-2795nt_firmwarecore_i7-8559ucore_i5-9500exeon_gold_6314u_firmwarecore_i9-9920x_firmwarexeon_platinum_8368qxeon_w-1250e_firmwarecore_i7-4960xcore_i7-5960xxeon_d-1521_firmwarexeon_e3-1285_v6_firmwarexeon_w-1290t_firmwarecore_i7-9750h_firmwarexeon_gold_6209u_firmwarecore_i3-10325core_i9-7920x_firmwarexeon_e-2356gxeon_platinum_8356h_firmwarecore_i7-8700core_i3-7130ucore_i5-8400xeon_platinum_8276l_firmwarexeon_e3-1585l_v5_firmwarexeon_e3-1585_v5xeon_platinum_8380hxeon_gold_6262v_firmwarexeon_e-2334core_i7\+8700core_i5-7440hq_firmwarecore_i7-9850hcore_i3-10110u_firmwarecore_i5-7600core_i9-10980xexeon_e3-1505l_v5_firmwarexeon_w-11865mlexeon_e3-1280_v5_firmwarexeon_e5-2697_v4xeon_e-2186gxeon_gold_6226_firmwarecore_i5-8310y_firmwarexeon_silver_4210core_i9-10885h_firmwarexeon_gold_6250l_firmwarexeon_e3-1280_v5xeon_e5-1680_v4_firmwarecore_i3-7320_firmwarecore_i7-8569u_firmwarexeon_e5-2630_v4xeon_gold_6240y_firmwarexeon_w-1350pxeon_d-2143it_firmwarecore_i5-9400txeon_w-3245_firmwarecore_i3-10300xeon_w-1290p_firmwarexeon_w-1250p_firmwarexeon_bronze_3204_firmwarecore_i3-8100t_firmwarecore_i5-7600_firmwarecore_i9-9960x_firmwarecore_i5-10310u_firmwarecore_i5-8400_firmwarexeon_e-2234_firmwarecore_i7-10870hxeon_silver_4215r_firmwarecore_i7-10510uxeon_w-1290pcore_i7-7920hq_firmwarecore_i5-8310ycore_i5-10500h_firmwarexeon_d-1523n_firmwarecore_i3-10300_firmwarexeon_d-2183it_firmwarexeon_w-3245xeon_e-2324gxeon_e5-2628l_v4_firmwarecore_i9-7980xexeon_e5-2697_v4_firmwarexeon_e3-1270_v5xeon_w-3345xeon_e-2186m_firmwarexeon_d-1528xeon_w-2295xeon_e-2234core_i3-9100tcore_i5-10500xeon_platinum_8351nxeon_gold_6354_firmwarexeon_e5-1650_v4_firmwarecore_i7-8850hcore_i9-8950hk_firmwarecore_i5-8400h_firmwarexeon_e3-1240_v6_firmwarexeon_d-1622_firmwarexeon_w-11865mrecore_i3-10100_firmwarexeon_platinum_8352y_firmwarecore_i9-10900texeon_platinum_8260y_firmwarexeon_platinum_8358core_i5-1030g4_firmwarecore_i5-9500fxeon_e3-1501l_v6core_i3-10100yxeon_e7-8867_v4xeon_e-2378core_i7-7820xcore_i7-3970x_firmwarexeon_e5-2630_v4_firmwarexeon_e5-2699r_v4_firmwarexeon_gold_5317_firmwarecore_i7-7800xcore_i5-9400hxeon_platinum_8253xeon_gold_6252nxeon_e7-8894_v4core_i3-9320xeon_platinum_8280core_i7-10700f_firmwarecore_i3-10100t_firmwarexeon_w-2255_firmwarexeon_gold_5220t_firmwarecore_i3-10105xeon_silver_4309y_firmwarecore_i7-4940mxxeon_gold_6246core_i9-10900kf_firmwarexeon_e5-4610_v4_firmwarexeon_e5-1630_v4core_i7-8550uxeon_w-1350_firmwarecore_i7-10810u_firmwarecore_i9-10940xcore_i7-9700xeon_e3-1270_v6xeon_w-3265m_firmwarexeon_d-1577_firmwarecore_i7-9850hexeon_platinum_8360hlcore_i7-10700kfcore_i7-9850hl_firmwarecore_i5-8260u_firmwarexeon_d-1748texeon_gold_5315y_firmwarecore_i5-7500txeon_silver_4310txeon_d-2187ntxeon_d-1518xeon_gold_5318hcore_i3-1000g1xeon_w-2225xeon_gold_5320_firmwarecore_i7-3820_firmwarexeon_e-2276mexeon_silver_4210t_firmwarecore_i5-7y54xeon_gold_5218t_firmwarecore_i7-6950xxeon_e5-4620_v4core_i5-7400core_i7-8700b_firmwarexeon_e7-8870_v4xeon_e-2356g_firmwarecore_i3-10305t_firmwarexeon_w-10855m_firmwarecore_i9-10850k_firmwarecore_i7-7660u_firmwarecore_i5-8365ue_firmwarexeon_e5-2698_v4xeon_platinum_8352score_i7-7920hqxeon_d-1718tcore_i7-10700xeon_d-1533ncore_i3-7020uxeon_w-2195xeon_e-2136core_i5-9300hfcore_i3-8145u_firmwarexeon_w-1270pcore_i5-8600k_firmwarecore_i9-9940x_firmwarexeon_gold_6258rxeon_platinum_9282core_i5-10400core_i3-7020u_firmwarexeon_d-2161ixeon_w-1250pcore_i7-8700kcore_i3-7130u_firmwarexeon_silver_4215_firmwarexeon_d-2123itcore_i5-8365uecore_i3-8109ucore_i7-4960x_firmwarexeon_bronze_3206rxeon_gold_6346xeon_d-1722nexeon_w-3275xeon_gold_6240xeon_d-2161i_firmwarecore_i5-8200y_firmwarexeon_gold_5220core_i5-8350uxeon_platinum_8256_firmwarexeon_e3-1275_v5core_i7-8750h_firmwarexeon_e5-4610_v4core_i3-10100texeon_e3-1558l_v5_firmwarecore_i5-10210u_firmwarecore_i3-8140u_firmwarexeon_d-1537_firmwarexeon_d-2796te_firmwarecore_i5-7y57xeon_w-3375_firmwarecore_i3-9300_firmwarecore_i7-3920xmxeon_gold_6330hcore_i5-7260uxeon_d-1540_firmwarecore_i5-10600k_firmwarexeon_e7-8890_v4_firmwarecore_i5-8259u_firmwarexeon_e5-2683_v4_firmwarexeon_e-2124core_i7-9750hcore_i3-10110y_firmwarexeon_e-2186g_firmwarexeon_d-1553n_firmwarecore_i9-7980xe_firmwarexeon_platinum_8368xeon_w-1270te_firmwarecore_i7-8559u_firmwarecore_i5-7500_firmwarexeon_d-2798ntcore_i5-10600xeon_e3-1240l_v5_firmwarecore_i5-10500_firmwarexeon_w-2245_firmwarexeon_e3-1260l_v5core_i5-10310yxeon_d-1736core_i5-10310y_firmwarexeon_d-2738xeon_d-1567_firmwarecore_i5-8259uxeon_e-2388g_firmwarexeon_gold_6326_firmwarexeon_gold_6230r_firmwarexeon_e-2336xeon_gold_6246_firmwarexeon_e3-1225_v5xeon_platinum_8260_firmwarexeon_e-2286mcore_i9-9880hcore_i7-8705g_firmwarecore_i7-4930mx_firmwarexeon_gold_6244_firmwarexeon_d-1722ne_firmwarecore_i5-1035g4core_i7-8650ucore_i5-10200hcore_i7-8705gxeon_platinum_8276xeon_d-1529xeon_gold_5220txeon_e-2324g_firmwarecore_i7-7600uxeon_gold_6244xeon_w-3223_firmwarexeon_gold_6242rcore_i5-1035g7_firmwarecore_i3-7100exeon_w-2275xeon_w-3175x_firmwarecore_i7\+8700_firmwarexeon_w-2265core_i5-9500xeon_e3-1535m_v6core_i3-7101ecore_i9-9900xeon_w-10885m_firmwarecore_i3-8145ue_firmwarecore_i9-9820xxeon_d-1714xeon_gold_5218b_firmwarexeon_platinum_8354hxeon_gold_6348hxeon_gold_6248_firmwarecore_i7-9750hfxeon_e3-1501m_v6_firmwarexeon_d-2141icore_i7-3920xm_firmwarecore_i7-6850k_firmwarecore_i7-3960x_firmwarexeon_e-2176g_firmwarecore_i5-1035g7xeon_gold_6326xeon_e-2254mlcore_i5-8305gcore_i3-9350kcore_i5-7400txeon_gold_6348core_i7-8750hxeon_w-2145_firmwarecore_i3-10100e_firmwarexeon_d-2183itxeon_d-2123it_firmwarexeon_e3-1275_v6_firmwarecore_i5-8300hcore_i9-7940x_firmwarecore_i3-7101te_firmwarexeon_d-2712txeon_e5-2650l_v4_firmwarecore_i5-9500e_firmwarecore_i9-7900x_firmwarecore_i7-9700e_firmwarecore_i5-9500texeon_w-1290e_firmwarexeon_d-1520core_i5-7y54_firmwarexeon_d-2187nt_firmwarexeon_w-1390p_firmwarexeon_e3-1280_v6_firmwarecore_i9-10900f_firmwarexeon_w-11955m_firmwarexeon_platinum_8280lcore_m3-8100yxeon_platinum_8356hxeon_gold_6338t_firmwarecore_i5-7267ucore_i3-7100uxeon_d-1543ncore_i5-7260u_firmwarexeon_e7-8867_v4_firmwarexeon_gold_5318y_firmwarecore_i5-7300u_firmwarexeon_d-1732texeon_d-1520_firmwarexeon_platinum_9242xeon_e5-4660_v4_firmwarexeon_e5-2680_v4core_i7-10700e_firmwarecore_i3-9100te_firmwarexeon_e5-2660_v4_firmwarecore_i3-7300tcore_i5-8210yxeon_e5-2687w_v4core_i7-1060g7core_i7-8565u_firmwarexeon_w-11855m_firmwarecore_i7-5820kxeon_platinum_8352m_firmwarecore_i7-9700_firmwarecore_i7-7700tcore_i7-6900kcore_i9-9980xexeon_platinum_9282_firmwarexeon_gold_6250xeon_d-1713ntecore_i3-9350kfxeon_w-1290txeon_d-1739core_i7-8809gxeon_gold_6226core_i3-10105_firmwarecore_i7-8650u_firmwarexeon_d-1577xeon_d-1735trxeon_silver_4214_firmwarexeon_platinum_8268_firmwarecore_i7-10850h_firmwarexeon_e3-1535m_v5_firmwarexeon_e-2314xeon_e5-2690_v4_firmwarecore_i7-8700_firmwarecore_i3-7350kcore_i3-8300_firmwarecore_i5-10505xeon_d-1539xeon_e5-4627_v4_firmwarexeon_e5-2648l_v4_firmwarexeon_silver_4310_firmwarexeon_platinum_8360h_firmwarexeon_w-2255core_i9-10900x_firmwarecore_i5-7600kcore_m3-7y30_firmwarexeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_d-1746ter_firmwarexeon_w-11865mle_firmwarecore_i3-1000g4_firmwarexeon_gold_6330_firmwarecore_i5-8350u_firmwarexeon_e-2276g_firmwarexeon_d-1627_firmwarexeon_d-1733ntxeon_gold_5218xeon_w-2145xeon_gold_6338_firmwarecore_i7-4940mx_firmwarecore_i3-9100fxeon_w-1250_firmwarecore_i5-7500t_firmwarexeon_d-1653n_firmwarecore_i9-10900fxeon_w-3225_firmwarexeon_e3-1245_v6xeon_e-2378gcore_i5-10200h_firmwarecore_i3-8100txeon_gold_6238r_firmwarecore_i5-9500txeon_platinum_8352yxeon_w-3223xeon_e5-2643_v4xeon_e3-1268l_v5_firmwarexeon_e-2276gxeon_gold_6222vcore_i7-10700fxeon_e5-1620_v4_firmwarexeon_d-1571core_i5-9600k_firmwarexeon_gold_6238t_firmwarexeon_e5-2620_v4_firmwarexeon_platinum_8353h_firmwarexeon_gold_5217_firmwareIntel(R) Processors
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-33200
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.81%
||
7 Day CHG~0.00%
Published-27 May, 2021 | 00:00
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux->alu_limit.

Action-Not Available
Vendor-n/aNetApp, Inc.Fedora ProjectLinux Kernel Organization, Inc
Product-h300eh500scloud_backupsolidfire_\&_hci_management_nodeh300s_firmwareh410sh300ssolidfire_baseboard_management_controllerh300e_firmwarelinux_kernelh500eh410s_firmwarefedorah500s_firmwareh500e_firmwareh700s_firmwareh700eh700e_firmwareh700sn/a
CWE ID-CWE-787
Out-of-bounds Write
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 6
  • 7
  • Next
Details not found