Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-12649

Summary
Assigner-Canon
Assigner Org ID-f98c90f0-e9bd-4fa7-911b-51993f3571fd
Published At-28 Jan, 2025 | 00:39
Updated At-28 Jan, 2025 | 15:17
Rejected At-
Credits

Buffer overflow in XPS data font processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw firmware v05.04 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw firmware v05.04 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw firmware v05.04 and earlier sold in Europe.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Canon
Assigner Org ID:f98c90f0-e9bd-4fa7-911b-51993f3571fd
Published At:28 Jan, 2025 | 00:39
Updated At:28 Jan, 2025 | 15:17
Rejected At:
▼CVE Numbering Authority (CNA)

Buffer overflow in XPS data font processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw firmware v05.04 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw firmware v05.04 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw firmware v05.04 and earlier sold in Europe.

Affected Products
Vendor
Canon Inc.Canon Inc.
Product
Satera MF656Cdw
Versions
Affected
  • 05.04 and earlier
Vendor
Canon Inc.Canon Inc.
Product
Satera MF654Cdw
Versions
Affected
  • 05.04 and earlier
Vendor
Canon Inc.Canon Inc.
Product
Color imageCLASS MF656Cdw
Versions
Affected
  • 05.04 and earlier
Vendor
Canon Inc.Canon Inc.
Product
Color imageCLASS MF654Cdw
Versions
Affected
  • 05.04 and earlier
Vendor
Canon Inc.Canon Inc.
Product
Color imageCLASS MF653Cdw
Versions
Affected
  • 05.04 and earlier
Vendor
Canon Inc.Canon Inc.
Product
Color imageCLASS MF652Cdw
Versions
Affected
  • 05.04 and earlier
Vendor
Canon Inc.Canon Inc.
Product
Color imageCLASS LBP633Cdw
Versions
Affected
  • 05.04 and earlier
Vendor
Canon Inc.Canon Inc.
Product
Color imageCLASS LBP632Cdw
Versions
Affected
  • 05.04 and earlier
Vendor
Canon Inc.Canon Inc.
Product
i-SENSYS MF657Cdw
Versions
Affected
  • 05.04 and earlier
Vendor
Canon Inc.Canon Inc.
Product
i-SENSYS MF655Cdw
Versions
Affected
  • 05.04 and earlier
Vendor
Canon Inc.Canon Inc.
Product
i-SENSYS MF651Cdw
Versions
Affected
  • 05.04 and earlier
Vendor
Canon Inc.Canon Inc.
Product
i-SENSYS LBP633Cdw
Versions
Affected
  • 05.04 and earlier
Vendor
Canon Inc.Canon Inc.
Product
i-SENSYS LBP631Cdw
Versions
Affected
  • 05.04 and earlier
Problem Types
TypeCWE IDDescription
CWECWE-787CWE-787: Out-of-bounds Write
Type: CWE
CWE ID: CWE-787
Description: CWE-787: Out-of-bounds Write
Metrics
VersionBase scoreBase severityVector
3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://psirt.canon/advisory-information/cp2025-001/
vendor-advisory
https://canon.jp/support/support-info/250127vulnerability-response
vendor-advisory
https://www.usa.canon.com/support/canon-product-advisories/service-notice-regarding-vulnerability-measure-against-buffer-overflow-for-laser-printers-and-small-office-multifunctional-printers
vendor-advisory
https://www.canon-europe.com/support/product-security/#news
vendor-advisory
Hyperlink: https://psirt.canon/advisory-information/cp2025-001/
Resource:
vendor-advisory
Hyperlink: https://canon.jp/support/support-info/250127vulnerability-response
Resource:
vendor-advisory
Hyperlink: https://www.usa.canon.com/support/canon-product-advisories/service-notice-regarding-vulnerability-measure-against-buffer-overflow-for-laser-printers-and-small-office-multifunctional-printers
Resource:
vendor-advisory
Hyperlink: https://www.canon-europe.com/support/product-security/#news
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:f98c90f0-e9bd-4fa7-911b-51993f3571fd
Published At:28 Jan, 2025 | 01:15
Updated At:28 Jan, 2025 | 01:15

Buffer overflow in XPS data font processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw firmware v05.04 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw firmware v05.04 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw firmware v05.04 and earlier sold in Europe.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-787Secondaryf98c90f0-e9bd-4fa7-911b-51993f3571fd
CWE ID: CWE-787
Type: Secondary
Source: f98c90f0-e9bd-4fa7-911b-51993f3571fd
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://canon.jp/support/support-info/250127vulnerability-responsef98c90f0-e9bd-4fa7-911b-51993f3571fd
N/A
https://psirt.canon/advisory-information/cp2025-001/f98c90f0-e9bd-4fa7-911b-51993f3571fd
N/A
https://www.canon-europe.com/support/product-security/#newsf98c90f0-e9bd-4fa7-911b-51993f3571fd
N/A
https://www.usa.canon.com/support/canon-product-advisories/service-notice-regarding-vulnerability-measure-against-buffer-overflow-for-laser-printers-and-small-office-multifunctional-printersf98c90f0-e9bd-4fa7-911b-51993f3571fd
N/A
Hyperlink: https://canon.jp/support/support-info/250127vulnerability-response
Source: f98c90f0-e9bd-4fa7-911b-51993f3571fd
Resource: N/A
Hyperlink: https://psirt.canon/advisory-information/cp2025-001/
Source: f98c90f0-e9bd-4fa7-911b-51993f3571fd
Resource: N/A
Hyperlink: https://www.canon-europe.com/support/product-security/#news
Source: f98c90f0-e9bd-4fa7-911b-51993f3571fd
Resource: N/A
Hyperlink: https://www.usa.canon.com/support/canon-product-advisories/service-notice-regarding-vulnerability-measure-against-buffer-overflow-for-laser-printers-and-small-office-multifunctional-printers
Source: f98c90f0-e9bd-4fa7-911b-51993f3571fd
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

2070Records found

CVE-2023-0851
Matching Score-10
Assigner-Canon Inc.
ShareView Details
Matching Score-10
Assigner-Canon Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.24% / 47.18%
||
7 Day CHG~0.00%
Published-11 May, 2023 | 00:00
Updated-10 Feb, 2025 | 20:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in CPCA Resource Download process of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.

Action-Not Available
Vendor-Canon Inc.
Product-i-sensys_x_c1127ii-sensys_mf645cx_firmwaremf741cdw_firmwarei-sensys_x_c1127pmf745cdwimageprograf_tc-20mi-sensys_mf746cx_firmwaremf273dw_firmwarei-sensys_mf641cw_firmwaremf641cwimageprograf_tc-20m_firmwaremf1127c_firmwarei-sensys_mf641cwi-sensys_lbp623cdwlbp1127cmf275dwlbp621c_firmwaremaxify_gx4020lbp122dwmf262dw_iilbp622cdw_firmwarei-sensys_lbp623cdw_firmwaremf743cdwlbp661c_firmwaremaxify_gx3020mf746cdwmf644cdw_firmwaremf267dw_ii_firmwarelbp1127c_firmwaremf1127clbp622c_firmwaremf269dw_iimf745cdw_firmwarei-sensys_mf746cximageprograf_tc-20_firmwarei-sensys_mf744cdwmf269dw_vp_ii_firmwarelbp662c_firmwaremf642cdw_firmwaremf746cdw_firmwarei-sensys_x_c1127p_firmwaremf273dwi-sensys_x_c1127i_firmwareimageprograf_tc-20i-sensys_lbp621cwi-sensys_x_c1127ifi-sensys_x_c1127if_firmwaremf272dw_firmwaremf644cdwi-sensys_lbp664cxlbp664cdw_firmwarepixma_g4270pixma_g3270i-sensys_mf645cxi-sensys_lbp633cdw_firmwarei-sensys_mf744cdw_firmwarelbp623cdw_firmwarepixma_g4270_firmwarelbp622cpixma_g3270_firmwarei-sensys_mf643cdw_firmwaremaxify_gx4020_firmwarei-sensys_lbp621cw_firmwaremf272dwmf641cw_firmwarelbp622cdwlbp664c_firmwarei-sensys_lbp633cdwmf264dw_iimf642cdwmf264dw_ii_firmwarelbp662clbp621ci-sensys_mf742cdw_firmwaremf262dw_ii_firmwarelbp122dw_firmwarelbp661ci-sensys_mf742cdwmf743cdw_firmwarelbp664cdwmf269dw_ii_firmwarei-sensys_mf643cdwmf269dw_vp_iii-sensys_lbp664cx_firmwaremf275dw_firmwarelbp664cmf267dw_iimaxify_gx3020_firmwaremf741cdwlbp623cdwCanon Office/Small Office Multifunction Printers and Laser Printers
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-0852
Matching Score-10
Assigner-Canon Inc.
ShareView Details
Matching Score-10
Assigner-Canon Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.24% / 47.18%
||
7 Day CHG~0.00%
Published-11 May, 2023 | 00:00
Updated-10 Feb, 2025 | 21:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the Address Book of Mobile Device function of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.

Action-Not Available
Vendor-Canon Inc.
Product-i-sensys_x_c1127ii-sensys_mf645cx_firmwaremf741cdw_firmwarei-sensys_x_c1127pmf745cdwimageprograf_tc-20mi-sensys_mf746cx_firmwaremf273dw_firmwarei-sensys_mf641cw_firmwaremf641cwimageprograf_tc-20m_firmwaremf1127c_firmwarei-sensys_mf641cwi-sensys_lbp623cdwlbp1127cmf275dwlbp621c_firmwaremaxify_gx4020lbp122dwmf262dw_iilbp622cdw_firmwarei-sensys_lbp623cdw_firmwaremf743cdwlbp661c_firmwaremaxify_gx3020mf746cdwmf644cdw_firmwaremf267dw_ii_firmwarelbp1127c_firmwaremf1127clbp622c_firmwaremf269dw_iimf745cdw_firmwarei-sensys_mf746cximageprograf_tc-20_firmwarei-sensys_mf744cdwmf269dw_vp_ii_firmwarelbp662c_firmwaremf642cdw_firmwaremf746cdw_firmwarei-sensys_x_c1127p_firmwaremf273dwi-sensys_x_c1127i_firmwareimageprograf_tc-20i-sensys_lbp621cwi-sensys_x_c1127ifi-sensys_x_c1127if_firmwaremf272dw_firmwaremf644cdwi-sensys_lbp664cxlbp664cdw_firmwarepixma_g4270pixma_g3270i-sensys_mf645cxi-sensys_lbp633cdw_firmwarei-sensys_mf744cdw_firmwarelbp623cdw_firmwarepixma_g4270_firmwarelbp622cpixma_g3270_firmwarei-sensys_mf643cdw_firmwaremaxify_gx4020_firmwarei-sensys_lbp621cw_firmwaremf272dwmf641cw_firmwarelbp622cdwlbp664c_firmwarei-sensys_lbp633cdwmf264dw_iimf642cdwmf264dw_ii_firmwarelbp662clbp621ci-sensys_mf742cdw_firmwaremf262dw_ii_firmwarelbp122dw_firmwarelbp661ci-sensys_mf742cdwmf743cdw_firmwarelbp664cdwmf269dw_ii_firmwarei-sensys_mf643cdwmf269dw_vp_iii-sensys_lbp664cx_firmwaremf275dw_firmwarelbp664cmf267dw_iimaxify_gx3020_firmwaremf741cdwlbp623cdwCanon Office/Small Office Multifunction Printers and Laser Printers
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-0854
Matching Score-10
Assigner-Canon Inc.
ShareView Details
Matching Score-10
Assigner-Canon Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.17% / 38.51%
||
7 Day CHG~0.00%
Published-11 May, 2023 | 00:00
Updated-10 Feb, 2025 | 20:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in NetBIOS QNAME registering and communication process of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.

Action-Not Available
Vendor-Canon Inc.
Product-i-sensys_x_c1127ii-sensys_mf645cx_firmwaremf741cdw_firmwarei-sensys_x_c1127pmf745cdwimageprograf_tc-20mi-sensys_mf746cx_firmwaremf273dw_firmwarei-sensys_mf641cw_firmwaremf641cwimageprograf_tc-20m_firmwaremf1127c_firmwarei-sensys_mf641cwi-sensys_lbp623cdwlbp1127cmf275dwlbp621c_firmwaremaxify_gx4020lbp122dwmf262dw_iilbp622cdw_firmwarei-sensys_lbp623cdw_firmwaremf743cdwlbp661c_firmwaremaxify_gx3020mf746cdwmf644cdw_firmwaremf267dw_ii_firmwarelbp1127c_firmwaremf1127clbp622c_firmwaremf269dw_iimf745cdw_firmwarei-sensys_mf746cximageprograf_tc-20_firmwarei-sensys_mf744cdwmf269dw_vp_ii_firmwarelbp662c_firmwaremf642cdw_firmwaremf746cdw_firmwarei-sensys_x_c1127p_firmwaremf273dwi-sensys_x_c1127i_firmwareimageprograf_tc-20i-sensys_lbp621cwi-sensys_x_c1127ifi-sensys_x_c1127if_firmwaremf272dw_firmwaremf644cdwi-sensys_lbp664cxlbp664cdw_firmwarepixma_g4270pixma_g3270i-sensys_mf645cxi-sensys_lbp633cdw_firmwarei-sensys_mf744cdw_firmwarelbp623cdw_firmwarepixma_g4270_firmwarelbp622cpixma_g3270_firmwarei-sensys_mf643cdw_firmwaremaxify_gx4020_firmwarei-sensys_lbp621cw_firmwaremf272dwmf641cw_firmwarelbp622cdwlbp664c_firmwarei-sensys_lbp633cdwmf264dw_iimf642cdwmf264dw_ii_firmwarelbp662clbp621ci-sensys_mf742cdw_firmwaremf262dw_ii_firmwarelbp122dw_firmwarelbp661ci-sensys_mf742cdwmf743cdw_firmwarelbp664cdwmf269dw_ii_firmwarei-sensys_mf643cdwmf269dw_vp_iii-sensys_lbp664cx_firmwaremf275dw_firmwarelbp664cmf267dw_iimaxify_gx3020_firmwaremf741cdwlbp623cdwCanon Office/Small Office Multifunction Printers and Laser Printers
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-0853
Matching Score-10
Assigner-Canon Inc.
ShareView Details
Matching Score-10
Assigner-Canon Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.24% / 47.18%
||
7 Day CHG~0.00%
Published-11 May, 2023 | 00:00
Updated-10 Feb, 2025 | 20:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in mDNS NSEC record registering process of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.

Action-Not Available
Vendor-Canon Inc.
Product-i-sensys_x_c1127ii-sensys_mf645cx_firmwaremf741cdw_firmwarei-sensys_x_c1127pmf745cdwimageprograf_tc-20mi-sensys_mf746cx_firmwaremf273dw_firmwarei-sensys_mf641cw_firmwaremf641cwimageprograf_tc-20m_firmwaremf1127c_firmwarei-sensys_mf641cwi-sensys_lbp623cdwlbp1127cmf275dwlbp621c_firmwaremaxify_gx4020lbp122dwmf262dw_iilbp622cdw_firmwarei-sensys_lbp623cdw_firmwaremf743cdwlbp661c_firmwaremaxify_gx3020mf746cdwmf644cdw_firmwaremf267dw_ii_firmwarelbp1127c_firmwaremf1127clbp622c_firmwaremf269dw_iimf745cdw_firmwarei-sensys_mf746cximageprograf_tc-20_firmwarei-sensys_mf744cdwmf269dw_vp_ii_firmwarelbp662c_firmwaremf642cdw_firmwaremf746cdw_firmwarei-sensys_x_c1127p_firmwaremf273dwi-sensys_x_c1127i_firmwareimageprograf_tc-20i-sensys_lbp621cwi-sensys_x_c1127ifi-sensys_x_c1127if_firmwaremf272dw_firmwaremf644cdwi-sensys_lbp664cxlbp664cdw_firmwarepixma_g4270pixma_g3270i-sensys_mf645cxi-sensys_lbp633cdw_firmwarei-sensys_mf744cdw_firmwarelbp623cdw_firmwarepixma_g4270_firmwarelbp622cpixma_g3270_firmwarei-sensys_mf643cdw_firmwaremaxify_gx4020_firmwarei-sensys_lbp621cw_firmwaremf272dwmf641cw_firmwarelbp622cdwlbp664c_firmwarei-sensys_lbp633cdwmf264dw_iimf642cdwmf264dw_ii_firmwarelbp662clbp621ci-sensys_mf742cdw_firmwaremf262dw_ii_firmwarelbp122dw_firmwarelbp661ci-sensys_mf742cdwmf743cdw_firmwarelbp664cdwmf269dw_ii_firmwarei-sensys_mf643cdwmf269dw_vp_iii-sensys_lbp664cx_firmwaremf275dw_firmwarelbp664cmf267dw_iimaxify_gx3020_firmwaremf741cdwlbp623cdwCanon Office/Small Office Multifunction Printers and Laser Printers
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-0855
Matching Score-10
Assigner-Canon Inc.
ShareView Details
Matching Score-10
Assigner-Canon Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.17% / 38.51%
||
7 Day CHG~0.00%
Published-11 May, 2023 | 00:00
Updated-10 Feb, 2025 | 20:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in IPP number-up attribute process of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.

Action-Not Available
Vendor-Canon Inc.
Product-i-sensys_x_c1127ii-sensys_mf645cx_firmwaremf741cdw_firmwarei-sensys_x_c1127pmf745cdwimageprograf_tc-20mi-sensys_mf746cx_firmwaremf273dw_firmwarei-sensys_mf641cw_firmwaremf641cwimageprograf_tc-20m_firmwaremf1127c_firmwarei-sensys_mf641cwi-sensys_lbp623cdwlbp1127cmf275dwlbp621c_firmwaremaxify_gx4020lbp122dwmf262dw_iilbp622cdw_firmwarei-sensys_lbp623cdw_firmwaremf743cdwlbp661c_firmwaremaxify_gx3020mf746cdwmf644cdw_firmwaremf267dw_ii_firmwarelbp1127c_firmwaremf1127clbp622c_firmwaremf269dw_iimf745cdw_firmwarei-sensys_mf746cximageprograf_tc-20_firmwarei-sensys_mf744cdwmf269dw_vp_ii_firmwarelbp662c_firmwaremf642cdw_firmwaremf746cdw_firmwarei-sensys_x_c1127p_firmwaremf273dwi-sensys_x_c1127i_firmwareimageprograf_tc-20i-sensys_lbp621cwi-sensys_x_c1127ifi-sensys_x_c1127if_firmwaremf272dw_firmwaremf644cdwi-sensys_lbp664cxlbp664cdw_firmwarepixma_g4270pixma_g3270i-sensys_mf645cxi-sensys_lbp633cdw_firmwarei-sensys_mf744cdw_firmwarelbp623cdw_firmwarepixma_g4270_firmwarelbp622cpixma_g3270_firmwarei-sensys_mf643cdw_firmwaremaxify_gx4020_firmwarei-sensys_lbp621cw_firmwaremf272dwmf641cw_firmwarelbp622cdwlbp664c_firmwarei-sensys_lbp633cdwmf264dw_iimf642cdwmf264dw_ii_firmwarelbp662clbp621ci-sensys_mf742cdw_firmwaremf262dw_ii_firmwarelbp122dw_firmwarelbp661ci-sensys_mf742cdwmf743cdw_firmwarelbp664cdwmf269dw_ii_firmwarei-sensys_mf643cdwmf269dw_vp_iii-sensys_lbp664cx_firmwaremf275dw_firmwarelbp664cmf267dw_iimaxify_gx3020_firmwaremf741cdwlbp623cdwCanon Office/Small Office Multifunction Printers and Laser Printers
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-0856
Matching Score-10
Assigner-Canon Inc.
ShareView Details
Matching Score-10
Assigner-Canon Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.17% / 38.51%
||
7 Day CHG~0.00%
Published-11 May, 2023 | 00:00
Updated-10 Feb, 2025 | 21:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in IPP sides attribute process of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.

Action-Not Available
Vendor-Canon Inc.
Product-i-sensys_x_c1127ii-sensys_mf645cx_firmwaremf741cdw_firmwarei-sensys_x_c1127pmf745cdwimageprograf_tc-20mi-sensys_mf746cx_firmwaremf273dw_firmwarei-sensys_mf641cw_firmwaremf641cwimageprograf_tc-20m_firmwaremf1127c_firmwarei-sensys_mf641cwi-sensys_lbp623cdwlbp1127cmf275dwlbp621c_firmwaremaxify_gx4020lbp122dwmf262dw_iilbp622cdw_firmwarei-sensys_lbp623cdw_firmwaremf743cdwlbp661c_firmwaremaxify_gx3020mf746cdwmf644cdw_firmwaremf267dw_ii_firmwarelbp1127c_firmwaremf1127clbp622c_firmwaremf269dw_iimf745cdw_firmwarei-sensys_mf746cximageprograf_tc-20_firmwarei-sensys_mf744cdwmf269dw_vp_ii_firmwarelbp662c_firmwaremf642cdw_firmwaremf746cdw_firmwarei-sensys_x_c1127p_firmwaremf273dwi-sensys_x_c1127i_firmwareimageprograf_tc-20i-sensys_lbp621cwi-sensys_x_c1127ifi-sensys_x_c1127if_firmwaremf272dw_firmwaremf644cdwi-sensys_lbp664cxlbp664cdw_firmwarepixma_g4270pixma_g3270i-sensys_mf645cxi-sensys_lbp633cdw_firmwarei-sensys_mf744cdw_firmwarelbp623cdw_firmwarepixma_g4270_firmwarelbp622cpixma_g3270_firmwarei-sensys_mf643cdw_firmwaremaxify_gx4020_firmwarei-sensys_lbp621cw_firmwaremf272dwmf641cw_firmwarelbp622cdwlbp664c_firmwarei-sensys_lbp633cdwmf264dw_iimf642cdwmf264dw_ii_firmwarelbp662clbp621ci-sensys_mf742cdw_firmwaremf262dw_ii_firmwarelbp122dw_firmwarelbp661ci-sensys_mf742cdwmf743cdw_firmwarelbp664cdwmf269dw_ii_firmwarei-sensys_mf643cdwmf269dw_vp_iii-sensys_lbp664cx_firmwaremf275dw_firmwarelbp664cmf267dw_iimaxify_gx3020_firmwaremf741cdwlbp623cdwCanon Office/Small Office Multifunction Printers and Laser Printers
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-2184
Matching Score-10
Assigner-Canon Inc.
ShareView Details
Matching Score-10
Assigner-Canon Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.17% / 39.02%
||
7 Day CHG~0.00%
Published-11 Mar, 2024 | 00:26
Updated-28 Aug, 2024 | 20:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in identifier field of WSD probe request process of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*:Satera MF740C Series/Satera MF640C Series/Satera LBP660C Series/Satera LBP620C Series firmware v12.07 and earlier, and Satera MF750C Series/Satera LBP670C Series firmware v03.09 and earlier sold in Japan.Color imageCLASS MF740C Series/Color imageCLASS MF640C Series/Color imageCLASS X MF1127C/Color imageCLASS LBP664Cdw/Color imageCLASS LBP622Cdw/Color imageCLASS X LBP1127C firmware v12.07 and earlier, and Color imageCLASS MF750C Series/Color imageCLASS X MF1333C/Color imageCLASS LBP674Cdw/Color imageCLASS X LBP1333C firmware v03.09 and earlier sold in US.i-SENSYS MF740C Series/i-SENSYS MF640C Series/C1127i Series/i-SENSYS LBP660C Series/i-SENSYS LBP620C Series/C1127P firmware v12.07 and earlier, and i-SENSYS MF750C Series/C1333i Series/i-SENSYS LBP673Cdw/C1333P firmware v03.09 and earlier sold in Europe.

Action-Not Available
Vendor-Canon Inc.
Product-Satera LBP660C Seriesi-SENSYS MF740C SeriesC1127i SeriesSatera LBP620C Seriesi-SENSYS MF750C SeriesColor imageCLASS MF640C Seriesi-SENSYS MF640C SeriesSatera MF740C Seriesi-SENSYS LBP673CdwC1333i SeriesColor imageCLASS MF740C Seriesi-SENSYS LBP620C SeriesColor imageCLASS LBP664CdwColor imageCLASS MF750C SeriesSatera MF640C SeriesColor imageCLASS X LBP1127CColor imageCLASS X MF1333CC1127PC1333PColor imageCLASS X MF1127CSatera LBP670C SeriesColor imageCLASS X LBP1333CColor imageCLASS LBP622Cdwi-SENSYS LBP660C SeriesColor imageCLASS LBP674CdwSatera MF750C Seriesc1127i_seriesi-sensys_mf750c_seriesc1333i_seriesi-sensys_mf640c_seriessatera_lbp670c_seriescolor_imageclass_lbp622cdwsatera_mf740c_seriescolor_imageclass_x_lbp1127ccolor_imageclass_mf750c_seriescolor_imageclass_mf640c_seriesc1127pcolor_imageclass_x_mf1333csatera_mf640c_seriesi-sensys_lbp660c_seriescolor_imageclass_x_lbp1333ci-sensys_lbp673cdwsatera_mf750c_seriescolor_imageclass_lbp664cdwsatera_lbp660c_seriessatera_lbp620c_seriesi-sensys_lbp620c_seriescolor_imageclass_mf740c_seriescolor_imageclass_x_mf1127ccolor_imageclass_lbp674cdwc1333pi-sensys_mf740c_series
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-12648
Matching Score-10
Assigner-Canon Inc.
ShareView Details
Matching Score-10
Assigner-Canon Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.12% / 32.43%
||
7 Day CHG+0.03%
Published-28 Jan, 2025 | 00:39
Updated-28 Jan, 2025 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in TIFF data EXIF tag processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw firmware v05.04 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw firmware v05.04 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw firmware v05.04 and earlier sold in Europe.

Action-Not Available
Vendor-Canon Inc.
Product-Satera MF654Cdwi-SENSYS LBP633Cdwi-SENSYS MF655CdwColor imageCLASS MF656Cdwi-SENSYS MF657CdwSatera MF656CdwColor imageCLASS LBP632Cdwi-SENSYS LBP631CdwColor imageCLASS LBP633CdwColor imageCLASS MF654CdwColor imageCLASS MF653Cdwi-SENSYS MF651CdwColor imageCLASS MF652Cdw
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-12647
Matching Score-10
Assigner-Canon Inc.
ShareView Details
Matching Score-10
Assigner-Canon Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.12% / 32.43%
||
7 Day CHG+0.03%
Published-28 Jan, 2025 | 00:38
Updated-28 Jan, 2025 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in CPCA font download processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw firmware v05.04 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw firmware v05.04 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw firmware v05.04 and earlier sold in Europe.

Action-Not Available
Vendor-Canon Inc.
Product-Satera MF654Cdwi-SENSYS LBP633Cdwi-SENSYS MF655CdwColor imageCLASS MF656Cdwi-SENSYS MF657CdwSatera MF656CdwColor imageCLASS LBP632Cdwi-SENSYS LBP631CdwColor imageCLASS LBP633CdwColor imageCLASS MF654CdwColor imageCLASS MF653Cdwi-SENSYS MF651CdwColor imageCLASS MF652Cdw
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-6234
Matching Score-10
Assigner-Canon Inc.
ShareView Details
Matching Score-10
Assigner-Canon Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.45% / 62.53%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 00:23
Updated-02 Aug, 2024 | 08:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in CPCA Color LUT Resource Download process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.

Action-Not Available
Vendor-Canon Inc.
Product-i-sensys_mf754cdw_firmwaremf751cdwmf273dw_firmwarelbp671cmf1238_iilbp672c_firmwaremf1643i_ii_firmwarei-sensys_x_c1333i_firmwaremf1333clbp236dw_firmwaremf275dwi-sensys_x_c1333p_firmwarelbp122dwi-sensys_x_c1333imf1643if_iimf272dwlbp671c_firmwaremf451dw_firmwarelbp674cdwlbp672ci-sensys_mf754cdwmf1333c_firmwaremf753cdwi-sensys_x_c1333if_firmwarei-sensys_mf752cdwi-sensys_x_c1333pmf453dwmf452dwmf455dw_firmwarelbp1333c_firmwarelbp122dw_firmwarelbp674c_firmwaremf455dwmf755cdw_firmwaremf452dw_firmwaremf451dwlbp237dw_firmwaremf753cdw_firmwarelbp674cdw_firmwarei-sensys_x_c1333ifi-sensys_lbp673cdw_firmwarei-sensys_lbp673cdwmf273dwlbp1238_iimf275dw_firmwarelbp1238_ii_firmwarelbp1333cmf755cdwmf453dw_firmwaremf1238_ii_firmwarelbp236dwi-sensys_mf752cdw_firmwaremf751cdw_firmwaremf272dw_firmwarelbp674cmf1643if_ii_firmwarelbp237dwmf1643i_iiColor imageCLASS LBP674CColor imageCLASS MF750C SeriesColor imageCLASS X MF1333C Seriesi-SENSYS MF750C Seriesi-SENSYS LBP673CdwC1333PSatera LBP670C SeriesColor imageCLASS X LBP1333CC1333i SeriesSatera MF750C Seriesmf750ci-sensys_lbp673cdwi-sensys_x_c1333plbp1333clbp674cmf1333c
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-6232
Matching Score-10
Assigner-Canon Inc.
ShareView Details
Matching Score-10
Assigner-Canon Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.43% / 61.78%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 00:22
Updated-17 Jun, 2025 | 21:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the Address Book username process in authentication of Mobile Device Function of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.

Action-Not Available
Vendor-Canon Inc.
Product-i-sensys_mf754cdw_firmwaremf751cdwmf273dw_firmwarelbp671cmf1238_iilbp672c_firmwaremf1643i_ii_firmwarei-sensys_x_c1333i_firmwaremf1333clbp236dw_firmwaremf275dwi-sensys_x_c1333p_firmwarelbp122dwi-sensys_x_c1333imf1643if_iimf272dwlbp671c_firmwaremf451dw_firmwarelbp674cdwlbp672ci-sensys_mf754cdwmf1333c_firmwaremf753cdwi-sensys_x_c1333if_firmwarei-sensys_mf752cdwi-sensys_x_c1333pmf453dwmf452dwmf455dw_firmwarelbp1333c_firmwarelbp122dw_firmwarelbp674c_firmwaremf455dwmf755cdw_firmwaremf452dw_firmwaremf451dwlbp237dw_firmwaremf753cdw_firmwarelbp674cdw_firmwarei-sensys_x_c1333ifi-sensys_lbp673cdw_firmwarei-sensys_lbp673cdwmf273dwlbp1238_iimf275dw_firmwarelbp1238_ii_firmwarelbp1333cmf755cdwmf453dw_firmwaremf1238_ii_firmwarelbp236dwi-sensys_mf752cdw_firmwaremf751cdw_firmwaremf272dw_firmwarelbp674cmf1643if_ii_firmwarelbp237dwmf1643i_iiSatera LBP670C SeriesColor imageCLASS MF750C SeriesC1333i SeriesColor imageCLASS LBP674CColor imageCLASS X MF1333C SeriesSatera MF750C Seriesi-SENSYS LBP673Cdwi-SENSYS MF750C SeriesColor imageCLASS X LBP1333CC1333P
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-6231
Matching Score-10
Assigner-Canon Inc.
ShareView Details
Matching Score-10
Assigner-Canon Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.37% / 58.23%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 00:22
Updated-17 Jun, 2025 | 21:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in WSD probe request process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.

Action-Not Available
Vendor-Canon Inc.
Product-i-sensys_mf754cdw_firmwaremf751cdwmf273dw_firmwarelbp671cmf1238_iilbp672c_firmwaremf1643i_ii_firmwarei-sensys_x_c1333i_firmwaremf1333clbp236dw_firmwaremf275dwi-sensys_x_c1333p_firmwarelbp122dwi-sensys_x_c1333imf1643if_iimf272dwlbp671c_firmwaremf451dw_firmwarelbp674cdwlbp672ci-sensys_mf754cdwmf1333c_firmwaremf753cdwi-sensys_x_c1333if_firmwarei-sensys_mf752cdwi-sensys_x_c1333pmf453dwmf452dwmf455dw_firmwarelbp1333c_firmwarelbp122dw_firmwarelbp674c_firmwaremf455dwmf755cdw_firmwaremf452dw_firmwaremf451dwlbp237dw_firmwaremf753cdw_firmwarelbp674cdw_firmwarei-sensys_x_c1333ifi-sensys_lbp673cdw_firmwarei-sensys_lbp673cdwmf273dwlbp1238_iimf275dw_firmwarelbp1238_ii_firmwarelbp1333cmf755cdwmf453dw_firmwaremf1238_ii_firmwarelbp236dwi-sensys_mf752cdw_firmwaremf751cdw_firmwaremf272dw_firmwarelbp674cmf1643if_ii_firmwarelbp237dwmf1643i_iiSatera LBP670C SeriesColor imageCLASS MF750C SeriesC1333i SeriesColor imageCLASS LBP674CColor imageCLASS X MF1333C SeriesSatera MF750C Seriesi-SENSYS LBP673Cdwi-SENSYS MF750C SeriesColor imageCLASS X LBP1333CC1333P
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-6230
Matching Score-10
Assigner-Canon Inc.
ShareView Details
Matching Score-10
Assigner-Canon Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.43% / 61.78%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 00:21
Updated-17 Jun, 2025 | 21:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the Address Book password process in authentication of Mobile Device Function of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.

Action-Not Available
Vendor-Canon Inc.
Product-i-sensys_mf754cdw_firmwaremf751cdwmf273dw_firmwarelbp671cmf1238_iilbp672c_firmwaremf1643i_ii_firmwarei-sensys_x_c1333i_firmwaremf1333clbp236dw_firmwaremf275dwi-sensys_x_c1333p_firmwarelbp122dwi-sensys_x_c1333imf1643if_iimf272dwlbp671c_firmwaremf451dw_firmwarelbp674cdwlbp672ci-sensys_mf754cdwmf1333c_firmwaremf753cdwi-sensys_x_c1333if_firmwarei-sensys_mf752cdwi-sensys_x_c1333pmf453dwmf452dwmf455dw_firmwarelbp1333c_firmwarelbp122dw_firmwarelbp674c_firmwaremf455dwmf755cdw_firmwaremf452dw_firmwaremf451dwlbp237dw_firmwaremf753cdw_firmwarelbp674cdw_firmwarei-sensys_x_c1333ifi-sensys_lbp673cdw_firmwarei-sensys_lbp673cdwmf273dwlbp1238_iimf275dw_firmwarelbp1238_ii_firmwarelbp1333cmf755cdwmf453dw_firmwaremf1238_ii_firmwarelbp236dwi-sensys_mf752cdw_firmwaremf751cdw_firmwaremf272dw_firmwarelbp674cmf1643if_ii_firmwarelbp237dwmf1643i_iiSatera LBP670C SeriesColor imageCLASS MF750C SeriesC1333i SeriesColor imageCLASS LBP674CColor imageCLASS X MF1333C SeriesSatera MF750C Seriesi-SENSYS LBP673Cdwi-SENSYS MF750C SeriesColor imageCLASS X LBP1333CC1333P
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-6229
Matching Score-10
Assigner-Canon Inc.
ShareView Details
Matching Score-10
Assigner-Canon Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.45% / 62.53%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 00:20
Updated-17 Jun, 2025 | 21:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in CPCA PDL Resource Download process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.

Action-Not Available
Vendor-Canon Inc.
Product-i-sensys_mf754cdw_firmwaremf751cdwmf273dw_firmwarelbp671cmf1238_iilbp672c_firmwaremf1643i_ii_firmwarei-sensys_x_c1333i_firmwaremf1333clbp236dw_firmwaremf275dwi-sensys_x_c1333p_firmwarelbp122dwi-sensys_x_c1333imf1643if_iimf272dwlbp671c_firmwaremf451dw_firmwarelbp674cdwlbp672ci-sensys_mf754cdwmf1333c_firmwaremf753cdwi-sensys_x_c1333if_firmwarei-sensys_mf752cdwi-sensys_x_c1333pmf453dwmf452dwmf455dw_firmwarelbp1333c_firmwarelbp122dw_firmwarelbp674c_firmwaremf455dwmf755cdw_firmwaremf452dw_firmwaremf451dwlbp237dw_firmwaremf753cdw_firmwarelbp674cdw_firmwarei-sensys_x_c1333ifi-sensys_lbp673cdw_firmwarei-sensys_lbp673cdwmf273dwlbp1238_iimf275dw_firmwarelbp1238_ii_firmwarelbp1333cmf755cdwmf453dw_firmwaremf1238_ii_firmwarelbp236dwi-sensys_mf752cdw_firmwaremf751cdw_firmwaremf272dw_firmwarelbp674cmf1643if_ii_firmwarelbp237dwmf1643i_iiSatera LBP670C SeriesColor imageCLASS MF750C SeriesC1333i SeriesColor imageCLASS LBP674CColor imageCLASS X MF1333C SeriesSatera MF750C Seriesi-SENSYS LBP673Cdwi-SENSYS MF750C SeriesColor imageCLASS X LBP1333CC1333P
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-6233
Matching Score-10
Assigner-Canon Inc.
ShareView Details
Matching Score-10
Assigner-Canon Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.37% / 58.23%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 00:23
Updated-17 Jun, 2025 | 21:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in SLP attribute request process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.

Action-Not Available
Vendor-Canon Inc.
Product-i-sensys_mf754cdw_firmwaremf751cdwmf273dw_firmwarelbp671cmf1238_iilbp672c_firmwaremf1643i_ii_firmwarei-sensys_x_c1333i_firmwaremf1333clbp236dw_firmwaremf275dwi-sensys_x_c1333p_firmwarelbp122dwi-sensys_x_c1333imf1643if_iimf272dwlbp671c_firmwaremf451dw_firmwarelbp674cdwlbp672ci-sensys_mf754cdwmf1333c_firmwaremf753cdwi-sensys_x_c1333if_firmwarei-sensys_mf752cdwi-sensys_x_c1333pmf453dwmf452dwmf455dw_firmwarelbp1333c_firmwarelbp122dw_firmwarelbp674c_firmwaremf455dwmf755cdw_firmwaremf452dw_firmwaremf451dwlbp237dw_firmwaremf753cdw_firmwarelbp674cdw_firmwarei-sensys_x_c1333ifi-sensys_lbp673cdw_firmwarei-sensys_lbp673cdwmf273dwlbp1238_iimf275dw_firmwarelbp1238_ii_firmwarelbp1333cmf755cdwmf453dw_firmwaremf1238_ii_firmwarelbp236dwi-sensys_mf752cdw_firmwaremf751cdw_firmwaremf272dw_firmwarelbp674cmf1643if_ii_firmwarelbp237dwmf1643i_iiSatera LBP670C SeriesColor imageCLASS MF750C SeriesC1333i SeriesColor imageCLASS LBP674CColor imageCLASS X MF1333C SeriesSatera MF750C Seriesi-SENSYS LBP673Cdwi-SENSYS MF750C SeriesColor imageCLASS X LBP1333CC1333P
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-2146
Matching Score-10
Assigner-Canon Inc.
ShareView Details
Matching Score-10
Assigner-Canon Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.18% / 39.87%
||
7 Day CHG~0.00%
Published-25 May, 2025 | 23:36
Updated-03 Jun, 2025 | 15:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in WebService Authentication processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw/Satera MF551dw/Satera MF457dw firmware v05.07 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw/imageCLASS MF455dw/imageCLASS MF453dw/imageCLASS MF452dw/imageCLASS MF451dw/imageCLASS LBP237dw/imageCLASS LBP236dw/imageCLASS X MF1238 II/imageCLASS X MF1643i II/imageCLASS X MF1643iF II/imageCLASS X LBP1238 II firmware v05.07 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw/i-SENSYS MF553dw/i-SENSYS MF552dw/i-SENSYS MF455dw/i-SENSYS MF453dw/i-SENSYS LBP236dw/i-SENSYS LBP233dw/imageRUNNER 1643iF II/imageRUNNER 1643i II/i-SENSYS X 1238iF II/i-SENSYS X 1238i II/i-SENSYS X 1238P II/i-SENSYS X 1238Pr II firmware v05.07 and earlier sold in Europe.

Action-Not Available
Vendor-Canon Inc.
Product-imageclass_mf653cdw_firmwareimagerunner_1643if_iiimageclass_mf656cdw_firmwarei-sensys_lbp233dw_firmwarei-sensys_mf453dwsatera_mf457dwi-sensys_mf655cdw_firmwarei-sensys_lbp233dwi-sensys_mf657cdw_firmwarei-sensys_x_1238pr_ii_firmwareimageclass_mf455dw_firmwarei-sensys_lbp631cdw_firmwareimageclass_mf451dw_firmwarei-sensys_mf651cdw_firmwarei-sensys_mf552dw_firmwareimageclass_mf452dw_firmwarei-sensys_mf455dw_firmwareimageclass_x_mf1643i_iiimageclass_mf455dwsatera_mf551dwi-sensys_x_1238p_iiimageclass_mf653cdwi-sensys_lbp236dw_firmwarei-sensys_mf455dwimageclass_x_lbp1238_iiimageclass_lbp632cdw_firmwaresatera_mf656cdw_firmwareimageclass_mf652cdw_firmwareimageclass_mf451dwimageclass_lbp236dwimageclass_mf452dwi-sensys_x_1238pr_iiimageclass_x_mf1643if_iii-sensys_lbp633cdw_firmwareimageclass_lbp237dw_firmwareimagerunner_1643if_ii_firmwarei-sensys_mf657cdwi-sensys_lbp236dwi-sensys_x_1238p_ii_firmwareimageclass_mf453dw_firmwarei-sensys_mf651cdwi-sensys_mf453dw_firmwarei-sensys_x_1238if_iii-sensys_lbp631cdwsatera_mf551dw_firmwareimageclass_x_mf1238_iisatera_mf654cdwimagerunner_1643i_iiimageclass_mf652cdwi-sensys_mf553dw_firmwareimageclass_mf656cdwi-sensys_lbp633cdwimagerunner_1643i_ii_firmwarei-sensys_x_1238i_ii_firmwareimageclass_x_mf1238_ii_firmwareimageclass_lbp237dwimageclass_x_mf1643i_ii_firmwareimageclass_mf654cdw_firmwareimageclass_mf654cdwi-sensys_mf553dwi-sensys_x_1238if_ii_firmwaresatera_mf654cdw_firmwarei-sensys_x_1238i_iiimageclass_mf453dwimageclass_lbp633cdwimageclass_x_lbp1238_ii_firmwareimageclass_lbp633cdw_firmwaresatera_mf656cdwimageclass_x_mf1643if_ii_firmwaresatera_mf457dw_firmwareimageclass_lbp236dw_firmwareimageclass_lbp632cdwi-sensys_mf655cdwi-sensys_mf552dwimageCLASS MF453dwSatera MF457dwimageCLASS MF455dwi-SENSYS MF655Cdwi-SENSYS MF455dwi-SENSYS X 1238P IIimageCLASS X MF1643i IIimageCLASS X MF1643iF IIi-SENSYS MF453dwColor imageCLASS MF656CdwimageCLASS X MF1238 IIi-SENSYS X 1238iF IIimageCLASS MF451dwColor imageCLASS MF654Cdwi-SENSYS MF651Cdwi-SENSYS MF553dwi-SENSYS MF552dwimageCLASS LBP237dwColor imageCLASS MF653CdwimageRUNNER 1643iF IIi-SENSYS LBP233dwColor imageCLASS LBP633Cdwi-SENSYS X 1238Pr IIColor imageCLASS MF652Cdwi-SENSYS X 1238i IIColor imageCLASS LBP632Cdwi-SENSYS LBP633CdwimageCLASS MF452dwi-SENSYS LBP236dwSatera MF551dwi-SENSYS MF657CdwSatera MF656CdwimageCLASS LBP236dwSatera MF654CdwimageCLASS X LBP1238 IIi-SENSYS LBP631CdwimageRUNNER 1643i II
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-0244
Matching Score-10
Assigner-Canon Inc.
ShareView Details
Matching Score-10
Assigner-Canon Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.58% / 67.96%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 00:24
Updated-17 Jun, 2025 | 21:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in CPCA PCFAX number process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*:Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS MF750C Series/Color imageCLASS X MF1333C firmware v03.07 and earlier sold in US. i-SENSYS MF754Cdw/C1333iF firmware v03.07 and earlier sold in Europe.

Action-Not Available
Vendor-Canon Inc.
Product-i-sensys_mf754cdw_firmwaremf751cdwlbp1333c_firmwarelbp1333cmf755cdwi-sensys_mf754cdwmf1333c_firmwaremf751cdw_firmwarei-sensys_x_c1333ifmf755cdw_firmwaremf753cdwmf753cdw_firmwarei-sensys_x_c1333if_firmwaremf1333cColor imageCLASS MF750C SeriesC1333iFSatera MF750C Seriesi-SENSYS MF754CdwColor imageCLASS X MF1333C
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-1268
Matching Score-6
Assigner-Canon Inc.
ShareView Details
Matching Score-6
Assigner-Canon Inc.
CVSS Score-9.4||CRITICAL
EPSS-0.11% / 29.50%
||
7 Day CHG~0.00%
Published-31 Mar, 2025 | 00:52
Updated-16 Jun, 2025 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds vulnerability in EMF Recode processing of Generic Plus PCL6 Printer Driver / Generic Plus UFR II Printer Driver / Generic Plus LIPS4 Printer Driver / Generic Plus LIPSLX Printer Driver / Generic Plus PS Printer Driver / Generic FAX Printer Driver / UFRII LT Printer Driver / CARPS2 Printer Driver / PDF Driver

Action-Not Available
Vendor-Canon Inc.
Product-Generic Plus LIPS4 Printer DriverPDF DriverGeneric FAX Printer DriverCARPS2 Printer DriverGeneric Plus PS Printer DriverUFRII LT Printer DriverGeneric Plus UFR II Printer DriverGeneric Plus PCL6 Printer DriverGeneric Plus LIPSLX Printer Driver
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-0236
Matching Score-6
Assigner-Canon Inc.
ShareView Details
Matching Score-6
Assigner-Canon Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.08% / 23.48%
||
7 Day CHG~0.00%
Published-26 Feb, 2025 | 01:57
Updated-26 Feb, 2025 | 15:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds vulnerability in slope processing during curve rendering in Generic PCL6 V4 Printer Driver / Generic UFR II V4 Printer Driver / Generic LIPSLX V4 Printer Driver.

Action-Not Available
Vendor-Canon Inc.
Product-Generic UFR II V4 Printer DriverGeneric PCL6 V4 Printer DriverGeneric LIPSLX V4 Printer Driver
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-0235
Matching Score-6
Assigner-Canon Inc.
ShareView Details
Matching Score-6
Assigner-Canon Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.08% / 23.48%
||
7 Day CHG~0.00%
Published-26 Feb, 2025 | 01:56
Updated-26 Feb, 2025 | 15:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds vulnerability due to improper memory release during image rendering in Generic PCL6 V4 Printer Driver / Generic UFR II V4 Printer Driver / Generic LIPSLX V4 Printer Driver.

Action-Not Available
Vendor-Canon Inc.
Product-Generic UFR II V4 Printer DriverGeneric PCL6 V4 Printer DriverGeneric LIPSLX V4 Printer Driver
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-0234
Matching Score-6
Assigner-Canon Inc.
ShareView Details
Matching Score-6
Assigner-Canon Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.08% / 23.48%
||
7 Day CHG~0.00%
Published-26 Feb, 2025 | 01:52
Updated-26 Feb, 2025 | 15:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds vulnerability in curve segmentation processing of Generic PCL6 V4 Printer Driver / Generic UFR II V4 Printer Driver / Generic LIPSLX V4 Printer Driver.

Action-Not Available
Vendor-Canon Inc.
Product-Generic UFR II V4 Printer DriverGeneric PCL6 V4 Printer DriverGeneric LIPSLX V4 Printer Driver
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21066
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-9.8||CRITICAL
EPSS-2.78% / 85.49%
||
7 Day CHG~0.00%
Published-28 Jun, 2023 | 00:00
Updated-04 Dec, 2024 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In cd_CodeMsg of cd_codec.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-250100597References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-20954
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-9.8||CRITICAL
EPSS-1.52% / 80.48%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-25 Feb, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In SDP_AddAttribute of sdp_db.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-261867748

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-0160
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-8.7||HIGH
EPSS-0.73% / 71.81%
||
7 Day CHG~0.00%
Published-27 Mar, 2019 | 19:20
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in system firmware for EDK II may allow unauthenticated user to potentially enable escalation of privilege and/or denial of service via network access.

Action-Not Available
Vendor-tianocoren/aRed Hat, Inc.openSUSEFedora Project
Product-enterprise_linux_serverenterprise_linux_server_ausenterprise_linuxfedoraedk_iienterprise_linux_eusenterprise_linux_server_tusleapExtensible Firmware Interface Development Kit (EDK II)
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9578
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-9.8||CRITICAL
EPSS-0.65% / 69.76%
||
7 Day CHG~0.00%
Published-07 Dec, 2018 | 23:00
Updated-05 Aug, 2024 | 07:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ixheaacd_adts_crc_start_reg of ixheaacd_adts_crc_check.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-113261928.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-20819
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-6.7||MEDIUM
EPSS-2.19% / 83.72%
||
7 Day CHG~0.00%
Published-02 Oct, 2023 | 02:05
Updated-21 Sep, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In CDMA PPP protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: MOLY01068234; Issue ID: ALPS08010003.

Action-Not Available
Vendor-MediaTek Inc.
Product-mt6896mt6855mt6879nr17mt6893mt6886mt6580mt6750mt8791tmt6983mt6783mt8666mt6878mt6765mt6595mt6891mt6737nr16mt6883mt8768tmt6739mt2731mt8768mt6797mt6769mt6761mt6875mt6889mt8781mt6985mt6732mt6885mt6735mt6753mt6877mt8788tmt6853mt8667mt6875tlr13mt6762dmt8791mt6897mt6785lr12amt6873mt8765mt8675mt8768amt6799mt8788mt8788xlr11mt6769tmt6762mmt8666amt6813mt6835mt6757mt8797mt6737mmt8766zmt6768mt8768zmt8788zmt6765tmt8786mt8766mt8768bmt6755mt6771mt6758mt6833mt6785tmt8673mt6989mt6750smt6762mt6795mt6738nr15mt6781mt6895mt8798mt6789mt6570mt6769zmt6775mt6752mt6779mt6815mt6767mt6895tmt6763MT2731, MT6570, MT6580, MT6595, MT6732, MT6735, MT6737, MT6737M, MT6738, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6757, MT6758, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT6771, MT6775, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6789, MT6795, MT6797, MT6799, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6983, MT6985, MT6989, MT8666, MT8666A, MT8667, MT8673, MT8675, MT8765, MT8766, MT8766Z, MT8768, MT8768A, MT8768B, MT8768T, MT8768Z, MT8781, MT8786, MT8788, MT8788T, MT8788X, MT8788Z, MT8791, MT8791T, MT8797, MT8798mt6896mt6855mt6879mt6893mt6886mt6580mt6750mt8791tmt6983mt6783mt8666mt6878mt6765mt6595mt6891mt6737mt6883mt8768tmt6739mt2731mt8768mt6797mt6769mt6761mt6875mt6889mt8781mt6985mt6732mt6885mt6735mt6753mt6877mt8788tmt6853mt8667mt6875tmt6762dmt8791mt6897mt6785mt6873mt8765mt8675mt8768amt6799mt8788mt8788xmt6769tmt6762mmt8666amt6813mt6835mt6757mt8797mt6737mmt8766zmt6768mt8768zmt8788zmt6765tmt8786mt8766mt8768bmt6755mt6771mt6758mt6833mt6785tmt8673mt6989mt6750smt6762mt6795mt6738mt6781mt6895mt8798mt6789mt6570mt6769zmt6775mt6752mt6779mt6815mt6767mt6895tmt6763
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-0736
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.8||CRITICAL
EPSS-12.89% / 93.78%
||
7 Day CHG~0.00%
Published-14 Aug, 2019 | 20:55
Updated-04 Aug, 2024 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows DHCP Client Remote Code Execution Vulnerability

A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client. An attacker who successfully exploited the vulnerability could run arbitrary code on the client machine. To exploit the vulnerability, an attacker could send specially crafted DHCP responses to a client. The security update addresses the vulnerability by correcting how Windows DHCP clients handle certain DHCP responses.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2012windows_8.1windows_rt_8.1windows_7windows_10windows_server_2008Windows 10 Version 1607Windows Server 2008 R2 Systems Service Pack 1Windows Server 2008 Service Pack 2Windows Server 2016 (Server Core installation)Windows 8.1Windows Server 2012 (Server Core installation)Windows 7Windows 10 Version 1709Windows Server, version 1803 (Server Core Installation)Windows 7 Service Pack 1Windows Server 2016Windows 10 Version 1507Windows Server 2008 R2 Service Pack 1Windows 10 Version 1803Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)Windows 10 Version 1709 for 32-bit SystemsWindows 10 Version 1703
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9341
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-9.8||CRITICAL
EPSS-0.22% / 44.55%
||
7 Day CHG~0.00%
Published-19 Nov, 2024 | 18:51
Updated-22 Nov, 2024 | 16:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In impeg2d_mc_fullx_fully of impeg2d_mc.c there is a possible out of bound write due to missing bounds check. This could lead to remote arbitrary code execution with no additional execution privileges needed. User interaction is needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-38689
Matching Score-4
Assigner-QNAP Systems, Inc.
ShareView Details
Matching Score-4
Assigner-QNAP Systems, Inc.
CVSS Score-8.1||HIGH
EPSS-1.21% / 78.17%
||
7 Day CHG~0.00%
Published-14 Jan, 2022 | 01:00
Updated-17 Sep, 2024 | 00:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack Overflow Vulnerability in QVR Elite, QVR Pro and QVR Guard

A stack buffer overflow vulnerability has been reported to affect QNAP device running QVR Elite, QVR Pro, QVR Guard. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of QVR Elite, QVR Pro, QVR Guard: QuTS hero h5.0.0: QVR Elite 2.1.4.0 (2021/12/06) and later QuTS hero h4.5.4: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 5.0.0: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 4.5.4: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 4.5.4: QVR Pro 2.1.3.0 (2021/12/06) and later QTS 5.0.0: QVR Pro 2.1.3.0 (2021/12/06) and later QTS 4.5.4: QVR Guard 2.1.3.0 (2021/12/06) and later QTS 5.0.0: QVR Guard 2.1.3.0 (2021/12/06) and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-qvr_guardqvr_eliteqvr_proQVR ProQVR EliteQVR Guard
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-0586
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.8||CRITICAL
EPSS-20.84% / 95.39%
||
7 Day CHG~0.00%
Published-08 Jan, 2019 | 21:00
Updated-04 Aug, 2024 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka "Microsoft Exchange Memory Corruption Vulnerability." This affects Microsoft Exchange Server.

Action-Not Available
Vendor-Microsoft Corporation
Product-exchange_serverMicrosoft Exchange Server
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21250
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-9.8||CRITICAL
EPSS-0.63% / 69.39%
||
7 Day CHG~0.00%
Published-12 Jul, 2023 | 23:32
Updated-06 Nov, 2024 | 15:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In gatt_end_operation of gatt_utils.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9471
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-9.8||CRITICAL
EPSS-0.05% / 15.13%
||
7 Day CHG~0.00%
Published-20 Nov, 2024 | 17:16
Updated-18 Dec, 2024 | 16:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the deserialization constructor of NanoAppFilter.java, there is a possible loss of data due to type confusion. This could lead to local escalation of privilege in the system server with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CVE-2023-20895
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-8.1||HIGH
EPSS-0.40% / 59.59%
||
7 Day CHG~0.00%
Published-22 Jun, 2023 | 11:57
Updated-13 Feb, 2025 | 16:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The VMware vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication.

Action-Not Available
Vendor-VMware (Broadcom Inc.)
Product-vcenter_serverVMware Cloud Foundation (vCenter Server)VMware vCenter Server (vCenter Server)
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9418
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-8.8||HIGH
EPSS-0.09% / 26.16%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 21:23
Updated-18 Dec, 2024 | 19:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In handle_app_cur_val_response of dtif_rc.cc, there is a possible stack buffer overflow due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-20520
Matching Score-4
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-4
Assigner-Advanced Micro Devices Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.31% / 53.79%
||
7 Day CHG~0.00%
Published-09 May, 2023 | 18:36
Updated-28 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control settings in ASP Bootloader may allow an attacker to corrupt the return address causing a stack-based buffer overrun potentially leading to arbitrary code execution.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_72f3_firmwareepyc_7443pepyc_7301_firmwareepyc_7451_firmwareepyc_7552_firmwareepyc_7451epyc_7282_firmwareepyc_7742_firmwareepyc_7371epyc_7773xepyc_7f72_firmwareepyc_7413epyc_7532epyc_7313p_firmwareepyc_7702p_firmwareepyc_7663epyc_7551epyc_7h12epyc_7301epyc_7453epyc_73f3_firmwareepyc_7401epyc_7f52epyc_7543_firmwareepyc_7f32epyc_7402pepyc_7552epyc_7261_firmwareepyc_73f3epyc_74f3_firmwareepyc_7252epyc_7571_firmwareepyc_7402_firmwareepyc_7351_firmwareepyc_7642_firmwareepyc_75f3_firmwareepyc_7262_firmwareepyc_7343epyc_7351epyc_7542epyc_7642epyc_7443_firmwareepyc_7272_firmwareepyc_7501epyc_7302epyc_7f32_firmwareepyc_7763_firmwareepyc_7573x_firmwareepyc_7401p_firmwareepyc_7252_firmwareepyc_7473x_firmwareepyc_7352epyc_7643_firmwareepyc_7401_firmwareepyc_7662epyc_7473xepyc_7232pepyc_7532_firmwareepyc_7453_firmwareepyc_7351p_firmwareepyc_7551pepyc_7501_firmwareepyc_7713p_firmwareepyc_7302_firmwareepyc_7702_firmwareepyc_7742epyc_72f3epyc_7f52_firmwareepyc_7543pepyc_7502epyc_7452epyc_7601_firmwareepyc_7513epyc_7302pepyc_7763epyc_7413_firmwareepyc_74f3epyc_7502_firmwareepyc_7402p_firmwareepyc_7713pepyc_7251epyc_7402epyc_7643epyc_7551_firmwareepyc_7313epyc_7232p_firmwareepyc_7443epyc_7302p_firmwareepyc_7261epyc_7551p_firmwareepyc_7663_firmwareepyc_7352_firmwareepyc_7543epyc_7281epyc_7502p_firmwareepyc_7713_firmwareepyc_7371_firmwareepyc_7713epyc_7281_firmwareepyc_7571epyc_7702epyc_7702pepyc_75f3epyc_7313pepyc_7251_firmwareepyc_7351pepyc_7773x_firmwareepyc_7313_firmwareepyc_7573xepyc_7502pepyc_7h12_firmwareepyc_7452_firmwareepyc_7401pepyc_7543p_firmwareepyc_7282epyc_7272epyc_7513_firmwareepyc_7373xepyc_7662_firmwareepyc_7542_firmwareepyc_7f72epyc_7343_firmwareepyc_7443p_firmwareepyc_7373x_firmwareepyc_7601epyc_72621st Gen AMD EPYC™ 3rd Gen AMD EPYC™ 2nd Gen AMD EPYC™
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-21826
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-8.1||HIGH
EPSS-0.46% / 63.13%
||
7 Day CHG~0.00%
Published-20 Aug, 2021 | 21:02
Updated-03 Aug, 2024 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap-based buffer overflow vulnerability exists in the XML Decompression DecodeTreeBlock functionality of AT&T Labs Xmill 0.7. Within `DecodeTreeBlock` which is called during the decompression of an XMI file, a UINT32 is loaded from the file and used as trusted input as the length of a buffer. An attacker can provide a malicious file to trigger this vulnerability.

Action-Not Available
Vendor-attn/a
Product-xmillAT&T
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-27227
Matching Score-4
Assigner-Google Devices
ShareView Details
Matching Score-4
Assigner-Google Devices
CVSS Score-9.8||CRITICAL
EPSS-0.07% / 21.79%
||
7 Day CHG~0.00%
Published-11 Mar, 2024 | 18:55
Updated-25 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A malicious DNS response can trigger a number of OOB reads, writes, and other memory issues

Action-Not Available
Vendor-Google LLC
Product-androidAndroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-8784
Matching Score-4
Assigner-Check Point Software Ltd.
ShareView Details
Matching Score-4
Assigner-Check Point Software Ltd.
CVSS Score-9.8||CRITICAL
EPSS-14.66% / 94.22%
||
7 Day CHG~0.00%
Published-29 Nov, 2018 | 17:00
Updated-17 Sep, 2024 | 01:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress_segment() that results in a memory corruption and probably even a remote code execution.

Action-Not Available
Vendor-Canonical Ltd.FreeRDPCheck Point Software Technologies Ltd.
Product-freerdpubuntu_linuxFreeRDP
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21058
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-9.8||CRITICAL
EPSS-1.32% / 79.06%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-20 Feb, 2025 | 16:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In lcsm_SendRrAcquiAssist of lcsm_bcm_assist.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-246169606References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-8797
Matching Score-4
Assigner-Check Point Software Ltd.
ShareView Details
Matching Score-4
Assigner-Check Point Software Ltd.
CVSS Score-9.8||CRITICAL
EPSS-6.79% / 90.93%
||
7 Day CHG~0.00%
Published-05 Feb, 2019 | 20:00
Updated-16 Sep, 2024 | 22:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function process_plane() that results in a memory corruption and probably even a remote code execution.

Action-Not Available
Vendor-rdesktopDebian GNU/LinuxCheck Point Software Technologies Ltd.openSUSE
Product-rdesktopdebian_linuxleaprdesktop
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21057
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-9.8||CRITICAL
EPSS-1.32% / 79.06%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-21 Feb, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ProfSixDecomTcpSACKoption of RohcPacketCommon, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-244450646References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9430
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-9.8||CRITICAL
EPSS-1.16% / 77.68%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 21:36
Updated-18 Dec, 2024 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In prop2cfg of btif_storage.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-8800
Matching Score-4
Assigner-Check Point Software Ltd.
ShareView Details
Matching Score-4
Assigner-Check Point Software Ltd.
CVSS Score-9.8||CRITICAL
EPSS-6.79% / 90.93%
||
7 Day CHG~0.00%
Published-05 Feb, 2019 | 20:00
Updated-16 Sep, 2024 | 23:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function ui_clip_handle_data() that results in a memory corruption and probably even a remote code execution.

Action-Not Available
Vendor-rdesktopDebian GNU/LinuxCheck Point Software Technologies Ltd.openSUSE
Product-rdesktopdebian_linuxleaprdesktop
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-20894
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-8.1||HIGH
EPSS-49.09% / 97.69%
||
7 Day CHG~0.00%
Published-22 Jun, 2023 | 11:54
Updated-13 Feb, 2025 | 16:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption.

Action-Not Available
Vendor-VMware (Broadcom Inc.)
Product-vcenter_serverVMware Cloud Foundation (vCenter Server)VMware vCenter Server (vCenter Server)
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-8847
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-13.87% / 94.04%
||
7 Day CHG~0.00%
Published-13 Jul, 2018 | 19:00
Updated-16 Sep, 2024 | 17:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Eaton 9000X DriveA versions 2.0.29 and prior has a stack-based buffer overflow vulnerability, which may allow remote code execution.

Action-Not Available
Vendor-eatonICS-CERT
Product-9000x9000x_firmwareEaton 9000X Drive
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-8879
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-32.01% / 96.66%
||
7 Day CHG~0.00%
Published-21 Nov, 2019 | 15:26
Updated-05 Aug, 2024 | 07:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to execute arbitrary code by providing a long string to the blocking.asp page via a GET or POST request. Vulnerable parameters are flag, mac, and cat_id.

Action-Not Available
Vendor-n/aASUS (ASUSTeK Computer Inc.)
Product-rt-ac66u_firmwarert-ac66un/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-0008
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-9.8||CRITICAL
EPSS-4.77% / 89.02%
||
7 Day CHG~0.00%
Published-10 Apr, 2019 | 20:13
Updated-16 Sep, 2024 | 16:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QFX5000 Series, EX4300, EX4600: A stack buffer overflow vulnerability in Packet Forwarding Engine manager (FXPC) process

A certain sequence of valid BGP or IPv6 BFD packets may trigger a stack based buffer overflow in the Junos OS Packet Forwarding Engine manager (FXPC) process on QFX5000 series, EX4300, EX4600 devices. This issue can result in a crash of the fxpc daemon or may potentially lead to remote code execution. Affected releases are Juniper Networks Junos OS on QFX 5000 series, EX4300, EX4600 are: 14.1X53; 15.1X53 versions prior to 15.1X53-D235; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R3; 17.3 versions prior to 17.3R3-S2, 17.3R4; 17.4 versions prior to 17.4R2-S1, 17.4R3; 18.1 versions prior to 18.1R3-S1, 18.1R4; 18.2 versions prior to 18.2R2; 18.2X75 versions prior to 18.2X75-D30; 18.3 versions prior to 18.3R2.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-qfx5200-48yex4650qfx5210-64cex4600qfx5200-32cex4300mjunosqfx5110qfx5120qfx5100ex4300Junos OS
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-8793
Matching Score-4
Assigner-Check Point Software Ltd.
ShareView Details
Matching Score-4
Assigner-Check Point Software Ltd.
CVSS Score-9.8||CRITICAL
EPSS-8.09% / 91.79%
||
7 Day CHG~0.00%
Published-05 Feb, 2019 | 20:00
Updated-17 Sep, 2024 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function cssp_read_tsrequest() that results in a memory corruption and probably even a remote code execution.

Action-Not Available
Vendor-rdesktopDebian GNU/LinuxCheck Point Software Technologies Ltd.openSUSE
Product-rdesktopdebian_linuxleaprdesktop
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-20892
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-8.1||HIGH
EPSS-2.68% / 85.24%
||
7 Day CHG~0.00%
Published-22 Jun, 2023 | 11:47
Updated-13 Feb, 2025 | 16:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
VMware vCenter Server heap-overflow vulnerability

The vCenter Server contains a heap overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may exploit heap-overflow vulnerability to execute arbitrary code on the underlying operating system that hosts vCenter Server.

Action-Not Available
Vendor-VMware (Broadcom Inc.)
Product-vcenter_serverVMware Cloud Foundation (vCenter Server)VMware vCenter Server (vCenter Server)
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-8845
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-1.52% / 80.47%
||
7 Day CHG~0.00%
Published-15 May, 2018 | 22:00
Updated-17 Sep, 2024 | 04:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, a heap-based buffer overflow vulnerability has been identified, which may allow an attacker to execute arbitrary code.

Action-Not Available
Vendor-Advantech (Advantech Co., Ltd.)
Product-webaccess\/nmswebaccess_dashboardwebaccesswebaccess_scadaWebAccess
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 41
  • 42
  • Next
Details not found