Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2018-5410

Summary
Assigner-certcc
Assigner Org ID-37e5125f-f79b-445b-8fad-9564f167944b
Published At-07 Jan, 2019 | 14:00
Updated At-05 Aug, 2024 | 05:33
Rejected At-
Credits

Dokan file system driver contains a stack-based buffer overflow

Dokan, versions between 1.0.0.5000 and 1.2.0.1000, are vulnerable to a stack-based buffer overflow in the dokan1.sys driver. An attacker can create a device handle to the system driver and send arbitrary input that will trigger the vulnerability. This vulnerability was introduced in the 1.0.0.5000 version update.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:certcc
Assigner Org ID:37e5125f-f79b-445b-8fad-9564f167944b
Published At:07 Jan, 2019 | 14:00
Updated At:05 Aug, 2024 | 05:33
Rejected At:
▼CVE Numbering Authority (CNA)
Dokan file system driver contains a stack-based buffer overflow

Dokan, versions between 1.0.0.5000 and 1.2.0.1000, are vulnerable to a stack-based buffer overflow in the dokan1.sys driver. An attacker can create a device handle to the system driver and send arbitrary input that will trigger the vulnerability. This vulnerability was introduced in the 1.0.0.5000 version update.

Affected Products
Vendor
Dokan
Product
Open Source File System
Versions
Affected
  • From 1.0.0.5000 before 1.0.0.5000* (custom)
  • From 1.2.0.1000 through 1.2.0.1000 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-121CWE-121: Stack-based Buffer Overflow
Type: CWE
CWE ID: CWE-121
Description: CWE-121: Stack-based Buffer Overflow
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Dokan developers have released a new version, 1.2.1, that fixes this vulnerability by validating the user input.

Configurations

Workarounds

Exploits

Credits

Thanks to Parvez Anwar for reporting this vulnerability.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://kb.cert.org/vuls/id/741315/
third-party-advisory
x_refsource_CERT-VN
https://www.exploit-db.com/exploits/46155/
exploit
x_refsource_EXPLOIT-DB
https://cwe.mitre.org/data/definitions/121.html
x_refsource_MISC
https://github.com/dokan-dev/dokany/releases/tag/v1.2.1.1000
x_refsource_CONFIRM
http://www.securityfocus.com/bid/106274
vdb-entry
x_refsource_BID
Hyperlink: https://kb.cert.org/vuls/id/741315/
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: https://www.exploit-db.com/exploits/46155/
Resource:
exploit
x_refsource_EXPLOIT-DB
Hyperlink: https://cwe.mitre.org/data/definitions/121.html
Resource:
x_refsource_MISC
Hyperlink: https://github.com/dokan-dev/dokany/releases/tag/v1.2.1.1000
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/106274
Resource:
vdb-entry
x_refsource_BID
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://kb.cert.org/vuls/id/741315/
third-party-advisory
x_refsource_CERT-VN
x_transferred
https://www.exploit-db.com/exploits/46155/
exploit
x_refsource_EXPLOIT-DB
x_transferred
https://cwe.mitre.org/data/definitions/121.html
x_refsource_MISC
x_transferred
https://github.com/dokan-dev/dokany/releases/tag/v1.2.1.1000
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/106274
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://kb.cert.org/vuls/id/741315/
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: https://www.exploit-db.com/exploits/46155/
Resource:
exploit
x_refsource_EXPLOIT-DB
x_transferred
Hyperlink: https://cwe.mitre.org/data/definitions/121.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/dokan-dev/dokany/releases/tag/v1.2.1.1000
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/106274
Resource:
vdb-entry
x_refsource_BID
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cret@cert.org
Published At:07 Jan, 2019 | 13:29
Updated At:18 Sep, 2020 | 16:50

Dokan, versions between 1.0.0.5000 and 1.2.0.1000, are vulnerable to a stack-based buffer overflow in the dokan1.sys driver. An attacker can create a device handle to the system driver and send arbitrary input that will trigger the vulnerability. This vulnerability was introduced in the 1.0.0.5000 version update.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.2
Base severity: HIGH
Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

dokan_project
dokan_project
>>dokan>>Versions from 1.0.0.5000(inclusive) to 1.2.0.1000(exclusive)
cpe:2.3:a:dokan_project:dokan:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-787Primarynvd@nist.gov
CWE-121Secondarycret@cert.org
CWE ID: CWE-787
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-121
Type: Secondary
Source: cret@cert.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/106274cret@cert.org
Third Party Advisory
VDB Entry
https://cwe.mitre.org/data/definitions/121.htmlcret@cert.org
Third Party Advisory
https://github.com/dokan-dev/dokany/releases/tag/v1.2.1.1000cret@cert.org
Patch
Third Party Advisory
https://kb.cert.org/vuls/id/741315/cret@cert.org
Third Party Advisory
US Government Resource
https://www.exploit-db.com/exploits/46155/cret@cert.org
Exploit
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/106274
Source: cret@cert.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://cwe.mitre.org/data/definitions/121.html
Source: cret@cert.org
Resource:
Third Party Advisory
Hyperlink: https://github.com/dokan-dev/dokany/releases/tag/v1.2.1.1000
Source: cret@cert.org
Resource:
Patch
Third Party Advisory
Hyperlink: https://kb.cert.org/vuls/id/741315/
Source: cret@cert.org
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://www.exploit-db.com/exploits/46155/
Source: cret@cert.org
Resource:
Exploit
Third Party Advisory
VDB Entry

Change History

0
Information is not available yet

Similar CVEs

1534Records found

CVE-2024-7546
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-7.8||HIGH
EPSS-0.13% / 33.20%
||
7 Day CHG-0.04%
Published-05 Aug, 2024 | 23:54
Updated-29 Aug, 2024 | 17:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
oFono SimToolKit Heap-based Buffer Overflow Privilege Escalation Vulnerability

oFono SimToolKit Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability. The specific flaw exists within the parsing of STK command PDUs. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-23459.

Action-Not Available
Vendor-ofono_projectoFonoofono
Product-ofonooFonoofono
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-28252
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-56.50% / 98.06%
||
7 Day CHG~0.00%
Published-11 Apr, 2023 | 19:13
Updated-28 Oct, 2025 | 14:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2023-05-02||Apply updates per vendor instructions.
Windows Common Log File System Driver Elevation of Privilege Vulnerability

Windows Common Log File System Driver Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_11_21h2windows_10_1507windows_11_22h2windows_server_2012windows_server_2008windows_10_21h2windows_server_2022windows_10_1607windows_10_22h2windows_10_1809windows_server_2019windows_10_20h2windows_server_2016Windows 11 version 21H2Windows Server 2016 (Server Core installation)Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2019 (Server Core installation)Windows 10 Version 22H2Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2012 (Server Core installation)Windows Server 2022Windows Server 2019Windows 10 Version 1507Windows 10 Version 1607Windows 10 Version 21H2Windows Server 2008 Service Pack 2Windows Server 2012 R2Windows 10 Version 1809Windows 11 version 22H2Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows 10 Version 20H2Windows Server 2008 R2 Service Pack 1Windows Server 2016Windows
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-1380
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-91.73% / 99.67%
||
7 Day CHG~0.00%
Published-17 Aug, 2020 | 19:13
Updated-29 Oct, 2025 | 13:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-05-03||Apply updates per vendor instructions.
Scripting Engine Memory Corruption Vulnerability

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_7windows_10_1709windows_server_2012windows_10_1903windows_rt_8.1windows_10_2004windows_8.1windows_10_1803internet_explorerwindows_10_1507windows_10_1909windows_server_2008windows_10_1607windows_10_1809windows_server_2019windows_server_2016Internet Explorer 11Internet Explorer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-20009
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.8||MEDIUM
EPSS-0.30% / 53.15%
||
7 Day CHG~0.00%
Published-10 May, 2022 | 19:57
Updated-03 Aug, 2024 | 01:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In various functions of the USB gadget subsystem, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-213172319References: Upstream kernel

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-14386
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.60% / 68.93%
||
7 Day CHG+0.05%
Published-16 Sep, 2020 | 12:48
Updated-04 Aug, 2024 | 12:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.

Action-Not Available
Vendor-Linux KernelLinux Kernel Organization, IncopenSUSEFedora ProjectDebian GNU/Linux
Product-debian_linuxlinux_kernelfedoraleapkernel
CWE ID-CWE-250
Execution with Unnecessary Privileges
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-1943
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.11% / 29.68%
||
7 Day CHG~0.00%
Published-01 Jun, 2022 | 00:00
Updated-03 Aug, 2024 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw out of bounds memory write in the Linux kernel UDF file system functionality was found in the way user triggers some file operation which triggers udf_write_fi(). A local user could use this flaw to crash the system or potentially

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kernelKernel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-1478
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-15.02% / 94.42%
||
7 Day CHG~0.00%
Published-17 Aug, 2020 | 19:13
Updated-04 Aug, 2024 | 06:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Media Foundation Memory Corruption Vulnerability

A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2012windows_8.1windows_rt_8.1windows_7windows_10windows_server_2019windows_server_2008Windows 10 Version 1607Windows Server version 2004Windows Server 2019 (Server Core installation)Windows 10 Version 1903 for x64-based SystemsWindows 10 Version 1903 for ARM64-based SystemsWindows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 10 Version 1903 for 32-bit SystemsWindows 8.1Windows 7Windows Server 2012 (Server Core installation)Windows 10 Version 1709Windows 10 Version 1909Windows 7 Service Pack 1Windows Server 2016Windows 10 Version 2004Windows 10 Version 1507Windows Server 2008 R2 Service Pack 1Windows 10 Version 1803Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server, version 1909 (Server Core installation)Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)Windows Server, version 1903 (Server Core installation)Windows 10 Version 1709 for 32-bit Systems
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-20203
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.93%
||
7 Day CHG~0.00%
Published-15 Jun, 2022 | 21:50
Updated-03 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In multiple locations of the nanopb library, there is a possible way to corrupt memory when decoding untrusted protobuf files. This could lead to local escalation of privilege,with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-20048
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.67%
||
7 Day CHG~0.00%
Published-09 Mar, 2022 | 17:02
Updated-03 Aug, 2024 | 01:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In video decoder, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917502; Issue ID: ALPS05917502.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt9980mt6893mt9901mt9970androidmt6885mt9900mt5816mt9969mt9950mt5835MT5816, MT5835, MT6885, MT6893, MT9900, MT9901, MT9950, MT9969, MT9970, MT9980
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-3489
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-7.8||HIGH
EPSS-0.08% / 22.80%
||
7 Day CHG~0.00%
Published-04 Jun, 2021 | 01:40
Updated-16 Sep, 2024 | 20:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linux kernel eBPF RINGBUF map oversized allocation

The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee ("bpf, ringbuf: Deny reserve of buffers larger than ringbuf") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 ("bpf: Implement BPF ring buffer and verifier support for it") (v5.8-rc1).

Action-Not Available
Vendor-Linux Kernel Organization, IncCanonical Ltd.
Product-ubuntu_linuxlinux_kernelLinux kernel
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-3491
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.64%
||
7 Day CHG~0.00%
Published-04 Jun, 2021 | 01:40
Updated-16 Sep, 2024 | 22:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linux kernel io_uring PROVIDE_BUFFERS MAX_RW_COUNT bypass

The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/<PID>/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b ("io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c ("io_uring: add IORING_OP_PROVIDE_BUFFERS") (v5.7-rc1).

Action-Not Available
Vendor-Linux Kernel Organization, IncCanonical Ltd.
Product-ubuntu_linuxlinux_kernelLinux kernel
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-35103
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.09%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 04:40
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible out of bound write due to improper validation of number of timer values received from firmware while syncing timers in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa6150p_firmwareipq4028_firmwareqca8337ar9380ipq8173_firmwarewcd9360_firmwaresdx65qcn5124qca4024_firmwarewcn3950_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqca6595au_firmwaresa6155qcs6125_firmwaresa415mwcn3998qca6554a_firmwarewcn3950ipq8076aqcn6024_firmwaresd_8_gen1_5g_firmwaresm6375_firmwaresd460_firmwaresm7315_firmwareqca6574au_firmwareqcn5164_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwarewcd9360ipq8070_firmwareipq8065ipq8078a_firmwareqrb5165_firmwareipq5028qca7500ipq4029_firmwareqcs6125qrb5165m_firmwaresa4155p_firmwaresa8155_firmwareipq6010sd662_firmwareipq8068qcn6132sd765gsw5100qca6436wcn6851sa6155pqca9888_firmwareqcn6122ipq8068_firmwareqca6696_firmwaresd870_firmwareqcn5154_firmwaresa8150pwsa8830_firmwareqca9992_firmwaresd865_5g_firmwarewcn3988sa8195p_firmwaresm8475qca9898qcn5022_firmwarewcn6750_firmwareipq4028ipq5018_firmwaresm6375qca9985_firmwarewcn3991ipq4018_firmwareqca8337_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwaresw5100pipq8076a_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164qca6574csr8811_firmwarewcd9380qcn5054_firmwareipq4019_firmwareqcn5024qca8072_firmwareqca9985qcn9012_firmwareqcn5052_firmwarewcn3980ipq6018_firmwarewsa8815wcn6850pmp8074_firmwareqcn6112qca6426_firmwareqca9984ipq6028ipq8064qcn9024pmp8074wcn3980_firmwaresdx55mipq8064_firmwarewcn6740_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareipq8070qca9994qca9980qcn9024_firmwareipq8174_firmwareqca9880sd480sd870wcn6855sw5100p_firmwareipq6018sa6145pqca9886_firmwareqca6595_firmwaresa8145pqca6391_firmwaresa4150p_firmwareqca4024sd780g_firmwarewcd9370_firmwaresdx55sd888_firmwareqcn5021_firmwaresa8155psa4155par8035_firmwareqcn5024_firmwarewcn3991_firmwarewsa8830qcn9070sa8145p_firmwarecsrb31024qcn9072qca9880_firmwareqca9992sd765g_firmwareqca6390_firmwarewcd9370qcn5152_firmwareqca6426qca6584au_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareipq5018wcd9385_firmwaresdxr2_5g_firmwareipq8074asd662qcn5124_firmwareqcn6100_firmwareqcn6102_firmwareqcn9011_firmwaresa8155qcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwaresm7250p_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwareqca6584ausa6155p_firmwaresd778gsm6225sa515m_firmwareipq8174qca9990sdxr2_5gqcs6490qcn5052qcn6112_firmwaresa415m_firmwarewcn3988_firmwareqcn9074sa6145p_firmwaresd778g_firmwaresa8195pwsa8810_firmwaresd765_firmwareqca8081ipq8071aqcn6023ipq8071a_firmwarewcd9385qcs6490_firmwarear8035csr8811qca6390qca9898_firmwareipq4019wcd9375qcn9100_firmwareipq5010_firmwareipq8074a_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresa4150pqcm6125_firmwareqca8072qcn9000sd780gqca6554asd865_5gqca6595ar9380_firmwareqcn9012sd888qcn6122_firmwareipq8065_firmwarewsa8835sd888_5gqcn5154qca8075_firmwareipq4018qca6574awcn6855_firmwareqca9889sm7325pqcn6132_firmwareqca9888qca9994_firmwarewcn6750ipq8070a_firmwareipq8076_firmwaresa515mqca6574_firmwareqca9886sm7325p_firmwareipq8076sd765qca6574a_firmwareqcn5021qcn5152sd768g_firmwareqrb5165msm7315sd460qca6391qcn6102qcn9100sdx65_firmwarecsrb31024_firmwareqcm6490_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwareqcn9011sm6225_firmwareqca6574auqca9889_firmwaresa8155p_firmwareqcn5122qcm6125wsa8810wcn6856qcn5022ipq6010_firmwaresd768gwcn6740qca6696sa6150pqca8075qcn9022_firmwareqcn6024qcn9022qca9990_firmwareipq8070aqcn6100qcn9072_firmwaresm7250psw5100_firmwareqcn9074_firmwareipq4029Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-3490
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-7.8||HIGH
EPSS-4.63% / 89.05%
||
7 Day CHG+0.69%
Published-04 Jun, 2021 | 01:40
Updated-16 Sep, 2024 | 22:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linux kernel eBPF bitwise ops ALU32 bounds tracking

The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e ("bpf: Fix alu32 const subreg bound tracking on bitwise operations") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 ("bpf: Verifier, do explicit ALU32 bounds tracking") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 ("bpf:Fix a verifier failure with xor") ( 5.10-rc1).

Action-Not Available
Vendor-Linux Kernel Organization, IncCanonical Ltd.
Product-ubuntu_linuxlinux_kernelLinux kernel
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-3600
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-7.8||HIGH
EPSS-0.16% / 37.06%
||
7 Day CHG~0.00%
Published-08 Jan, 2024 | 18:16
Updated-04 Sep, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.

Action-Not Available
Vendor-Red Hat, Inc.Linux Kernel Organization, IncCanonical Ltd.Fedora Project
Product-ubuntu_linuxfedoralinux_kernelenterprise_linuxlinux
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-0943
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-8.4||HIGH
EPSS-0.21% / 43.86%
||
7 Day CHG~0.00%
Published-14 Mar, 2022 | 00:00
Updated-02 Aug, 2024 | 23:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap-based Buffer Overflow occurs in vim in vim/vim

Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.

Action-Not Available
Vendor-VimFedora ProjectDebian GNU/LinuxApple Inc.
Product-vimdebian_linuxmacosfedoravim/vim
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-7539
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-7.8||HIGH
EPSS-0.11% / 30.06%
||
7 Day CHG~0.00%
Published-05 Aug, 2024 | 23:53
Updated-29 Aug, 2024 | 17:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
oFono CUSD Stack-based Buffer Overflow Code Execution Vulnerability

oFono CUSD Stack-based Buffer Overflow Code Execution Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability. The specific flaw exists within the parsing of responses from AT+CUSD commands. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-23195.

Action-Not Available
Vendor-ofono_projectoFonoofono
Product-ofonooFonoofono
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-3434
Matching Score-4
Assigner-Zephyr Project
ShareView Details
Matching Score-4
Assigner-Zephyr Project
CVSS Score-4.9||MEDIUM
EPSS-0.12% / 31.35%
||
7 Day CHG~0.00%
Published-28 Jun, 2022 | 19:45
Updated-17 Sep, 2024 | 00:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
L2CAP: Stack based buffer overflow in le_ecred_conn_req()

Stack based buffer overflow in le_ecred_conn_req(). Zephyr versions >= v2.5.0 Stack-based Buffer Overflow (CWE-121). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8w87-6rfp-cfrm

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-1378
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-2.88% / 86.00%
||
7 Day CHG~0.00%
Published-17 Aug, 2020 | 19:12
Updated-04 Aug, 2024 | 06:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Registry Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system. A locally authenticated attacker could exploit this vulnerability by running a specially crafted application. The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly handles objects in memory.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2012windows_8.1windows_rt_8.1windows_7windows_10windows_server_2019windows_server_2008Windows 10 Version 1607Windows Server version 2004Windows Server 2019 (Server Core installation)Windows 10 Version 1903 for x64-based SystemsWindows 10 Version 1903 for ARM64-based SystemsWindows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 10 Version 1903 for 32-bit SystemsWindows 8.1Windows 7Windows Server 2012 (Server Core installation)Windows 10 Version 1709Windows 10 Version 1909Windows 7 Service Pack 1Windows Server 2016Windows 10 Version 2004Windows 10 Version 1507Windows Server 2008 R2 Service Pack 1Windows 10 Version 1803Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server, version 1909 (Server Core installation)Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)Windows Server, version 1903 (Server Core installation)Windows 10 Version 1709 for 32-bit Systems
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-7543
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-7.8||HIGH
EPSS-0.12% / 30.86%
||
7 Day CHG+0.02%
Published-05 Aug, 2024 | 23:54
Updated-19 Aug, 2024 | 19:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
oFono SimToolKit Heap-based Buffer Overflow Privilege Escalation Vulnerability

oFono SimToolKit Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability. The specific flaw exists within the parsing of STK command PDUs. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-23456.

Action-Not Available
Vendor-ofono_projectoFonoofono
Product-ofonooFonoofono
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2004-1189
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.09% / 25.22%
||
7 Day CHG~0.00%
Published-31 Dec, 2004 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The add_to_history function in svr_principal.c in libkadm5srv for MIT Kerberos 5 (krb5) up to 1.3.5, when performing a password change, does not properly track the password policy's history count and the maximum number of keys, which can cause an array index out-of-bounds error and may allow authenticated users to execute arbitrary code via a heap-based buffer overflow.

Action-Not Available
Vendor-n/aMIT (Massachusetts Institute of Technology)
Product-kerberos_5n/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-33287
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 4.97%
||
7 Day CHG~0.00%
Published-07 Sep, 2021 | 00:00
Updated-03 Dec, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In NTFS-3G versions < 2021.8.22, when specially crafted NTFS attributes are read in the function ntfs_attr_pread_i, a heap buffer overflow can occur and allow for writing to arbitrary memory or denial of service of the application.

Action-Not Available
Vendor-tuxeran/aFedora ProjectDebian GNU/Linux
Product-debian_linuxntfs-3gfedoran/a
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2017-14969
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.74%
||
7 Day CHG~0.00%
Published-20 Dec, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In IKARUS anti.virus before 2.16.18, the ntguard.sys driver contains an Arbitrary Write vulnerability because of not validating input values from IOCtl 0x83000084, a related issue to CVE-2017-17114.

Action-Not Available
Vendor-ikarussecurityn/a
Product-anti.virusn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-12895
Matching Score-4
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-4
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.54%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 15:56
Updated-16 Sep, 2024 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwarewindows_10AMD Radeon Software
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-33285
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 8.76%
||
7 Day CHG-0.00%
Published-07 Sep, 2021 | 00:00
Updated-03 Dec, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS attribute is supplied to the function ntfs_get_attribute_value, a heap buffer overflow can occur allowing for memory disclosure or denial of service. The vulnerability is caused by an out-of-bound buffer access which can be triggered by mounting a crafted ntfs partition. The root cause is a missing consistency check after reading an MFT record : the "bytes_in_use" field should be less than the "bytes_allocated" field. When it is not, the parsing of the records proceeds into the wild.

Action-Not Available
Vendor-tuxeran/aFedora ProjectRed Hat, Inc.Debian GNU/Linux
Product-debian_linuxntfs-3genterprise_linuxfedoran/a
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-34388
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-6.3||MEDIUM
EPSS-0.08% / 23.33%
||
7 Day CHG~0.00%
Published-21 Jun, 2021 | 21:35
Updated-04 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Bootloader contains a vulnerability in NVIDIA TegraBoot where a potential heap overflow might allow an attacker to control all the RAM after the heap block, leading to denial of service or code execution.

Action-Not Available
Vendor-NVIDIA Corporation
Product-jetson_agx_xavier_32gbjetson_tx2_4gbjetson_tx2_nxjetson_tx2jetson_tx2ijetson_agx_xavier_16gbjetson_linuxjetson_tx1jetson_nano_2gbjetson_nanojetson_agx_xavier_8gbjetson_xavier_nxNVIDIA Jetson TX1, TX2 series, TX2 NX, AGX Xavier series, Xavier NX, Nano and Nano 2GB
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-34202
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.33% / 55.73%
||
7 Day CHG~0.00%
Published-16 Jun, 2021 | 18:56
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640) 1.01B04. Ordinary permissions can be elevated to administrator permissions, resulting in local arbitrary code execution. An attacker can combine other vulnerabilities to further achieve the purpose of remote code execution.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-2640-usdir-2640-us_firmwaren/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-12659
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.10% / 26.97%
||
7 Day CHG~0.00%
Published-05 May, 2020 | 06:13
Updated-04 Aug, 2024 | 12:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation.

Action-Not Available
Vendor-n/aNetApp, Inc.Linux Kernel Organization, Inc
Product-linux_kernelcloud_backupsolidfire_\&_hci_management_nodeactive_iq_unified_managerhci_baseboard_management_controllersolidfire_baseboard_management_controlleraff_baseboard_management_controllersteelstore_cloud_integrated_storagen/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-7545
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-7.8||HIGH
EPSS-0.17% / 37.58%
||
7 Day CHG~0.00%
Published-05 Aug, 2024 | 23:54
Updated-19 Aug, 2024 | 20:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
oFono SimToolKit Heap-based Buffer Overflow Privilege Escalation Vulnerability

oFono SimToolKit Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability. The specific flaw exists within the parsing of STK command PDUs. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-23458.

Action-Not Available
Vendor-ofono_projectoFonoofono
Product-ofonooFonoofono
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-0995
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-20.50% / 95.42%
||
7 Day CHG~0.00%
Published-25 Mar, 2022 | 18:03
Updated-02 Aug, 2024 | 23:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch_queue event notification subsystem. This flaw can overwrite parts of the kernel state, potentially allowing a local user to gain privileged access or cause a denial of service on the system.

Action-Not Available
Vendor-n/aNetApp, Inc.Fedora ProjectLinux Kernel Organization, Inc
Product-h300eh500sh615c_firmwareh300s_firmwareh410c_firmwareh410sh610c_firmwareh610s_firmwareh300sh300e_firmwareh610slinux_kernelh500eh410s_firmwarefedorah500s_firmwareh500e_firmwareh700s_firmwareh700eh410ch700e_firmwareh615ch700sh610ckernel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-33286
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.16% / 36.52%
||
7 Day CHG+0.01%
Published-07 Sep, 2021 | 00:00
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In NTFS-3G versions < 2021.8.22, when a specially crafted unicode string is supplied in an NTFS image a heap buffer overflow can occur and allow for code execution.

Action-Not Available
Vendor-tuxeran/aDebian GNU/Linux
Product-ntfs-3gdebian_linuxn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-33289
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.16% / 36.76%
||
7 Day CHG+0.01%
Published-07 Sep, 2021 | 00:00
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In NTFS-3G versions < 2021.8.22, when a specially crafted MFT section is supplied in an NTFS image a heap buffer overflow can occur and allow for code execution.

Action-Not Available
Vendor-tuxeran/aDebian GNU/LinuxFedora Project
Product-ntfs-3gdebian_linuxfedoran/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-13600
Matching Score-4
Assigner-Zephyr Project
ShareView Details
Matching Score-4
Assigner-Zephyr Project
CVSS Score-7||HIGH
EPSS-0.05% / 16.08%
||
7 Day CHG~0.00%
Published-24 May, 2021 | 21:40
Updated-16 Sep, 2024 | 16:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Malformed SPI in response for eswifi can corrupt kernel memory

Malformed SPI in response for eswifi can corrupt kernel memory. Zephyr versions >= 1.14.2, >= 2.3.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hx4p-j86p-2mhr

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-47474
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.86%
||
7 Day CHG~0.00%
Published-22 May, 2024 | 08:19
Updated-24 Sep, 2025 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
comedi: vmk80xx: fix bulk-buffer overflow

In the Linux kernel, the following vulnerability has been resolved: comedi: vmk80xx: fix bulk-buffer overflow The driver is using endpoint-sized buffers but must not assume that the tx and rx buffers are of equal size or a malicious device could overflow the slab-allocated receive buffer when doing bulk transfers.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-33124
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.13% / 33.05%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_e3-1565l_v5xeon_e-2286gcore_i7-7700t_firmwarecore_i3-10100core_i7-8850h_firmwarecore_i5-1038ng7xeon_e5-2603_v4_firmwarecore_i9-7900xxeon_d-2733nt_firmwarecore_i7-10710u_firmwarexeon_e-2174g_firmwarexeon_d-1633nxeon_w-1270p_firmwarexeon_d-2173it_firmwarexeon_d-2145nt_firmwarexeon_e-2246gxeon_e5-2637_v4core_i9-9960xxeon_w-2123xeon_platinum_8353hcore_i7-9700k_firmwarecore_i5-8500t_firmwarexeon_d-1749nt_firmwarecore_i3-9300t_firmwarexeon_e-2236xeon_platinum_8280_firmwarexeon_e3-1220_v5_firmwarexeon_e-2374g_firmwarexeon_e5-4640_v4xeon_w-1270exeon_silver_4209t_firmwarecore_i5-7500xeon_e5-2650_v4_firmwarecore_i9-9900kf_firmwarecore_i5-7440hqcore_i7-8709gxeon_d-2786nte_firmwarexeon_gold_6230txeon_silver_4210rxeon_w-1270xeon_e3-1505l_v6xeon_e-2254me_firmwarexeon_e5-4650_v4core_i5-8200ycore_i5-10500t_firmwarecore_i5-9400t_firmwarecore_i7-8809g_firmwarecore_i5-8260uxeon_gold_6226r_firmwarexeon_e3-1235l_v5core_i5-7287u_firmwarecore_i9-10900xxeon_gold_6256_firmwarexeon_w-3335xeon_e7-8891_v4_firmwarexeon_w-11555mrecore_i5-10500hcore_i7-6800k_firmwarecore_i5-10600kfxeon_e5-2648l_v4core_i5-1035g1_firmwarexeon_w-2123_firmwarexeon_e-2146gxeon_d-2752nte_firmwarecore_i5-8210y_firmwarecore_i3-10100exeon_silver_4316_firmwarexeon_w-3365_firmwarecore_i7-10700kf_firmwarexeon_e-2286g_firmwarecore_i7-9700txeon_gold_6238core_i5-7600tcore_i7-4820kxeon_e3-1260l_v5_firmwarexeon_w-2195_firmwarexeon_e3-1240l_v5xeon_platinum_8256xeon_w-2275_firmwarexeon_e-2276mxeon_d-2163itcore_i7-3930kxeon_gold_6334_firmwarexeon_e3-1505m_v5xeon_w-2235_firmwarexeon_gold_6328hlxeon_d-1623nxeon_e3-1535m_v6_firmwarexeon_gold_6230n_firmwarecore_i7-10810ucore_i3-10300txeon_e5-2628l_v4core_i3-8100xeon_e-2378g_firmwarecore_i5-9600kxeon_e5-2658_v4xeon_gold_5218r_firmwarecore_i3-7100xeon_e5-1630_v4_firmwarecore_i7-7600u_firmwarecore_i7-9700kf_firmwarecore_i5-9300hcore_i5-10500exeon_silver_4214y_firmwarecore_i9-10850kcore_i5-8500bcore_i3-7100e_firmwarexeon_d-2143itxeon_silver_4209txeon_e-2226gexeon_platinum_8368q_firmwarecore_i5-8250u_firmwarecore_i7-7820hk_firmwarexeon_w-1390_firmwarexeon_gold_6212uxeon_w-2175_firmwarecore_i3-8100hcore_i3-7300t_firmwarexeon_e5-2695_v4core_i7-9700f_firmwarexeon_d-2177nt_firmwarecore_i7-3930k_firmwarexeon_e3-1270_v5_firmwarecore_i9-10920xxeon_d-1712tr_firmwarecore_i3-8130u_firmwarecore_i5-10310ucore_i7-6950x_firmwarexeon_e7-8860_v4_firmwarecore_i7-8557ucore_i3-8350k_firmwarexeon_e5-2683_v4core_i9-9820x_firmwarexeon_d-2779_firmwarecore_i5-1030g7xeon_d-1602_firmwarexeon_platinum_8376hl_firmwarecore_i9-10980hkxeon_d-2733ntxeon_w-11155mlexeon_d-1559_firmwarecore_i7-10700k_firmwarexeon_gold_5320tcore_i3-10305_firmwarecore_i3-7100u_firmwarexeon_e-2274gcore_i3-10325_firmwarexeon_e5-2630l_v4core_i7-10510y_firmwarexeon_e7-8893_v4core_i7-1060g7_firmwarecore_i7-8500yxeon_w-3323xeon_gold_6330h_firmwarexeon_platinum_8276_firmwarecore_i7-1068ng7_firmwarecore_i5-7400_firmwarexeon_w-2133_firmwarecore_i5-9600xeon_w-3375core_i5-8600tcore_i5-7200u_firmwarexeon_e3-1585_v5_firmwarexeon_gold_6258r_firmwarecore_i3-10320_firmwarexeon_gold_5218bxeon_platinum_8360hl_firmwarexeon_gold_6328hxeon_d-1734nt_firmwarexeon_e-2288gxeon_w-1370pcore_i7-7500uxeon_e-2274g_firmwarexeon_gold_5318s_firmwarexeon_e3-1225_v6xeon_e3-1280_v6xeon_gold_5218rxeon_d-2752ntexeon_e-2124g_firmwarexeon_e5-2695_v4_firmwarexeon_w-2235xeon_e5-2608l_v4_firmwarexeon_w-3175xxeon_platinum_8362_firmwarexeon_w-3225core_i3-7101texeon_e5-2609_v4core_i7-7700xeon_d-1540xeon_gold_6246r_firmwarexeon_gold_6246rcore_i5-7300hqxeon_d-1513ncore_i5-10505_firmwarexeon_e5-2643_v4_firmwarexeon_e3-1505m_v6xeon_e7-8860_v4xeon_e5-2690_v4core_i9-9900xcore_i9-9900t_firmwarexeon_e5-2699a_v4_firmwarecore_i5-9600_firmwarexeon_e3-1505m_v6_firmwarecore_i7-9700exeon_e-2254mexeon_platinum_8260l_firmwarecore_i7-8500y_firmwarexeon_d-1748te_firmwarexeon_e5-4667_v4_firmwarexeon_e5-2618l_v4xeon_w-3235_firmwarexeon_platinum_9222xeon_gold_5318ncore_i3-10105tcore_i3-8100h_firmwarecore_i7-10510u_firmwarexeon_platinum_8358_firmwarecore_i7-7700_firmwarecore_i3-1000g4core_i3-7100t_firmwarecore_i9-10900kfcore_i3-9100hlcore_i9-9980hk_firmwarexeon_e-2144gxeon_gold_6314ucore_i5-8300h_firmwarexeon_e3-1270_v6_firmwarexeon_d-2752tercore_i5-8279u_firmwarecore_i5-8500b_firmwarexeon_w-11555mlexeon_w-1390txeon_silver_4216xeon_e5-2640_v4xeon_e5-2697a_v4_firmwarexeon_platinum_8362core_i7-10610uxeon_platinum_8276lxeon_platinum_8351n_firmwarecore_i7-7740xxeon_e5-2637_v4_firmwarecore_i7-7y75xeon_d-1713nte_firmwarexeon_e3-1575m_v5xeon_e-2124gxeon_platinum_9221_firmwarecore_i7-4930kcore_i5-9400core_i5-8500_firmwarexeon_d-1557xeon_e5-2623_v4core_i3-10105f_firmwarexeon_w-3245mxeon_d-2752ter_firmwarexeon_d-1637_firmwarexeon_gold_5318sxeon_w-11555mle_firmwarecore_i5-7300hq_firmwarexeon_w-1350core_i5-1035g1xeon_w-3345_firmwarexeon_w-1290xeon_e-2314_firmwarecore_i3-10110ucore_i7-8665u_firmwarecore_i7-8086k_firmwarexeon_w-2223_firmwarexeon_d-1718t_firmwarexeon_gold_6234core_i3-10100y_firmwarecore_i7-7567u_firmwarecore_i3-9100e_firmwarecore_i5-7442eq_firmwarexeon_gold_6252n_firmwarecore_i7-4930mxcore_i9-10900xeon_e3-1230_v6_firmwarexeon_w-1250core_i7-1065g7_firmwarexeon_e3-1565l_v5_firmwarecore_i5-7360uxeon_e3-1275_v6xeon_e5-1660_v4xeon_e5-4628l_v4_firmwarexeon_e5-1680_v4core_i5-7300uxeon_e5-2698_v4_firmwarexeon_e5-2618l_v4_firmwarexeon_e5-2623_v4_firmwarexeon_e3-1230_v5_firmwarexeon_d-1736ntcore_i3-7100h_firmwarecore_i7-8565uxeon_e3-1578l_v5core_i9-10940x_firmwarexeon_d-1747ntexeon_bronze_3206r_firmwarecore_i7-7700kxeon_w-3323_firmwarecore_i3-10100fcore_i9-9900_firmwarexeon_gold_5217core_i7-6850kcore_i7-9750hf_firmwarexeon_gold_6210ucore_i5-7200uxeon_d-1548_firmwarecore_i7-9700fcore_i5-8265u_firmwarexeon_platinum_8352s_firmwarexeon_platinum_8380h_firmwarecore_i5-10210ucore_i3-7300_firmwarecore_i7-7740x_firmwarexeon_w-11155mre_firmwarecore_i5-8400bcore_i3-7100hxeon_gold_5215core_i5-10400t_firmwarecore_i9-9900ksxeon_d-1531_firmwarexeon_d-1527_firmwarecore_i9-7920xxeon_d-1633n_firmwarexeon_platinum_8352vcore_i9-7960x_firmwarexeon_e3-1230_v6xeon_d-1513n_firmwarecore_i9-8950hkxeon_e7-4809_v4_firmwarexeon_platinum_8360ycore_i5-10600tcore_i5-10600kf_firmwarexeon_d-1747nte_firmwarecore_i5-7640xxeon_w-3275mcore_i5-9500te_firmwarecore_i7-7700k_firmwarexeon_w-1290_firmwarexeon_e-2386g_firmwarexeon_d-1726_firmwarexeon_gold_6336yxeon_gold_6209ucore_i9-10900e_firmwarexeon_gold_6250lxeon_e-2176m_firmwarexeon_e-2278g_firmwarexeon_e3-1240_v6core_i9-9920xxeon_e3-1230_v5xeon_d-2146nt_firmwarexeon_e3-1240_v5_firmwarecore_i7-7660uxeon_e3-1275_v5_firmwarexeon_e-2278gel_firmwarexeon_d-1518_firmwarexeon_platinum_8376h_firmwarecore_i7-7700hqxeon_e-2236_firmwarexeon_e-2244g_firmwarecore_i7-6900k_firmwarexeon_e5-2660_v4xeon_d-1715ter_firmwarexeon_gold_6238l_firmwarecore_m3-7y30core_i5-8269u_firmwarexeon_w-11155mrexeon_gold_6252xeon_w-2135xeon_e3-1505l_v6_firmwarexeon_e3-1285_v6xeon_e5-4627_v4xeon_e-2276mlxeon_e3-1225_v5_firmwarexeon_silver_4214rxeon_e3-1245_v6_firmwarecore_i9-10920x_firmwarecore_i3-7101e_firmwarecore_i9-9880h_firmwarexeon_silver_4210r_firmwarecore_i7-5820k_firmwarecore_i3-8300xeon_e3-1545m_v5core_i3-7102e_firmwarexeon_e3-1515m_v5_firmwarexeon_e-2334_firmwarexeon_gold_6230rxeon_gold_6346_firmwarexeon_e-2276me_firmwarecore_i5-8400txeon_d-2775texeon_w-1370p_firmwarecore_i7-1065g7core_i7-9800xxeon_silver_4208xeon_e-2136_firmwarexeon_w-1270_firmwarexeon_gold_6210u_firmwarexeon_w-1250ecore_i5-8257u_firmwarecore_i5-1038ng7_firmwarecore_i5-9400f_firmwarecore_i7-8706g_firmwarexeon_gold_5215lcore_i5-7287uxeon_e5-4660_v4xeon_e-2146g_firmwarecore_i7-3970xcore_i7-3960xxeon_gold_6330n_firmwarexeon_platinum_8253_firmwarexeon_e-2126g_firmwarecore_i5-9600t_firmwarexeon_d-2753nt_firmwarexeon_w-1350p_firmwarecore_i7-10610u_firmwarecore_i5-10500e_firmwarexeon_d-1529_firmwarexeon_gold_6240lxeon_w-3265mxeon_gold_6248xeon_e5-4640_v4_firmwarexeon_d-1712trxeon_e-2378_firmwarexeon_gold_6240l_firmwarexeon_d-1736_firmwarecore_i3-8145ucore_i3-9300xeon_d-2173itxeon_d-2766ntcore_i7-7567ucore_i7-10870h_firmwarecore_i3-9300tcore_i7-7820hqcore_i7-7820eqcore_i7-9700kxeon_gold_6252_firmwarexeon_e5-2650_v4xeon_d-2776ntcore_i7-3820xeon_e7-4820_v4_firmwarexeon_e-2144g_firmwarecore_i7-10700te_firmwarecore_i7-10700ecore_i3-7320xeon_e3-1585l_v5core_i7-3940xmxeon_gold_6348h_firmwarexeon_e-2388gcore_i7-9700te_firmwarexeon_platinum_8268xeon_d-2786ntexeon_e-2226gxeon_gold_6240rcore_i3-10100te_firmwarexeon_gold_6238_firmwarexeon_silver_4215rxeon_e-2278gcore_i9-10900ecore_i3-9100core_i5-8600core_i5-8250uxeon_platinum_8380xeon_w-3265core_m3-8100y_firmwarecore_i7-3940xm_firmwarecore_i5-10500tecore_i7-7500u_firmwarecore_i5-10210y_firmwarecore_i7-8700k_firmwarecore_i7-8700bcore_i5-10500txeon_e3-1501l_v6_firmwarexeon_e5-1660_v4_firmwarexeon_w-1250texeon_platinum_8352mxeon_gold_6208ucore_i3-9100tecore_i5-9300hf_firmwarexeon_d-1749ntxeon_gold_6242core_i7-10700kxeon_d-1627xeon_e3-1575m_v5_firmwarexeon_e-2186mcore_i3-8109u_firmwarexeon_e3-1558l_v5xeon_gold_6250_firmwarexeon_d-1623n_firmwarecore_i3-9350k_firmwarecore_i5-7442eqxeon_d-1702core_i7-8665uecore_i3-8130uxeon_e7-4830_v4core_i3-7167uxeon_e5-2699_v4_firmwarecore_i3-8300txeon_d-1528_firmwarexeon_gold_6342xeon_e5-4628l_v4xeon_d-1732te_firmwarexeon_e3-1268l_v5core_i9-9900kxeon_silver_4316xeon_gold_6240_firmwarecore_i7-5930kcore_i5-10400fxeon_w-2265_firmwarexeon_e-2278ge_firmwarexeon_gold_6330ncore_i5-9400_firmwarexeon_gold_6226rxeon_bronze_3204xeon_w-1270e_firmwarexeon_e-2276m_firmwarecore_i3-7350k_firmwarexeon_d-1567core_i5-8400t_firmwarexeon_w-3365core_i7-9850hlxeon_w-2135_firmwarexeon_e-2286m_firmwarecore_i5-8400hxeon_e3-1245_v5xeon_w-2175xeon_d-2141i_firmwarexeon_silver_4214r_firmwarexeon_w-3335_firmwarecore_i3-10110yxeon_d-2776nt_firmwarexeon_gold_6334core_i7-7820hkcore_i5-9300h_firmwarexeon_d-1734ntxeon_w-11855mxeon_gold_6240yxeon_e5-4655_v4_firmwarexeon_gold_6238lxeon_w-1390xeon_gold_5218n_firmwarexeon_gold_6328h_firmwarexeon_gold_5318h_firmwarexeon_gold_6354core_i7-8665ucore_i3-10305tcore_i3-9350kf_firmwarecore_i7-5960x_firmwarexeon_w-1370_firmwarecore_i5-7440eq_firmwarexeon_d-1649n_firmwarecore_i3-8140uxeon_gold_5320hcore_i7-8086kcore_i5-7360u_firmwarecore_i3-8350kcore_i5-10600kxeon_gold_5222xeon_e7-8870_v4_firmwarecore_i7-10850hxeon_gold_6256xeon_d-1523ncore_i3-1005g1_firmwarexeon_gold_6338n_firmwarecore_i3-9100hl_firmwarecore_i9-9900x_firmwarecore_i5-10500te_firmwarecore_i3-10300t_firmwarecore_i3-8100bcore_i5-8279ucore_i3-10100f_firmwarecore_i5-8600kcore_i7-8700tcore_i3-7100_firmwarecore_i3-9320_firmwarexeon_d-1541xeon_d-1543n_firmwarexeon_gold_5320t_firmwarexeon_d-2799_firmwarexeon_e3-1245_v5_firmwarexeon_d-1622xeon_gold_5222_firmwarecore_i7-8700t_firmwarecore_i5-1030g7_firmwarecore_i5-8600t_firmwarexeon_platinum_8352v_firmwarexeon_w-2223xeon_gold_5318n_firmwarexeon_gold_6238tcore_i5-8500xeon_silver_4310t_firmwarecore_i5-9400h_firmwarecore_i5-10400f_firmwarecore_i9-10980xe_firmwarexeon_gold_6240r_firmwarecore_i5-8257uxeon_gold_5318yxeon_gold_6212u_firmwarexeon_gold_6208u_firmwarecore_i7-8569uxeon_silver_4310core_i9-9900tcore_i7-10700t_firmwarexeon_d-2796ntxeon_e3-1240_v5xeon_w-2133xeon_platinum_8260lxeon_e-2336_firmwarexeon_platinum_8270xeon_gold_6248r_firmwarecore_i5-8500txeon_e3-1501m_v6core_i7-4930k_firmwarexeon_d-2766nt_firmwarexeon_w-11555mre_firmwarexeon_d-2166ntxeon_gold_6348_firmwarecore_i3-10305core_i7-9850he_firmwarexeon_e5-2608l_v4xeon_w-1390pcore_i3-9100_firmwarexeon_e5-2658_v4_firmwarecore_i7-7560u_firmwarexeon_gold_6262vxeon_platinum_8354h_firmwarecore_i7-10710uxeon_e5-2620_v4xeon_e7-4809_v4core_i5-10300hxeon_platinum_8358pcore_i5-10210yxeon_silver_4210_firmwarexeon_d-1702_firmwarexeon_platinum_8380hl_firmwarexeon_w-1270texeon_e-2224core_i9-9900ks_firmwarexeon_e-2124_firmwarexeon_gold_6238rxeon_e-2278gelxeon_d-1553ncore_i5-1030g4xeon_gold_6222v_firmwarexeon_d-2798nt_firmwarecore_i9-10980hk_firmwarexeon_d-2166nt_firmwarexeon_e5-2699a_v4core_i5-10400_firmwarexeon_gold_5317xeon_gold_6242r_firmwarexeon_w-2155core_i3-7102exeon_w-11155mle_firmwarexeon_platinum_8376hlxeon_e7-8894_v4_firmwarexeon_silver_4216_firmwarexeon_d-1746tercore_i9-10900k_firmwarexeon_gold_5215l_firmwarexeon_d-2738_firmwarexeon_w-2225_firmwarexeon_gold_6230xeon_d-1714_firmwarexeon_e5-2650l_v4xeon_e7-4820_v4core_i3-9100ecore_i3-7300xeon_d-1548core_i7-10510yxeon_e3-1220_v5core_i5-7y57_firmwarecore_i7-7820x_firmwarexeon_platinum_8260yxeon_d-1653nxeon_e-2276ml_firmwarexeon_e3-1505m_v5_firmwarexeon_e3-1578l_v5_firmwarecore_i9-10900_firmwarexeon_gold_5218txeon_e-2374gxeon_e-2254ml_firmwarexeon_d-1557_firmwarecore_i5-9500t_firmwarexeon_gold_5218ncore_i7-8709g_firmwarexeon_d-2163it_firmwarexeon_w-2295_firmwarexeon_d-1531core_i7-10875h_firmwarexeon_e7-8891_v4xeon_silver_4314_firmwarexeon_d-1533n_firmwarexeon_e-2278gexeon_e3-1545m_v5_firmwarexeon_silver_4214yxeon_w-10855mxeon_d-2177ntxeon_e5-2630l_v4_firmwarexeon_w-3275_firmwarecore_i5-10600t_firmwarexeon_platinum_8270_firmwarecore_i5-10300h_firmwarexeon_d-2775te_firmwarexeon_w-3235xeon_e5-2680_v4_firmwarecore_i9-10900txeon_d-1571_firmwarexeon_e-2126gxeon_e7-8893_v4_firmwarecore_i7-10700tecore_i9-10900kcore_i5-10600_firmwarexeon_e5-4650_v4_firmwarexeon_gold_5220rxeon_w-11955mcore_i5-10400txeon_w-1290ecore_i7-9700kfxeon_d-2796texeon_d-1541_firmwarexeon_w-1290te_firmwarexeon_gold_6328hl_firmwarexeon_platinum_9221xeon_d-2142itcore_i5-7600k_firmwarexeon_platinum_9222_firmwarecore_i5-8305g_firmwarexeon_e5-2699r_v4core_i3-8100b_firmwarecore_i9-10900te_firmwarexeon_e5-2640_v4_firmwarecore_i3-8300t_firmwarecore_i3-7167u_firmwarexeon_d-1726xeon_platinum_8380_firmwarecore_i7-10700_firmwarexeon_d-1735tr_firmwarexeon_silver_4314core_i3-1005g1core_i7-1068ng7xeon_d-2796nt_firmwarexeon_e7-8880_v4_firmwarecore_i7-7820eq_firmwarexeon_d-1637core_i5-9400fxeon_d-1539_firmwarexeon_e3-1515m_v5core_i5-9500f_firmwarecore_i7-6800kcore_i7-7560uxeon_platinum_8368_firmwarecore_i7-8550u_firmwarexeon_d-1602xeon_e5-4655_v4core_i5-8365uxeon_platinum_8376hxeon_w-2245xeon_d-2799xeon_gold_6312u_firmwarexeon_d-2145ntcore_i5-9600kfxeon_e5-2697a_v4xeon_e-2288g_firmwarexeon_w-1250te_firmwarexeon_e-2224gcore_i5-8600_firmwarecore_i3-8100_firmwarecore_i5-8269uxeon_gold_6254_firmwarexeon_e5-1620_v4xeon_e5-4669_v4xeon_gold_5220_firmwarexeon_e5-2609_v4_firmwarexeon_gold_6338ncore_i5-7600t_firmwarecore_i7-9700t_firmwarecore_i7-8665ue_firmwarecore_i7-4820k_firmwarexeon_gold_6330core_i7-7820hq_firmwarexeon_silver_4208_firmwarexeon_d-1521core_i3-8145uexeon_w-2155_firmwarexeon_e5-2687w_v4_firmwarexeon_d-1713nt_firmwarecore_i5-8265ucore_i7-10700txeon_e-2246g_firmwarecore_i9-9900kfxeon_e5-4620_v4_firmwarecore_i7-10750hxeon_e-2226ge_firmwarexeon_d-2753ntxeon_e3-1225_v6_firmwarexeon_gold_6338xeon_gold_5315ycore_i5-8400b_firmwarecore_i7-8706gcore_i7-5930k_firmwarecore_i5-7400t_firmwarexeon_silver_4215xeon_gold_6230ncore_i5-8365u_firmwarexeon_platinum_8280l_firmwarexeon_e5-2667_v4_firmwarecore_i9-10885hxeon_gold_6338tcore_i5-9500_firmwarecore_i5-7440eqxeon_d-1739_firmwarexeon_e-2386gcore_i3-9100t_firmwarecore_m3-7y32xeon_gold_6242_firmwarexeon_d-1733nt_firmwarecore_i7-10750h_firmwarexeon_e-2134xeon_w-1290texeon_w-3265_firmwarexeon_d-2142it_firmwarexeon_platinum_8360y_firmwarecore_i7-8557u_firmwarecore_m3-7y32_firmwarexeon_w-11865mre_firmwarexeon_platinum_8360hxeon_e-2176mxeon_gold_6230t_firmwarecore_i3-1000g1_firmwarexeon_gold_5218_firmwarecore_i9-10900t_firmwarexeon_silver_4210txeon_w-3275m_firmwarexeon_e-2134_firmwarexeon_e5-4669_v4_firmwarexeon_e5-4667_v4xeon_d-2795ntcore_i5-7267u_firmwarecore_i5-7640x_firmwarexeon_d-2779xeon_w-3245m_firmwarecore_i5-9600txeon_e-2226g_firmwarexeon_e5-1650_v4core_i9-7960xxeon_gold_6336y_firmwarexeon_w-1370xeon_d-1715terxeon_d-1559xeon_platinum_9242_firmwarexeon_e-2174gxeon_e3-1220_v6core_i7-7y75_firmwarexeon_d-1537xeon_e7-4850_v4xeon_e3-1220_v6_firmwarexeon_gold_6230_firmwarexeon_e7-4850_v4_firmwarexeon_e-2176gxeon_gold_6254xeon_e7-8880_v4core_i3-10320xeon_gold_6342_firmwarexeon_e5-2667_v4core_i3-10105fxeon_w-1390t_firmwarexeon_gold_5320xeon_e-2224_firmwarexeon_gold_5320h_firmwarexeon_d-1649nxeon_e7-8890_v4core_i7-10875hxeon_d-1736nt_firmwarecore_i5-10400hxeon_d-2712t_firmwarecore_i5-9600kf_firmwarecore_i7-9800x_firmwarexeon_w-10885mxeon_gold_6234_firmwarexeon_e-2224g_firmwarexeon_d-1527core_i9-9940xcore_i9-9980xe_firmwarexeon_gold_6312uxeon_e3-1535m_v5core_i9-7940xxeon_gold_5220r_firmwarexeon_platinum_8380hlxeon_e3-1505l_v5core_i7-9700texeon_e7-4830_v4_firmwarexeon_gold_6248rxeon_silver_4214xeon_w-2125core_i9-9900k_firmwarexeon_gold_5220sxeon_platinum_8260core_i7-7800x_firmwarecore_i3-10105t_firmwarecore_i5-10400h_firmwarexeon_silver_4309yxeon_e5-2699_v4xeon_e5-2603_v4xeon_d-2146ntcore_i3-10100txeon_d-1713ntcore_i3-9100f_firmwarecore_i7-7700hq_firmwarecore_i9-9980hkxeon_e-2244gcore_i3-7100txeon_w-2125_firmwarecore_i5-1035g4_firmwarexeon_platinum_8358p_firmwarexeon_e3-1235l_v5_firmwarecore_i7-9850h_firmwarexeon_d-2795nt_firmwarecore_i7-8559ucore_i5-9500exeon_gold_6314u_firmwarecore_i9-9920x_firmwarexeon_platinum_8368qxeon_w-1250e_firmwarecore_i7-4960xcore_i7-5960xxeon_d-1521_firmwarexeon_e3-1285_v6_firmwarexeon_w-1290t_firmwarecore_i7-9750h_firmwarexeon_gold_6209u_firmwarecore_i3-10325core_i9-7920x_firmwarexeon_e-2356gxeon_platinum_8356h_firmwarecore_i7-8700core_i3-7130ucore_i5-8400xeon_platinum_8276l_firmwarexeon_e3-1585l_v5_firmwarexeon_e3-1585_v5xeon_platinum_8380hxeon_gold_6262v_firmwarexeon_e-2334core_i7\+8700core_i5-7440hq_firmwarecore_i7-9850hcore_i3-10110u_firmwarecore_i5-7600core_i9-10980xexeon_e3-1505l_v5_firmwarexeon_w-11865mlexeon_e3-1280_v5_firmwarexeon_e5-2697_v4xeon_e-2186gxeon_gold_6226_firmwarecore_i5-8310y_firmwarexeon_silver_4210core_i9-10885h_firmwarexeon_gold_6250l_firmwarexeon_e3-1280_v5xeon_e5-1680_v4_firmwarecore_i3-7320_firmwarecore_i7-8569u_firmwarexeon_e5-2630_v4xeon_gold_6240y_firmwarexeon_w-1350pxeon_d-2143it_firmwarecore_i5-9400txeon_w-3245_firmwarecore_i3-10300xeon_w-1290p_firmwarexeon_w-1250p_firmwarexeon_bronze_3204_firmwarecore_i3-8100t_firmwarecore_i5-7600_firmwarecore_i9-9960x_firmwarecore_i5-10310u_firmwarecore_i5-8400_firmwarexeon_e-2234_firmwarecore_i7-10870hxeon_silver_4215r_firmwarecore_i7-10510uxeon_w-1290pcore_i7-7920hq_firmwarecore_i5-8310ycore_i5-10500h_firmwarexeon_d-1523n_firmwarecore_i3-10300_firmwarexeon_d-2183it_firmwarexeon_w-3245xeon_e-2324gxeon_e5-2628l_v4_firmwarecore_i9-7980xexeon_e5-2697_v4_firmwarexeon_e3-1270_v5xeon_w-3345xeon_e-2186m_firmwarexeon_d-1528xeon_w-2295xeon_e-2234core_i3-9100tcore_i5-10500xeon_platinum_8351nxeon_gold_6354_firmwarexeon_e5-1650_v4_firmwarecore_i7-8850hcore_i9-8950hk_firmwarecore_i5-8400h_firmwarexeon_e3-1240_v6_firmwarexeon_d-1622_firmwarexeon_w-11865mrecore_i3-10100_firmwarexeon_platinum_8352y_firmwarecore_i9-10900texeon_platinum_8260y_firmwarexeon_platinum_8358core_i5-1030g4_firmwarecore_i5-9500fxeon_e3-1501l_v6core_i3-10100yxeon_e7-8867_v4xeon_e-2378core_i7-7820xcore_i7-3970x_firmwarexeon_e5-2630_v4_firmwarexeon_e5-2699r_v4_firmwarexeon_gold_5317_firmwarecore_i7-7800xcore_i5-9400hxeon_platinum_8253xeon_gold_6252nxeon_e7-8894_v4core_i3-9320xeon_platinum_8280core_i7-10700f_firmwarecore_i3-10100t_firmwarexeon_w-2255_firmwarexeon_gold_5220t_firmwarecore_i3-10105xeon_silver_4309y_firmwarecore_i7-4940mxxeon_gold_6246core_i9-10900kf_firmwarexeon_e5-4610_v4_firmwarexeon_e5-1630_v4core_i7-8550uxeon_w-1350_firmwarecore_i7-10810u_firmwarecore_i9-10940xcore_i7-9700xeon_e3-1270_v6xeon_w-3265m_firmwarexeon_d-1577_firmwarecore_i7-9850hexeon_platinum_8360hlcore_i7-10700kfcore_i7-9850hl_firmwarecore_i5-8260u_firmwarexeon_d-1748texeon_gold_5315y_firmwarecore_i5-7500txeon_silver_4310txeon_d-2187ntxeon_d-1518xeon_gold_5318hcore_i3-1000g1xeon_w-2225xeon_gold_5320_firmwarecore_i7-3820_firmwarexeon_e-2276mexeon_silver_4210t_firmwarecore_i5-7y54xeon_gold_5218t_firmwarecore_i7-6950xxeon_e5-4620_v4core_i5-7400core_i7-8700b_firmwarexeon_e7-8870_v4xeon_e-2356g_firmwarecore_i3-10305t_firmwarexeon_w-10855m_firmwarecore_i9-10850k_firmwarecore_i7-7660u_firmwarecore_i5-8365ue_firmwarexeon_e5-2698_v4xeon_platinum_8352score_i7-7920hqxeon_d-1718tcore_i7-10700xeon_d-1533ncore_i3-7020uxeon_w-2195xeon_e-2136core_i5-9300hfcore_i3-8145u_firmwarexeon_w-1270pcore_i5-8600k_firmwarecore_i9-9940x_firmwarexeon_gold_6258rxeon_platinum_9282core_i5-10400core_i3-7020u_firmwarexeon_d-2161ixeon_w-1250pcore_i7-8700kcore_i3-7130u_firmwarexeon_silver_4215_firmwarexeon_d-2123itcore_i5-8365uecore_i3-8109ucore_i7-4960x_firmwarexeon_bronze_3206rxeon_gold_6346xeon_d-1722nexeon_w-3275xeon_gold_6240xeon_d-2161i_firmwarecore_i5-8200y_firmwarexeon_gold_5220core_i5-8350uxeon_platinum_8256_firmwarexeon_e3-1275_v5core_i7-8750h_firmwarexeon_e5-4610_v4core_i3-10100texeon_e3-1558l_v5_firmwarecore_i5-10210u_firmwarecore_i3-8140u_firmwarexeon_d-1537_firmwarexeon_d-2796te_firmwarecore_i5-7y57xeon_w-3375_firmwarecore_i3-9300_firmwarecore_i7-3920xmxeon_gold_6330hcore_i5-7260uxeon_d-1540_firmwarecore_i5-10600k_firmwarexeon_e7-8890_v4_firmwarecore_i5-8259u_firmwarexeon_e5-2683_v4_firmwarexeon_e-2124core_i7-9750hcore_i3-10110y_firmwarexeon_e-2186g_firmwarexeon_d-1553n_firmwarecore_i9-7980xe_firmwarexeon_platinum_8368xeon_w-1270te_firmwarecore_i7-8559u_firmwarecore_i5-7500_firmwarexeon_d-2798ntcore_i5-10600xeon_e3-1240l_v5_firmwarecore_i5-10500_firmwarexeon_w-2245_firmwarexeon_e3-1260l_v5core_i5-10310yxeon_d-1736core_i5-10310y_firmwarexeon_d-2738xeon_d-1567_firmwarecore_i5-8259uxeon_e-2388g_firmwarexeon_gold_6326_firmwarexeon_gold_6230r_firmwarexeon_e-2336xeon_gold_6246_firmwarexeon_e3-1225_v5xeon_platinum_8260_firmwarexeon_e-2286mcore_i9-9880hcore_i7-8705g_firmwarecore_i7-4930mx_firmwarexeon_gold_6244_firmwarexeon_d-1722ne_firmwarecore_i5-1035g4core_i7-8650ucore_i5-10200hcore_i7-8705gxeon_platinum_8276xeon_d-1529xeon_gold_5220txeon_e-2324g_firmwarecore_i7-7600uxeon_gold_6244xeon_w-3223_firmwarexeon_gold_6242rcore_i5-1035g7_firmwarecore_i3-7100exeon_w-2275xeon_w-3175x_firmwarecore_i7\+8700_firmwarexeon_w-2265core_i5-9500xeon_e3-1535m_v6core_i3-7101ecore_i9-9900xeon_w-10885m_firmwarecore_i3-8145ue_firmwarecore_i9-9820xxeon_d-1714xeon_gold_5218b_firmwarexeon_platinum_8354hxeon_gold_6348hxeon_gold_6248_firmwarecore_i7-9750hfxeon_e3-1501m_v6_firmwarexeon_d-2141icore_i7-3920xm_firmwarecore_i7-6850k_firmwarecore_i7-3960x_firmwarexeon_e-2176g_firmwarecore_i5-1035g7xeon_gold_6326xeon_e-2254mlcore_i5-8305gcore_i3-9350kcore_i5-7400txeon_gold_6348core_i7-8750hxeon_w-2145_firmwarecore_i3-10100e_firmwarexeon_d-2183itxeon_d-2123it_firmwarexeon_e3-1275_v6_firmwarecore_i5-8300hcore_i9-7940x_firmwarecore_i3-7101te_firmwarexeon_d-2712txeon_e5-2650l_v4_firmwarecore_i5-9500e_firmwarecore_i9-7900x_firmwarecore_i7-9700e_firmwarecore_i5-9500texeon_w-1290e_firmwarexeon_d-1520core_i5-7y54_firmwarexeon_d-2187nt_firmwarexeon_w-1390p_firmwarexeon_e3-1280_v6_firmwarecore_i9-10900f_firmwarexeon_w-11955m_firmwarexeon_platinum_8280lcore_m3-8100yxeon_platinum_8356hxeon_gold_6338t_firmwarecore_i5-7267ucore_i3-7100uxeon_d-1543ncore_i5-7260u_firmwarexeon_e7-8867_v4_firmwarexeon_gold_5318y_firmwarecore_i5-7300u_firmwarexeon_d-1732texeon_d-1520_firmwarexeon_platinum_9242xeon_e5-4660_v4_firmwarexeon_e5-2680_v4core_i7-10700e_firmwarecore_i3-9100te_firmwarexeon_e5-2660_v4_firmwarecore_i3-7300tcore_i5-8210yxeon_e5-2687w_v4core_i7-1060g7core_i7-8565u_firmwarexeon_w-11855m_firmwarecore_i7-5820kxeon_platinum_8352m_firmwarecore_i7-9700_firmwarecore_i7-7700tcore_i7-6900kcore_i9-9980xexeon_platinum_9282_firmwarexeon_gold_6250xeon_d-1713ntecore_i3-9350kfxeon_w-1290txeon_d-1739core_i7-8809gxeon_gold_6226core_i3-10105_firmwarecore_i7-8650u_firmwarexeon_d-1577xeon_d-1735trxeon_silver_4214_firmwarexeon_platinum_8268_firmwarecore_i7-10850h_firmwarexeon_e3-1535m_v5_firmwarexeon_e-2314xeon_e5-2690_v4_firmwarecore_i7-8700_firmwarecore_i3-7350kcore_i3-8300_firmwarecore_i5-10505xeon_d-1539xeon_e5-4627_v4_firmwarexeon_e5-2648l_v4_firmwarexeon_silver_4310_firmwarexeon_platinum_8360h_firmwarexeon_w-2255core_i9-10900x_firmwarecore_i5-7600kcore_m3-7y30_firmwarexeon_gold_5215_firmwarexeon_gold_5220s_firmwarexeon_d-1746ter_firmwarexeon_w-11865mle_firmwarecore_i3-1000g4_firmwarexeon_gold_6330_firmwarecore_i5-8350u_firmwarexeon_e-2276g_firmwarexeon_d-1627_firmwarexeon_d-1733ntxeon_gold_5218xeon_w-2145xeon_gold_6338_firmwarecore_i7-4940mx_firmwarecore_i3-9100fxeon_w-1250_firmwarecore_i5-7500t_firmwarexeon_d-1653n_firmwarecore_i9-10900fxeon_w-3225_firmwarexeon_e3-1245_v6xeon_e-2378gcore_i5-10200h_firmwarecore_i3-8100txeon_gold_6238r_firmwarecore_i5-9500txeon_platinum_8352yxeon_w-3223xeon_e5-2643_v4xeon_e3-1268l_v5_firmwarexeon_e-2276gxeon_gold_6222vcore_i7-10700fxeon_e5-1620_v4_firmwarexeon_d-1571core_i5-9600k_firmwarexeon_gold_6238t_firmwarexeon_e5-2620_v4_firmwarexeon_platinum_8353h_firmwarexeon_gold_5217_firmwareIntel(R) Processors
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-47282
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.96%
||
7 Day CHG~0.00%
Published-21 May, 2024 | 14:20
Updated-04 May, 2025 | 07:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
spi: bcm2835: Fix out-of-bounds access with more than 4 slaves

In the Linux kernel, the following vulnerability has been resolved: spi: bcm2835: Fix out-of-bounds access with more than 4 slaves Commit 571e31fa60b3 ("spi: bcm2835: Cache CS register value for ->prepare_message()") limited the number of slaves to 3 at compile-time. The limitation was necessitated by a statically-sized array prepare_cs[] in the driver private data which contains a per-slave register value. The commit sought to enforce the limitation at run-time by setting the controller's num_chipselect to 3: Slaves with a higher chipselect are rejected by spi_add_device(). However the commit neglected that num_chipselect only limits the number of *native* chipselects. If GPIO chipselects are specified in the device tree for more than 3 slaves, num_chipselect is silently raised by of_spi_get_gpio_numbers() and the result are out-of-bounds accesses to the statically-sized array prepare_cs[]. As a bandaid fix which is backportable to stable, raise the number of allowed slaves to 24 (which "ought to be enough for anybody"), enforce the limitation on slave ->setup and revert num_chipselect to 3 (which is the number of native chipselects supported by the controller). An upcoming for-next commit will allow an arbitrary number of slaves.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-13598
Matching Score-4
Assigner-Zephyr Project
ShareView Details
Matching Score-4
Assigner-Zephyr Project
CVSS Score-6.3||MEDIUM
EPSS-0.06% / 17.89%
||
7 Day CHG~0.00%
Published-24 May, 2021 | 21:40
Updated-17 Sep, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FS: Buffer Overflow when enabling Long File Names in FAT_FS and calling fs_stat

FS: Buffer Overflow when enabling Long File Names in FAT_FS and calling fs_stat. Zephyr versions >= v1.14.2, >= v2.3.0 contain Stack-based Buffer Overflow (CWE-121). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7fhv-rgxr-x56h

Action-Not Available
Vendor-Zephyr Project
Product-zephyrzephyr
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-47536
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.02% / 5.28%
||
7 Day CHG~0.00%
Published-24 May, 2024 | 15:09
Updated-18 Sep, 2025 | 15:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
net/smc: fix wrong list_del in smc_lgr_cleanup_early

In the Linux kernel, the following vulnerability has been resolved: net/smc: fix wrong list_del in smc_lgr_cleanup_early smc_lgr_cleanup_early() meant to delete the link group from the link group list, but it deleted the list head by mistake. This may cause memory corruption since we didn't remove the real link group from the list and later memseted the link group structure. We got a list corruption panic when testing: [  231.277259] list_del corruption. prev->next should be ffff8881398a8000, but was 0000000000000000 [  231.278222] ------------[ cut here ]------------ [  231.278726] kernel BUG at lib/list_debug.c:53! [  231.279326] invalid opcode: 0000 [#1] SMP NOPTI [  231.279803] CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.10.46+ #435 [  231.280466] Hardware name: Alibaba Cloud ECS, BIOS 8c24b4c 04/01/2014 [  231.281248] Workqueue: events smc_link_down_work [  231.281732] RIP: 0010:__list_del_entry_valid+0x70/0x90 [  231.282258] Code: 4c 60 82 e8 7d cc 6a 00 0f 0b 48 89 fe 48 c7 c7 88 4c 60 82 e8 6c cc 6a 00 0f 0b 48 89 fe 48 c7 c7 c0 4c 60 82 e8 5b cc 6a 00 <0f> 0b 48 89 fe 48 c7 c7 00 4d 60 82 e8 4a cc 6a 00 0f 0b cc cc cc [  231.284146] RSP: 0018:ffffc90000033d58 EFLAGS: 00010292 [  231.284685] RAX: 0000000000000054 RBX: ffff8881398a8000 RCX: 0000000000000000 [  231.285415] RDX: 0000000000000001 RSI: ffff88813bc18040 RDI: ffff88813bc18040 [  231.286141] RBP: ffffffff8305ad40 R08: 0000000000000003 R09: 0000000000000001 [  231.286873] R10: ffffffff82803da0 R11: ffffc90000033b90 R12: 0000000000000001 [  231.287606] R13: 0000000000000000 R14: ffff8881398a8000 R15: 0000000000000003 [  231.288337] FS:  0000000000000000(0000) GS:ffff88813bc00000(0000) knlGS:0000000000000000 [  231.289160] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [  231.289754] CR2: 0000000000e72058 CR3: 000000010fa96006 CR4: 00000000003706f0 [  231.290485] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [  231.291211] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [  231.291940] Call Trace: [  231.292211]  smc_lgr_terminate_sched+0x53/0xa0 [  231.292677]  smc_switch_conns+0x75/0x6b0 [  231.293085]  ? update_load_avg+0x1a6/0x590 [  231.293517]  ? ttwu_do_wakeup+0x17/0x150 [  231.293907]  ? update_load_avg+0x1a6/0x590 [  231.294317]  ? newidle_balance+0xca/0x3d0 [  231.294716]  smcr_link_down+0x50/0x1a0 [  231.295090]  ? __wake_up_common_lock+0x77/0x90 [  231.295534]  smc_link_down_work+0x46/0x60 [  231.295933]  process_one_work+0x18b/0x350

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-47352
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.02% / 5.31%
||
7 Day CHG~0.00%
Published-21 May, 2024 | 14:35
Updated-18 Dec, 2025 | 11:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
virtio-net: Add validation for used length

In the Linux kernel, the following vulnerability has been resolved: virtio-net: Add validation for used length This adds validation for used length (might come from an untrusted device) to avoid data corruption or loss.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-33137
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.98%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:04
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in the Intel(R) Kernelflinger project may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-kernelflingerIntel(R) Kernelflinger project
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-12898
Matching Score-4
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-4
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.54%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 18:58
Updated-17 Sep, 2024 | 03:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwarewindows_10AMD Radeon Software
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-12981
Matching Score-4
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-4
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.30%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 21:49
Updated-16 Sep, 2024 | 18:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwareradeon_pro_softwarewindows_10AMD Radeon Software
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-47404
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.82%
||
7 Day CHG~0.00%
Published-21 May, 2024 | 15:03
Updated-18 Dec, 2025 | 11:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HID: betop: fix slab-out-of-bounds Write in betop_probe

In the Linux kernel, the following vulnerability has been resolved: HID: betop: fix slab-out-of-bounds Write in betop_probe Syzbot reported slab-out-of-bounds Write bug in hid-betopff driver. The problem is the driver assumes the device must have an input report but some malicious devices violate this assumption. So this patch checks hid_device's input is non empty before it's been used.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-12980
Matching Score-4
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-4
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.65%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 21:49
Updated-17 Sep, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwareradeon_pro_softwarewindows_10AMD Radeon Software
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-47489
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.02% / 5.99%
||
7 Day CHG~0.00%
Published-22 May, 2024 | 08:19
Updated-18 Nov, 2025 | 15:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
drm/amdgpu: Fix even more out of bound writes from debugfs

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix even more out of bound writes from debugfs CVE-2021-42327 was fixed by: commit f23750b5b3d98653b31d4469592935ef6364ad67 Author: Thelford Williams <tdwilliamsiv@gmail.com> Date: Wed Oct 13 16:04:13 2021 -0400 drm/amdgpu: fix out of bounds write but amdgpu_dm_debugfs.c contains more of the same issue so fix the remaining ones. v2: * Add missing fix in dp_max_bpc_write (Harry Wentland)

Action-Not Available
Vendor-Linux Kernel Organization, IncDebian GNU/Linux
Product-debian_linuxlinux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-33060
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.23% / 45.28%
||
7 Day CHG~0.00%
Published-18 Aug, 2022 | 19:58
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aNetApp, Inc.Intel Corporation
Product-aff_a700sxeon_gold_6342xeon_platinum_8352vxeon_gold_6330h_firmwarefas2700aff_a200_firmwarexeon_platinum_8352y_firmwarexeon_silver_4316xeon_platinum_8358xeon_platinum_8353hxeon_gold_6336y_firmwarexeon_platinum_8360yfas8700_firmwarexeon_gold_6330naff_c190xeon_gold_5317_firmwarefas9500_firmwarexeon_gold_6336yaff_a700xeon_silver_4314_firmwareaff_a700_firmwarexeon_platinum_8354hxeon_gold_6348hxeon_platinum_8360hl_firmwarexeon_gold_6328hxeon_platinum_8376h_firmwarexeon_gold_5318s_firmwarexeon_gold_6334xeon_gold_6342_firmwarexeon_gold_6326xeon_silver_4309y_firmwarexeon_gold_5320xeon_gold_5320h_firmwarexeon_gold_6328h_firmwarexeon_platinum_8362_firmwarexeon_gold_5318h_firmwarexeon_gold_6348aff_a250xeon_gold_6354fas8200fas9500aff_a300_firmwarexeon_gold_6328hl_firmwarexeon_platinum_8360hlxeon_gold_6346_firmwarefas500fxeon_gold_6312uxeon_gold_5320hxeon_gold_5315y_firmwarexeon_silver_4310taff_a320xeon_platinum_8380hlxeon_gold_5318hfas8300_firmwarexeon_gold_6338n_firmwarexeon_platinum_8380_firmwarexeon_gold_5318nxeon_gold_5320_firmwarexeon_silver_4314aff_a800_firmwarexeon_platinum_8358_firmwarexeon_silver_4309yxeon_platinum_8356hxeon_gold_6338t_firmwareaff_a220xeon_silver_4316_firmwarexeon_gold_6314uxeon_platinum_8352sfas2700_firmwarexeon_gold_5320t_firmwarexeon_gold_6330n_firmwarexeon_gold_5318y_firmwareaff_a700s_firmwarexeon_platinum_8368_firmwarexeon_platinum_8358p_firmwarexeon_platinum_8362xeon_platinum_8376hfas8300xeon_platinum_8352v_firmwareaff_a900xeon_platinum_8351n_firmwarexeon_gold_5318n_firmwareaff_a400xeon_gold_6312u_firmwareaff_a300xeon_gold_6314u_firmwarexeon_silver_4310t_firmwarefas2600_firmwarexeon_platinum_8368qfas2600xeon_gold_5318yfas9000_firmwarexeon_gold_6334_firmwarexeon_silver_4310xeon_platinum_8352m_firmwarexeon_gold_6338nxeon_platinum_8356h_firmwarexeon_gold_6328hlaff_a320_firmwarexeon_platinum_8380hxeon_gold_6330xeon_gold_6346xeon_gold_5318sxeon_gold_6348_firmwareaff_a200aff_a220_firmwareaff_c190_firmwarexeon_gold_6348h_firmwarexeon_silver_4310_firmwarexeon_platinum_8360h_firmwareaff_a400_firmwarexeon_platinum_8354h_firmwareaff_a250_firmwarexeon_gold_6330hxeon_platinum_8358pxeon_gold_6330_firmwarexeon_gold_6338xeon_gold_5315yxeon_platinum_8368q_firmwarexeon_platinum_8380hl_firmwarexeon_gold_6338_firmwarefas8200_firmwarexeon_platinum_8380xeon_platinum_8368xeon_platinum_8352yaff_a900_firmwarefas9000aff_a800xeon_gold_5317xeon_gold_6338txeon_platinum_8352mxeon_gold_6326_firmwarexeon_platinum_8376hlxeon_platinum_8360y_firmwarefas8700fas500f_firmwarexeon_platinum_8352s_firmwarexeon_platinum_8376hl_firmwarexeon_platinum_8360hxeon_platinum_8380h_firmwarexeon_platinum_8353h_firmwarexeon_platinum_8351nxeon_gold_6354_firmwarexeon_gold_5320tIntel(R) Processors
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-11185
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 9.56%
||
7 Day CHG~0.00%
Published-21 Jan, 2021 | 09:41
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bound issue in WLAN driver while processing vdev responses from firmware due to lack of validation of data received from firmware in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfs2580qpm5870wsa8830qcn5550qln5030qdm5579qpa5581ar9380qdm2307qfs2530qpa8802qat3519qcn5124qpm4621qca9992qet6100pmm855ausdr660gipq8078aqdm5670ipq6000qcn5064qpa8821smb1396ipq8072pm8350qdm5671qat3518qpm5641wcn3998qcn7605ipq8076aqat5516qdm5620ipq8074apm8350bhpm3003aqca6428sa8155ipq8071qpm8870qca6595auqpm5679sm7350qpm6670qca6584auipq8065qpm8820qpm4641sdr735gipq8174qca9990qca7500qcn5052smb1398ipq6010qdm4643ipq8068pmx55qcn9074pmr735aqdm3301sa8195pqpm5677qat5515qat3514wcn6851sa6155pqca8081qpa6560ipq8071asdr865wcd9385wcd9341smr545qln5020pmm8155auqdm3302qpm4630qca6390csr8811ipq4019sa8150pqdm2310pmm8195auqdm5621qln4642qca6438pmk7350qcn5121qca9898qca6564asmr546ipq4028sd8885gqet6110qln5040qca8072qpm6585wcn3991qpm5670qcn9000ipq8072aqln4650qpa8801qat5568qet5100qca6595ipq8078pmk8350qca6564auipq8173qcn5164pm8350bqat5522wsa8835qca6574qfs2630pmr735bqpa8842wcd9380qcn5154ipq4018qca6574aqcn5024sdr735qca9889smb1395pm8350cqpa8803smr525smr526ipq8074qca9888qca9985qpm4640wcn6750pmr525pm7350cqpm4650qtm525qca9886wcn6850wcn3910ipq8076qca6175asmb1394qca9984ipq6028ipq8064qcn5021qcn5152qat3555pm8009qca6391sdx55mqpa5461ipq6005pm8008qfs2608qcn5054ipq8070qdm4650qca9994qca6574auqca9980qcn5122qpm5621qca9880qpm6621qdm2308qdm5677wcn6856qdm5679ipq6018qcn5022sa6145ppmm6155ausdr8250wcn6740qca6696qca4024qpm5875qet5100mpmk8002qca8075qpa2625sa8155psdx55pm8350bhsipq8070aqat3516ipq4029qcn7606qpa5580Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-32457
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.14% / 33.71%
||
7 Day CHG~0.00%
Published-26 May, 2021 | 13:45
Updated-03 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl to escalate privileges on affected devices. An attacker must first obtain the ability to execute low-privileged code on the target device in order to exploit this vulnerability.

Action-Not Available
Vendor-Trend Micro Incorporated
Product-home_network_securityTrend Micro Home Network Security
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-47475
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.86%
||
7 Day CHG~0.00%
Published-22 May, 2024 | 08:19
Updated-24 Sep, 2025 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
comedi: vmk80xx: fix transfer-buffer overflows

In the Linux kernel, the following vulnerability has been resolved: comedi: vmk80xx: fix transfer-buffer overflows The driver uses endpoint-sized USB transfer buffers but up until recently had no sanity checks on the sizes. Commit e1f13c879a7c ("staging: comedi: check validity of wMaxPacketSize of usb endpoints found") inadvertently fixed NULL-pointer dereferences when accessing the transfer buffers in case a malicious device has a zero wMaxPacketSize. Make sure to allocate buffers large enough to handle also the other accesses that are done without a size check (e.g. byte 18 in vmk80xx_cnt_insn_read() for the VMK8061_MODEL) to avoid writing beyond the buffers, for example, when doing descriptor fuzzing. The original driver was for a low-speed device with 8-byte buffers. Support was later added for a device that uses bulk transfers and is presumably a full-speed device with a maximum 64-byte wMaxPacketSize.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-11202
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.73%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 10:00
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow/underflow occurs when typecasting the buffer passed by CPU internally in the library which is not aligned with the actual size of the structure' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in QCM6125, QCS410, QCS603, QCS605, QCS610, QCS6125, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA670, SDA845, SDM640, SDM670, SDM710, SDM830, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM8150, SM8150P

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sm6250p_firmwareqcs610sm6125sdm640sdm845sdx55m_firmwaresm7150_firmwaresm6150sm7150sm6250psa6155qcs410sdm670sda640_firmwareqcs605_firmwaresdx50m_firmwareqcs6125_firmwaresdm670_firmwaresm7150psda845_firmwaresda670qcs605sa8155sdx55_firmwaresa6155_firmwaresdx55msm6150p_firmwaresda845sm7125sa6155p_firmwaresda640sdx50mqcs6125qcs603sa8155_firmwaresa6145p_firmwaresa8155p_firmwaresdm710sm6250sdm830_firmwaresdm710_firmwaresda670_firmwareqcm6125sa6155pqcs610_firmwareqcs603_firmwaresa6145psm8150_firmwaresm7150p_firmwaresm7125_firmwaresdx55sm6250_firmwaresa8155psm6150_firmwaresm8150p_firmwaresm8150sdm830sdm640_firmwareqcs410_firmwaresm6125_firmwaresm8150psm6150pqcm6125_firmwaresdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-12031
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.01% / 0.65%
||
7 Day CHG~0.00%
Published-20 Jul, 2020 | 15:10
Updated-16 Sep, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation FactoryTalk View SE

In all versions of FactoryTalk View SE, after bypassing memory corruption mechanisms found in the operating system, a local, authenticated attacker may corrupt the associated memory space allowing for arbitrary code execution. Rockwell Automation recommends applying patch 1126290. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-factorytalk_viewFactoryTalk View SE
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • ...
  • 30
  • 31
  • Next
Details not found