Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-5827

Summary
Assigner-symantec
Assigner Org ID-80d3bcb6-88de-48c2-a47e-aebf795f19b5
Published At-11 Feb, 2020 | 17:09
Updated At-04 Aug, 2024 | 08:39
Rejected At-
Credits

Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:symantec
Assigner Org ID:80d3bcb6-88de-48c2-a47e-aebf795f19b5
Published At:11 Feb, 2020 | 17:09
Updated At:04 Aug, 2024 | 08:39
Rejected At:
▼CVE Numbering Authority (CNA)

Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

Affected Products
Vendor
n/a
Product
Symantec Endpoint Protection Manager (SEPM)
Versions
Affected
  • Prior to 14.2 RU2 MP1
Problem Types
TypeCWE IDDescription
textN/AOut of Bounds
Type: text
CWE ID: N/A
Description: Out of Bounds
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.symantec.com/us/en/article.SYMSA1505.html
x_refsource_MISC
Hyperlink: https://support.symantec.com/us/en/article.SYMSA1505.html
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.symantec.com/us/en/article.SYMSA1505.html
x_refsource_MISC
x_transferred
Hyperlink: https://support.symantec.com/us/en/article.SYMSA1505.html
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@symantec.com
Published At:11 Feb, 2020 | 18:15
Updated At:13 Feb, 2020 | 21:33

Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.13.3LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Primary2.02.1LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 3.3
Base severity: LOW
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Type: Primary
Version: 2.0
Base score: 2.1
Base severity: LOW
Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

Symantec Corporation
symantec
>>endpoint_protection_manager>>Versions before 14.2(exclusive)
cpe:2.3:a:symantec:endpoint_protection_manager:*:*:*:*:*:*:*:*
Symantec Corporation
symantec
>>endpoint_protection_manager>>14.2
cpe:2.3:a:symantec:endpoint_protection_manager:14.2:-:*:*:*:*:*:*
Symantec Corporation
symantec
>>endpoint_protection_manager>>14.2
cpe:2.3:a:symantec:endpoint_protection_manager:14.2:mp1:*:*:*:*:*:*
Symantec Corporation
symantec
>>endpoint_protection_manager>>14.2
cpe:2.3:a:symantec:endpoint_protection_manager:14.2:ru1:*:*:*:*:*:*
Symantec Corporation
symantec
>>endpoint_protection_manager>>14.2
cpe:2.3:a:symantec:endpoint_protection_manager:14.2:ru1-mp1:*:*:*:*:*:*
Symantec Corporation
symantec
>>endpoint_protection_manager>>14.2
cpe:2.3:a:symantec:endpoint_protection_manager:14.2:ru2:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-125Primarynvd@nist.gov
CWE ID: CWE-125
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://support.symantec.com/us/en/article.SYMSA1505.htmlsecure@symantec.com
Vendor Advisory
Hyperlink: https://support.symantec.com/us/en/article.SYMSA1505.html
Source: secure@symantec.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

280Records found

CVE-2020-5830
Matching Score-10
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-10
Assigner-Symantec - A Division of Broadcom
CVSS Score-3.3||LOW
EPSS-0.07% / 21.07%
||
7 Day CHG~0.00%
Published-11 Feb, 2020 | 17:12
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-endpoint_protection_managerSymantec Endpoint Protection Manager (SEPM)
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-5828
Matching Score-10
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-10
Assigner-Symantec - A Division of Broadcom
CVSS Score-3.3||LOW
EPSS-0.07% / 21.07%
||
7 Day CHG~0.00%
Published-11 Feb, 2020 | 17:11
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-endpoint_protection_managerSymantec Endpoint Protection Manager (SEPM)
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-5833
Matching Score-10
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-10
Assigner-Symantec - A Division of Broadcom
CVSS Score-3.3||LOW
EPSS-0.07% / 20.54%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 19:19
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec Endpoint Protection Manager, prior to 14.3, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-endpoint_protection_managerSymantec Endpoint Protection Manager
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-5831
Matching Score-10
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-10
Assigner-Symantec - A Division of Broadcom
CVSS Score-3.3||LOW
EPSS-0.07% / 21.07%
||
7 Day CHG~0.00%
Published-11 Feb, 2020 | 17:12
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-endpoint_protection_managerSymantec Endpoint Protection Manager (SEPM)
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-5829
Matching Score-10
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-10
Assigner-Symantec - A Division of Broadcom
CVSS Score-3.3||LOW
EPSS-0.07% / 21.07%
||
7 Day CHG~0.00%
Published-11 Feb, 2020 | 17:11
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-endpoint_protection_managerSymantec Endpoint Protection Manager (SEPM)
CWE ID-CWE-125
Out-of-bounds Read
CVE-2016-2203
Matching Score-8
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-8
Assigner-Symantec - A Division of Broadcom
CVSS Score-7.8||HIGH
EPSS-33.48% / 96.78%
||
7 Day CHG~0.00%
Published-22 Apr, 2016 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The management console on Symantec Messaging Gateway (SMG) Appliance devices before 10.6.1 allows local users to discover an encrypted AD password by leveraging certain read privileges.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-messaging_gatewayn/a
CVE-2004-2609
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.10% / 29.00%
||
7 Day CHG~0.00%
Published-04 Dec, 2005 | 11:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The stuffit.com executable on Symantec PowerQuest DeployCenter 5.5 boot disks allows local users to obtain sensitive information (an unencrypted password for a Windows domain account) via four "stuffit /f:stuffit.dat" invocations, possibly due to a buffer overflow.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-powerquest_deploycentern/a
CVE-2005-2766
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.08% / 24.70%
||
7 Day CHG~0.00%
Published-02 Sep, 2005 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec AntiVirus Corporate Edition 9.0.1.x and 9.0.4.x, and possibly other versions, when obtaining updates from an internal LiveUpdate server, stores sensitive information in cleartext in the Log.Liveupdate log file, which allows attackers to obtain the username and password to the internal LiveUpdate server.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-norton_antivirusn/a
CVE-2006-3785
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.08% / 24.00%
||
7 Day CHG~0.00%
Published-21 Jul, 2006 | 21:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec pcAnywhere 12.5 obfuscates the passwords in a GUI textbox with asterisks but does not encrypt them in the associated .cif (aka caller or CallerID) file, which allows local users to obtain the passwords from the window using tools such as Nirsoft Asterwin.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-pcanywheren/a
CVE-2006-3457
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.05% / 16.77%
||
7 Day CHG~0.00%
Published-05 Aug, 2006 | 00:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec On-Demand Agent (SODA) before 2.5 MR2 Build 2157, and the Virtual Desktop module in Symantec On-Demand Protection (SODP) before 2.6 Build 2233, do not properly encrypt files that are subject to policy-based automatic encryption, which might allow local users to read sensitive data via an unspecified decryption method.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-on-demand_agenton-demand_protectionn/a
CVE-2006-1286
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.10% / 28.70%
||
7 Day CHG~0.00%
Published-19 Mar, 2006 | 23:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the login dialog in dbisqlc.exe in SQLAnywhere for Symantec Ghost 8.0 and 8.2, as used in Symantec Ghost Solutions Suite (SGSS) 1.0, might allow local users to read certain sensitive information from the database.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-ghost_solutions_suitenorton_ghostn/a
CVE-2017-15530
Matching Score-8
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-8
Assigner-Symantec - A Division of Broadcom
CVSS Score-3.3||LOW
EPSS-0.08% / 23.52%
||
7 Day CHG~0.00%
Published-13 Dec, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Prior to 4.4.1.10, the Norton Family Android App can be susceptible to an Information Disclosure issue. Information disclosure is a very common issue that attackers will attempt to exploit as a first pass across the application. As they probe the application they will take note of anything that may seem out of place or any bit of information they can use to their advantage such as error messages, system information, user data, version numbers, component names, URL paths, or even simple typos and misspellings.

Action-Not Available
Vendor-Symantec Corporation
Product-norton_familyNorton Family Android App
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-6587
Matching Score-8
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-8
Assigner-Symantec - A Division of Broadcom
CVSS Score-5.5||MEDIUM
EPSS-0.13% / 33.46%
||
7 Day CHG~0.00%
Published-08 Jan, 2020 | 17:03
Updated-06 Aug, 2024 | 01:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Information Disclosure vulnerability exists in the mid.dat file stored on the SD card in Symantec Norton Mobile Security for Android before 3.16, which could let a local malicious user obtain sensitive information.

Action-Not Available
Vendor-Symantec Corporation
Product-norton_mobile_securityNorton Mobile Security for Android
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-12755
Matching Score-8
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-8
Assigner-Symantec - A Division of Broadcom
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 22.99%
||
7 Day CHG~0.00%
Published-17 Sep, 2019 | 15:49
Updated-04 Aug, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Norton Password Manager, prior to 6.5.0.2104, may be susceptible to an information disclosure issue, which is a type of vulnerability whereby there is an unintentional disclosure of information to an actor that is not explicitly authorized to have access to that information.

Action-Not Available
Vendor-Symantec Corporation
Product-norton_password_managerNorton Password Manager
CVE-2018-18366
Matching Score-8
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-8
Assigner-Symantec - A Division of Broadcom
CVSS Score-6.5||MEDIUM
EPSS-0.09% / 25.58%
||
7 Day CHG~0.00%
Published-25 Apr, 2019 | 19:13
Updated-05 Aug, 2024 | 11:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec Norton Security prior to 22.16.3, SEP (Windows client) prior to and including 12.1 RU6 MP9, and prior to 14.2 RU1, SEP SBE prior to Cloud Agent 3.00.31.2817, NIS-22.15.2.22, SEP-12.1.7484.7002 and SEP Cloud prior to 22.16.3 may be susceptible to a kernel memory disclosure, which is a type of issue where a specially crafted IRP request can cause the driver to return uninitialized memory.

Action-Not Available
Vendor-Symantec Corporation
Product-endpoint_protection_cloudendpoint_protection_cloud_agentendpoint_protectionnorton_securitySEP SBESEP (Windows client)SEP CloudNorton Security
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2016-5309
Matching Score-6
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-6
Assigner-Symantec - A Division of Broadcom
CVSS Score-5.5||MEDIUM
EPSS-6.71% / 90.88%
||
7 Day CHG~0.00%
Published-14 Apr, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The RAR file parser component in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection: Network (ATP); Symantec Email Security.Cloud; Symantec Data Center Security: Server; Symantec Endpoint Protection (SEP) for Windows before 12.1.6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1.6 MP6; Symantec Endpoint Protection for Small Business Enterprise (SEP SBE/SEP.Cloud); Symantec Endpoint Protection Cloud (SEPC) for Windows/Mac; Symantec Endpoint Protection Small Business Edition 12.1; CSAPI before 10.0.4 HF02; Symantec Protection Engine (SPE) before 7.0.5 HF02, 7.5.x before 7.5.4 HF02, 7.5.5 before 7.5.5 HF01, and 7.8.x before 7.8.0 HF03; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF2.1, 8.1.x before 8.1.2 HF2.3, and 8.1.3 before 8.1.3 HF2.2; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 6.5.8_3968140 HF2.3, 7.x before 7.0_3966002 HF2.1, and 7.5.x before 7.5_3966008 VHF2.2; Symantec Protection for SharePoint Servers (SPSS) before SPSS_6.0.3_To_6.0.5_HF_2.5 update, 6.0.6 before 6.0.6 HF_2.6, and 6.0.7 before 6.0.7_HF_2.7; Symantec Messaging Gateway (SMG) before 10.6.2; Symantec Messaging Gateway for Service Providers (SMG-SP) before 10.5 patch 260 and 10.6 before patch 259; Symantec Web Gateway; and Symantec Web Security.Cloud allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted RAR file that is mishandled during decompression.

Action-Not Available
Vendor-n/aSymantec CorporationBroadcom Inc.
Product-messaging_gateway_for_service_providersendpoint_protectionendpoint_protection_for_small_businessprotection_engineprotection_for_sharepoint_serversadvanced_threat_protectionsymantec_data_center_security_serveremail_security.cloudendpoint_protection_cloudmail_security_for_dominoweb_gatewayweb_security.cloudcsapimail_security_for_microsoft_exchangemessaging_gatewayn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2004-0112
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.72% / 71.58%
||
7 Day CHG~0.00%
Published-18 Mar, 2004 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.

Action-Not Available
Vendor-litespeedtechforcepointbluecoatneoterisstonesoftscotarantella4dsecurecomputingn/aAvaya LLCNovellSun Microsystems (Oracle Corporation)Symantec CorporationCisco Systems, Inc.Apple Inc.HP Inc.Check Point Software Technologies Ltd.Silicon Graphics, Inc.OpenBSDRed Hat, Inc.Dell Inc.FreeBSD FoundationOpenSSLVMware (Broadcom Inc.)
Product-wbemfirewall_services_moduleapplication_and_content_networking_softwareaaa_servers8700okena_stormwatchmac_os_xthreat_responseapache-based_web_serverpix_firewallpropacks8500provider-1call_managerciscoworks_common_management_foundationclientless_vpn_gateway_4400secure_content_acceleratorvsus8300stonebeat_fullclustergsx_serverfirewall-1access_registrarstonebeat_securityclustergss_4480_global_site_selectortarantella_enterpriseproxysgvpn-1mac_os_x_serverenterprise_linux_desktopmds_9000enterprise_linuxwebstaropenserverbsafe_ssl-jioswebnssg203css11000_content_services_switchopenssllinuxintuity_audixserverclustersg5openbsdlitespeed_web_serversg208sg200cacheos_ca_sastonegateciscoworks_common_servicesgss_4490_global_site_selectorimanagerinstant_virtual_extranetedirectorysidewinderhp-uxconverged_communications_serverstonebeat_webclustercrypto_accelerator_4000freebsdpix_firewall_softwarecontent_services_switch_11500css_secure_content_acceleratorn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-5826
Matching Score-6
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-6
Assigner-Symantec - A Division of Broadcom
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 19.61%
||
7 Day CHG~0.00%
Published-11 Feb, 2020 | 17:09
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec Endpoint Protection (SEP) and Symantec Endpoint Protection Small Business Edition (SEP SBE), prior to 14.2 RU2 MP1 and prior to 14.2.5569.2100 respectively, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-endpoint_protectionSymantec Endpoint Protection (SEP) and Symantec Endpoint Protection Small Business Edition (SEP SBE)
CWE ID-CWE-125
Out-of-bounds Read
CVE-2019-12750
Matching Score-6
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-6
Assigner-Symantec - A Division of Broadcom
CVSS Score-7.8||HIGH
EPSS-0.78% / 72.67%
||
7 Day CHG~0.00%
Published-31 Jul, 2019 | 17:42
Updated-04 Aug, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec Endpoint Protection, prior to 14.2 RU1 & 12.1 RU6 MP10 and Symantec Endpoint Protection Small Business Edition, prior to 12.1 RU6 MP10c (12.1.7491.7002), may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-endpoint_protectionSymantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-9544
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 4.65%
||
7 Day CHG~0.00%
Published-14 Nov, 2018 | 18:00
Updated-05 Aug, 2024 | 07:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In register_app of btif_hd.cc, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-113037220

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-9589
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 4.65%
||
7 Day CHG~0.00%
Published-12 Feb, 2019 | 00:00
Updated-17 Sep, 2024 | 01:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ieee802_11_rx_wnmsleep_req of wnm_ap.c in Android-7.0, Android-7.1.1, Android-7.1.2, Android-8.0, Android-8.1 and Android-9, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the wifi driver with no additional execution privileges needed. User interaction is not needed for exploitation. Android ID: A-111893132.

Action-Not Available
Vendor-AndroidGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-6234
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.11% / 30.13%
||
7 Day CHG~0.00%
Published-25 May, 2018 | 15:00
Updated-05 Aug, 2024 | 06:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Out-of-Bounds Read Information Disclosure vulnerability in Trend Micro Maximum Security (Consumer) 2018 could allow a local attacker to disclose sensitive information on vulnerable installations due to a flaw within processing of IOCTL 0x222814 by the tmnciesc.sys driver. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-premium_securityinternet_securityantivirus\+windowsmaximum_securityTrend Micro Maximum Security
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5836
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 7.22%
||
7 Day CHG~0.00%
Published-06 Jul, 2018 | 17:00
Updated-16 Sep, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wma_nan_rsp_event_handler() in Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05, the data_len value is received from firmware and not properly validated which could potentially lead to an out-of-bounds access.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.Google LLC
Product-androidAndroid for MSM, Firefox OS for MSM, QRD Android
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-0068
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 8.31%
||
7 Day CHG~0.00%
Published-17 Apr, 2020 | 18:04
Updated-04 Aug, 2024 | 05:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In crus_afe_get_param of msm-cirrus-playback.c, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: Android. Versions: Android kernel. Android ID: A-139354541

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2018-5864
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 7.22%
||
7 Day CHG~0.00%
Published-06 Jul, 2018 | 19:00
Updated-16 Sep, 2024 | 20:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

While processing a WMI_APFIND event in all Android releases from CAF using the Linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-07-05, a buffer over-read and information leak can potentially occur.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.Google LLC
Product-androidAndroid for MSM, Firefox OS for MSM, QRD Android
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-4255
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.79%
||
7 Day CHG~0.00%
Published-11 Jan, 2019 | 18:00
Updated-05 Aug, 2024 | 05:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In macOS High Sierra before 10.13.5, an out-of-bounds read was addressed with improved input validation.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_xn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-0149
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-3.3||LOW
EPSS-0.04% / 10.20%
||
7 Day CHG~0.00%
Published-28 Jan, 2025 | 04:04
Updated-27 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA GPU Display Driver for Linux contains a vulnerability which could allow an attacker unauthorized access to files. A successful exploit of this vulnerability might lead to limited information disclosure.

Action-Not Available
Vendor-NVIDIA Corporation
Product-NVIDIA GPU Display Driver, vGPU software
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-4256
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.79%
||
7 Day CHG~0.00%
Published-11 Jan, 2019 | 18:00
Updated-05 Aug, 2024 | 05:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In macOS High Sierra before 10.13.5, an out-of-bounds read was addressed with improved input validation.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_xn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-0154
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-3.8||LOW
EPSS-0.07% / 21.37%
||
7 Day CHG~0.00%
Published-13 Mar, 2024 | 16:41
Updated-31 Jan, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an improper parameter initialization vulnerability. A local low privileged attacker could potentially exploit this vulnerability to read the contents of non-SMM stack memory.

Action-Not Available
Vendor-Dell Inc.
Product-poweredge_r860poweredge_r6625_firmwareemc_xc_core_xc7525_firmwarepoweredge_r750_firmwarepoweredge_c6320poweredge_r430poweredge_r760xa_firmwarenx440_firmwarexc_core_xc760_firmwareemc_xc_core_xc650_firmwaredss_8440poweredge_c6620poweredge_xr5610emc_xc_core_xc650poweredge_r630poweredge_c6620_firmwarepoweredge_r7615poweredge_r660_firmwarepoweredge_r860_firmwareemc_xc_core_6420_systemnx3340_firmwarepoweredge_r750xaemc_xc_core_xc940_systempoweredge_r730xd_firmwarenx3340poweredge_c6420_firmwareemc_xc_core_xc750_firmwareemc_xc_core_xc740xd2_firmwarepoweredge_r840poweredge_hs5620poweredge_r940xa_firmwarepoweredge_hs5620_firmwarepoweredge_xr7620_firmwarepoweredge_xe9680_firmwarepoweredge_r540poweredge_r350_firmwarepoweredge_t630_firmwarepoweredge_t640poweredge_fc430poweredge_mx840cpoweredge_r740poweredge_mx740cpoweredge_t340poweredge_r240poweredge_r760_firmwarepoweredge_t140poweredge_c4130xc6320_firmwarepoweredge_r660xsxc630_firmwarepoweredge_r450emc_xc_core_xc640_systempoweredge_r7625poweredge_r250_firmwarepoweredge_t340_firmwarenx3230poweredge_fc640_firmwarepoweredge_t550poweredge_r740xd_firmwarepoweredge_r230poweredge_m830_\(pe_vrtx\)_firmwarepoweredge_c6525_firmwarepoweredge_xr8620t_firmwarepoweredge_fc640poweredge_r430_firmwarepoweredge_r7515_firmwarepoweredge_r7525_firmwarepoweredge_m630_firmwarepoweredge_r730xdpoweredge_hs5610poweredge_r6625poweredge_t130poweredge_r650dss_8440_firmwarepoweredge_r550_firmwarepoweredge_r440_firmwarepoweredge_r240_firmwarepoweredge_r640_firmwarenx3240_firmwarepoweredge_r730poweredge_m640_\(pe_vrtx\)_firmwarepoweredge_m830poweredge_r760xapoweredge_r6515_firmwarepoweredge_r960poweredge_r350xc_core_xc660poweredge_r830poweredge_r760xd2_firmwarepoweredge_c6615_firmwarepoweredge_xr4510c_firmwarexc730nx440poweredge_xr7620poweredge_mx760c_firmwarepoweredge_xr4510cpoweredge_c4130_firmwarepoweredge_xr8610t_firmwarepoweredge_t150_firmwarenx3330_firmwarepoweredge_c6320_firmwarexc430poweredge_xr4520c_firmwarepoweredge_r340_firmwarexc_core_xc7625_firmwareemc_xc_core_xc450_firmwarepoweredge_r530_firmwarepoweredge_xr8620tpoweredge_xr12_firmwarenx3330emc_xc_core_xc740xd_systempoweredge_t430_firmwarepoweredge_xr2_firmwarepoweredge_m630_\(pe_vrtx\)_firmwarepoweredge_r330poweredge_m640poweredge_xe9680poweredge_t440_firmwarepoweredge_c4140emc_xc_core_xc640_system_firmwarepoweredge_t330poweredge_fc830_firmwareemc_xc_core_xc750xapoweredge_xr11poweredge_fc830poweredge_r760xspoweredge_t350xc730_firmwarepoweredge_r750xa_firmwarepoweredge_mx760cpoweredge_r7515poweredge_r740xd2poweredge_mx840c_firmwareemc_xc_core_xc750poweredge_m640_firmwarepoweredge_c4140_firmwarepoweredge_xe7420_firmwarepoweredge_r760xd2poweredge_m630_\(pe_vrtx\)poweredge_c6525poweredge_r6525poweredge_c6420nx3230_firmwarenx430_firmwarepoweredge_r750xs_firmwarexc_core_xc760xc730xdpoweredge_m830_firmwarepoweredge_r6525_firmwarepoweredge_r250poweredge_r440emc_xc_core_xc740xd_system_firmwarepoweredge_xe8640emc_xc_core_xc750xa_firmwarepoweredge_r7625_firmwarepoweredge_t550_firmwarepoweredge_r740_firmwarepoweredge_t640_firmwarepoweredge_mx740c_firmwarepoweredge_r930poweredge_xe7440poweredge_hs5610_firmwarepoweredge_c6615poweredge_r230_firmwarepoweredge_r630_firmwarepoweredge_r740xdpoweredge_r940xapoweredge_xe9640_firmwarepoweredge_t440poweredge_t140_firmwarepoweredge_r6615_firmwarepoweredge_r640poweredge_xr2poweredge_r940nx430poweredge_mx750c_firmwarenx3240poweredge_fc630_firmwarexc6320emc_xc_core_xc940_system_firmwarexc_core_xc7625poweredge_r6615xc730xd_firmwarepoweredge_r550xc630poweredge_r650xs_firmwarepoweredge_fc630poweredge_r6515xc430_firmwarepoweredge_r930_firmwarepoweredge_xr12poweredge_m640_\(pe_vrtx\)poweredge_r740xd2_firmwareemc_xc_core_xc450emc_xc_core_xc7525poweredge_xr8610tpoweredge_xr4520cpoweredge_xe9640poweredge_r750poweredge_r650xspoweredge_r530poweredge_r840_firmwarepoweredge_r730_firmwareemc_xc_core_xc6520poweredge_t150poweredge_xe8640_firmwarepoweredge_t350_firmwarepoweredge_c6520_firmwarepoweredge_t560_firmwarepoweredge_r960_firmwarepoweredge_r540_firmwarepoweredge_r330_firmwarepoweredge_t330_firmwarepoweredge_xe8545poweredge_t430poweredge_r7525poweredge_xe8545_firmwarepoweredge_r7615_firmwarepoweredge_t630emc_xc_core_6420_system_firmwarepoweredge_r340poweredge_m830_\(pe_vrtx\)poweredge_xr5610_firmwarepoweredge_xe7440_firmwarepoweredge_r760xs_firmwareemc_xc_core_xc740xd2emc_xc_core_xc6520_firmwarexc_core_xc660_firmwarepoweredge_t560poweredge_c6520poweredge_r450_firmwarepoweredge_xe7420poweredge_m630poweredge_xr11_firmwarepoweredge_r750xspoweredge_r660xs_firmwarepoweredge_t130_firmwareemc_xc_core_xcxr2_firmwareemc_xc_core_xcxr2poweredge_r760poweredge_r940_firmwarepoweredge_xe2420_firmwarepoweredge_r650_firmwarepoweredge_fc430_firmwarepoweredge_xe2420poweredge_mx750cpoweredge_r830_firmwarepoweredge_r660PowerEdge Platform
CWE ID-CWE-788
Access of Memory Location After End of Buffer
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-41227
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.08% / 24.74%
||
7 Day CHG~0.00%
Published-05 Nov, 2021 | 22:30
Updated-04 Aug, 2024 | 03:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary memory read in `ImmutableConst`

TensorFlow is an open source platform for machine learning. In affected versions the `ImmutableConst` operation in TensorFlow can be tricked into reading arbitrary memory contents. This is because the `tstring` TensorFlow string class has a special case for memory mapped strings but the operation itself does not offer any support for this datatype. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-0173
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-3.8||LOW
EPSS-0.07% / 21.37%
||
7 Day CHG~0.00%
Published-13 Mar, 2024 | 16:52
Updated-31 Jan, 2025 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an improper parameter initialization vulnerability. A local low privileged attacker could potentially exploit this vulnerability to read the contents of non-SMM stack memory.

Action-Not Available
Vendor-Dell Inc.
Product-poweredge_r860poweredge_r6625_firmwareemc_xc_core_xc7525_firmwarepoweredge_r750_firmwarepoweredge_c6320poweredge_r430poweredge_r760xa_firmwarenx440_firmwarexc_core_xc760_firmwareemc_xc_core_xc650_firmwaredss_8440poweredge_c6620poweredge_xr5610emc_xc_core_xc650poweredge_r630poweredge_c6620_firmwarepoweredge_r7615poweredge_r660_firmwarepoweredge_r860_firmwareemc_xc_core_6420_systemnx3340_firmwarepoweredge_r750xaemc_xc_core_xc940_systempoweredge_r730xd_firmwarenx3340poweredge_c6420_firmwareemc_xc_core_xc750_firmwareemc_xc_core_xc740xd2_firmwarepoweredge_r840poweredge_hs5620poweredge_r940xa_firmwarepoweredge_hs5620_firmwarepoweredge_xr7620_firmwarepoweredge_xe9680_firmwarepoweredge_r540poweredge_r350_firmwarepoweredge_t630_firmwarepoweredge_t640poweredge_fc430poweredge_mx840cpoweredge_r740poweredge_mx740cpoweredge_t340poweredge_r240poweredge_r760_firmwarepoweredge_t140poweredge_c4130xc6320_firmwarepoweredge_r660xsxc630_firmwarepoweredge_r450emc_xc_core_xc640_systempoweredge_r7625poweredge_r250_firmwarepoweredge_t340_firmwarenx3230poweredge_fc640_firmwarepoweredge_t550poweredge_r740xd_firmwarepoweredge_r230poweredge_m830_\(pe_vrtx\)_firmwarepoweredge_c6525_firmwarepoweredge_xr8620t_firmwarepoweredge_fc640poweredge_r430_firmwarepoweredge_r7515_firmwarepoweredge_r7525_firmwarepoweredge_m630_firmwarepoweredge_r730xdpoweredge_hs5610poweredge_r6625poweredge_t130poweredge_r650dss_8440_firmwarepoweredge_r550_firmwarepoweredge_r440_firmwarepoweredge_r240_firmwarepoweredge_r640_firmwarenx3240_firmwarepoweredge_r730poweredge_m640_\(pe_vrtx\)_firmwarepoweredge_m830poweredge_r760xapoweredge_r6515_firmwarepoweredge_r960poweredge_r350xc_core_xc660poweredge_r830poweredge_r760xd2_firmwarepoweredge_c6615_firmwarepoweredge_xr4510c_firmwarexc730nx440poweredge_xr7620poweredge_mx760c_firmwarepoweredge_xr4510cpoweredge_c4130_firmwarepoweredge_xr8610t_firmwarepoweredge_t150_firmwarenx3330_firmwarepoweredge_c6320_firmwarexc430poweredge_xr4520c_firmwarepoweredge_r340_firmwarexc_core_xc7625_firmwareemc_xc_core_xc450_firmwarepoweredge_r530_firmwarepoweredge_xr8620tpoweredge_xr12_firmwarenx3330emc_xc_core_xc740xd_systempoweredge_t430_firmwarepoweredge_xr2_firmwarepoweredge_m630_\(pe_vrtx\)_firmwarepoweredge_r330poweredge_m640poweredge_xe9680poweredge_t440_firmwarepoweredge_c4140emc_xc_core_xc640_system_firmwarepoweredge_t330poweredge_fc830_firmwareemc_xc_core_xc750xapoweredge_xr11poweredge_fc830poweredge_r760xspoweredge_t350xc730_firmwarepoweredge_r750xa_firmwarepoweredge_mx760cpoweredge_r7515poweredge_r740xd2poweredge_mx840c_firmwareemc_xc_core_xc750poweredge_m640_firmwarepoweredge_c4140_firmwarepoweredge_xe7420_firmwarepoweredge_r760xd2poweredge_m630_\(pe_vrtx\)poweredge_c6525poweredge_r6525poweredge_c6420nx3230_firmwarenx430_firmwarepoweredge_r750xs_firmwarexc_core_xc760xc730xdpoweredge_m830_firmwarepoweredge_r6525_firmwarepoweredge_r250poweredge_r440emc_xc_core_xc740xd_system_firmwarepoweredge_xe8640emc_xc_core_xc750xa_firmwarepoweredge_r7625_firmwarepoweredge_t550_firmwarepoweredge_r740_firmwarepoweredge_t640_firmwarepoweredge_mx740c_firmwarepoweredge_r930poweredge_xe7440poweredge_hs5610_firmwarepoweredge_c6615poweredge_r230_firmwarepoweredge_r630_firmwarepoweredge_r740xdpoweredge_r940xapoweredge_xe9640_firmwarepoweredge_t440poweredge_t140_firmwarepoweredge_r6615_firmwarepoweredge_r640poweredge_xr2poweredge_r940nx430poweredge_mx750c_firmwarenx3240poweredge_fc630_firmwarexc6320emc_xc_core_xc940_system_firmwarexc_core_xc7625poweredge_r6615xc730xd_firmwarepoweredge_r550xc630poweredge_r650xs_firmwarepoweredge_fc630poweredge_r6515xc430_firmwarepoweredge_r930_firmwarepoweredge_xr12poweredge_m640_\(pe_vrtx\)poweredge_r740xd2_firmwareemc_xc_core_xc450emc_xc_core_xc7525poweredge_xr8610tpoweredge_xr4520cpoweredge_xe9640poweredge_r750poweredge_r650xspoweredge_r530poweredge_r840_firmwarepoweredge_r730_firmwareemc_xc_core_xc6520poweredge_t150poweredge_xe8640_firmwarepoweredge_t350_firmwarepoweredge_c6520_firmwarepoweredge_t560_firmwarepoweredge_r960_firmwarepoweredge_r540_firmwarepoweredge_r330_firmwarepoweredge_t330_firmwarepoweredge_xe8545poweredge_t430poweredge_r7525poweredge_xe8545_firmwarepoweredge_r7615_firmwarepoweredge_t630emc_xc_core_6420_system_firmwarepoweredge_r340poweredge_m830_\(pe_vrtx\)poweredge_xr5610_firmwarepoweredge_xe7440_firmwarepoweredge_r760xs_firmwareemc_xc_core_xc740xd2emc_xc_core_xc6520_firmwarexc_core_xc660_firmwarepoweredge_t560poweredge_c6520poweredge_r450_firmwarepoweredge_xe7420poweredge_m630poweredge_xr11_firmwarepoweredge_r750xspoweredge_r660xs_firmwarepoweredge_t130_firmwareemc_xc_core_xcxr2_firmwareemc_xc_core_xcxr2poweredge_r760poweredge_r940_firmwarepoweredge_xe2420_firmwarepoweredge_r650_firmwarepoweredge_fc430_firmwarepoweredge_xe2420poweredge_mx750cpoweredge_r830_firmwarepoweredge_r660PowerEdge Platform
CWE ID-CWE-788
Access of Memory Location After End of Buffer
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-6254
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-3.3||LOW
EPSS-0.02% / 2.13%
||
7 Day CHG~0.00%
Published-10 May, 2018 | 14:00
Updated-16 Sep, 2024 | 17:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Android before the 2018-05-05 security patch level, NVIDIA Media Server contains an out-of-bounds read (due to improper input validation) vulnerability which could lead to local information disclosure. This issue is rated as moderate. Android: A-64340684. Reference: N-CVE-2018-6254.

Action-Not Available
Vendor-Google LLCNVIDIA Corporation
Product-androidAndroid
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-5895
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 3.31%
||
7 Day CHG~0.00%
Published-06 Jul, 2018 | 17:00
Updated-16 Sep, 2024 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer over-read may happen in wma_process_utf_event() due to improper buffer length validation before writing into param_buf->num_wow_packet_buffer in Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.Google LLC
Product-androidAndroid for MSM, Firefox OS for MSM, QRD Android
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-39722
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 2.26%
||
7 Day CHG~0.00%
Published-16 Mar, 2022 | 14:03
Updated-04 Aug, 2024 | 02:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ProtocolStkProactiveCommandAdapter::Init of protocolstkadapter.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204585345References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-39637
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 2.26%
||
7 Day CHG~0.00%
Published-15 Dec, 2021 | 18:06
Updated-04 Aug, 2024 | 02:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In CreateDeviceInfo of trusty_remote_provisioning_context.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-193579873References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-39730
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 2.26%
||
7 Day CHG~0.00%
Published-16 Mar, 2022 | 14:03
Updated-04 Aug, 2024 | 02:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In TBD of TBD, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-206472503References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-39657
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 8.31%
||
7 Day CHG~0.00%
Published-15 Dec, 2021 | 18:06
Updated-04 Aug, 2024 | 02:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194696049References: Upstream kernel

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-3579
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 3.15%
||
7 Day CHG~0.00%
Published-12 Jun, 2018 | 20:00
Updated-16 Sep, 2024 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the WLAN driver in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel, event->num_entries_in_page is a value received from firmware that is not properly validated which can lead to a buffer over-read

Action-Not Available
Vendor-Qualcomm Technologies, Inc.Google LLC
Product-androidAndroid for MSM, Firefox OS for MSM, QRD Android
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-39717
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 2.26%
||
7 Day CHG~0.00%
Published-16 Mar, 2022 | 14:03
Updated-04 Aug, 2024 | 02:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In iaxxx_btp_write_words of iaxxx-btp.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-198653629References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-39711
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.09% / 26.40%
||
7 Day CHG+0.01%
Published-16 Mar, 2022 | 14:03
Updated-04 Aug, 2024 | 02:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154175781References: Upstream kernel

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-39724
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 2.26%
||
7 Day CHG~0.00%
Published-16 Mar, 2022 | 14:03
Updated-04 Aug, 2024 | 02:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In TuningProviderBase::GetTuningTreeSet of tuning_provider_base.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-205753190References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-40154
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.63% / 69.34%
||
7 Day CHG~0.00%
Published-01 Dec, 2021 | 14:50
Updated-04 Aug, 2024 | 02:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NXP LPC55S69 devices before A3 have a buffer over-read via a crafted wlength value in a GET Descriptor Configuration request during use of USB In-System Programming (ISP) mode. This discloses protected flash memory.

Action-Not Available
Vendor-nxpn/a
Product-lpc55s69jev98lpc55s69jbd64lpc55s69jbd64_firmwarelpc55s69jev98_firmwarelpc55s69jbd100lpc55s69jbd100_firmwaren/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-39687
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 2.76%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 17:40
Updated-04 Aug, 2024 | 02:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In HandleTransactionIoEvent of actuator_driver.cc, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204421047References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-37687
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 12.51%
||
7 Day CHG~0.00%
Published-12 Aug, 2021 | 22:15
Updated-04 Aug, 2024 | 01:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap OOB in TensorFlow Lite's `Gather*` implementations

TensorFlow is an end-to-end open source platform for machine learning. In affected versions TFLite's [`GatherNd` implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/gather_nd.cc#L124) does not support negative indices but there are no checks for this situation. Hence, an attacker can read arbitrary data from the heap by carefully crafting a model with negative values in `indices`. Similar issue exists in [`Gather` implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/gather.cc). We have patched the issue in GitHub commits bb6a0383ed553c286f87ca88c207f6774d5c4a8f and eb921122119a6b6e470ee98b89e65d721663179d. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-37685
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 2.19%
||
7 Day CHG~0.00%
Published-12 Aug, 2021 | 22:15
Updated-04 Aug, 2024 | 01:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap OOB in TensorFlow Lite

TensorFlow is an end-to-end open source platform for machine learning. In affected versions TFLite's [`expand_dims.cc`](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/expand_dims.cc#L36-L50) contains a vulnerability which allows reading one element outside of bounds of heap allocated data. If `axis` is a large negative value (e.g., `-100000`), then after the first `if` it would still be negative. The check following the `if` statement will pass and the `for` loop would read one element before the start of `input_dims.data` (when `i = 0`). We have patched the issue in GitHub commit d94ffe08a65400f898241c0374e9edc6fa8ed257. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-19985
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.04% / 12.60%
||
7 Day CHG~0.00%
Published-17 Mar, 2019 | 19:48
Updated-05 Aug, 2024 | 11:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncNetApp, Inc.Debian GNU/Linux
Product-element_software_management_nodeactive_iq_performance_analytics_servicesdebian_linuxlinux_kerneln/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-3588
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-3.3||LOW
EPSS-0.04% / 9.81%
||
7 Day CHG~0.00%
Published-10 Jun, 2021 | 02:30
Updated-16 Sep, 2024 | 23:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
memory contents disclosure in cli_feat_read_cb

The cli_feat_read_cb() function in src/gatt-database.c does not perform bounds checks on the 'offset' variable before using it as an index into an array for reading.

Action-Not Available
Vendor-BlueZ
Product-bluezBlueZ
CWE ID-CWE-788
Access of Memory Location After End of Buffer
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-34633
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-4||MEDIUM
EPSS-0.04% / 12.75%
||
7 Day CHG~0.00%
Published-07 Aug, 2024 | 01:30
Updated-09 Aug, 2024 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in parsing object header in Samsung Notes prior to version 4.4.21.62 allows local attacker to access unauthorized memory.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-notesSamsung Notes
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-37670
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 2.19%
||
7 Day CHG~0.00%
Published-12 Aug, 2021 | 22:25
Updated-04 Aug, 2024 | 01:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap OOB in `UpperBound` and `LowerBound` in TensorFlow

TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.UpperBound`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/searchsorted_op.cc#L85-L104) does not validate the rank of `sorted_input` argument. A similar issue occurs in `tf.raw_ops.LowerBound`. We have patched the issue in GitHub commit 42459e4273c2e47a3232cc16c4f4fff3b3a35c38. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-18089
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.79%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 20:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple out of bounds read in igdkm64.sys in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-Intel Corporation
Product-graphics_driverIntel(R) Graphics Driver for Windows
CWE ID-CWE-125
Out-of-bounds Read
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
Details not found