Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-3285

Summary
Assigner-VulDB
Assigner Org ID-1af790b2-7ee1-4545-860a-a788eba489b5
Published At-27 Feb, 2026 | 03:02
Updated At-27 Feb, 2026 | 18:50
Rejected At-
Credits

berry-lang berry be_lexer.c scan_string out-of-bounds

A vulnerability was determined in berry-lang berry up to 1.1.0. The affected element is the function scan_string of the file src/be_lexer.c. This manipulation causes out-of-bounds read. The attack requires local access. The exploit has been publicly disclosed and may be utilized. Patch name: 7149c59a39ba44feca261b12f06089f265fec176. Applying a patch is the recommended action to fix this issue.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:VulDB
Assigner Org ID:1af790b2-7ee1-4545-860a-a788eba489b5
Published At:27 Feb, 2026 | 03:02
Updated At:27 Feb, 2026 | 18:50
Rejected At:
â–¼CVE Numbering Authority (CNA)
berry-lang berry be_lexer.c scan_string out-of-bounds

A vulnerability was determined in berry-lang berry up to 1.1.0. The affected element is the function scan_string of the file src/be_lexer.c. This manipulation causes out-of-bounds read. The attack requires local access. The exploit has been publicly disclosed and may be utilized. Patch name: 7149c59a39ba44feca261b12f06089f265fec176. Applying a patch is the recommended action to fix this issue.

Affected Products
Vendor
berry-lang
Product
berry
Versions
Affected
  • 1.0
  • 1.1.0
Problem Types
TypeCWE IDDescription
CWECWE-125Out-of-Bounds Read
CWECWE-119Memory Corruption
Type: CWE
CWE ID: CWE-125
Description: Out-of-Bounds Read
Type: CWE
CWE ID: CWE-119
Description: Memory Corruption
Metrics
VersionBase scoreBase severityVector
4.04.8MEDIUM
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
3.13.3LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
3.03.3LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
2.01.7N/A
AV:L/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:OF/RC:C
Version: 4.0
Base score: 4.8
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
Version: 3.1
Base score: 3.3
Base severity: LOW
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
Version: 3.0
Base score: 3.3
Base severity: LOW
Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
Version: 2.0
Base score: 1.7
Base severity: N/A
Vector:
AV:L/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:OF/RC:C
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
Oneafter (VulDB User)
Timeline
EventDate
Advisory disclosed2026-02-26 00:00:00
VulDB entry created2026-02-26 01:00:00
VulDB entry last update2026-02-26 17:44:00
Event: Advisory disclosed
Date: 2026-02-26 00:00:00
Event: VulDB entry created
Date: 2026-02-26 01:00:00
Event: VulDB entry last update
Date: 2026-02-26 17:44:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/?id.348014
vdb-entry
technical-description
https://vuldb.com/?ctiid.348014
signature
permissions-required
https://vuldb.com/?submit.758872
third-party-advisory
https://github.com/berry-lang/berry/issues/509
issue-tracking
https://github.com/berry-lang/berry/pull/511
issue-tracking
patch
https://github.com/oneafter/0211/blob/main/be/repro
exploit
https://github.com/berry-lang/berry/commit/7149c59a39ba44feca261b12f06089f265fec176
patch
https://github.com/berry-lang/berry/
product
Hyperlink: https://vuldb.com/?id.348014
Resource:
vdb-entry
technical-description
Hyperlink: https://vuldb.com/?ctiid.348014
Resource:
signature
permissions-required
Hyperlink: https://vuldb.com/?submit.758872
Resource:
third-party-advisory
Hyperlink: https://github.com/berry-lang/berry/issues/509
Resource:
issue-tracking
Hyperlink: https://github.com/berry-lang/berry/pull/511
Resource:
issue-tracking
patch
Hyperlink: https://github.com/oneafter/0211/blob/main/be/repro
Resource:
exploit
Hyperlink: https://github.com/berry-lang/berry/commit/7149c59a39ba44feca261b12f06089f265fec176
Resource:
patch
Hyperlink: https://github.com/berry-lang/berry/
Resource:
product
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cna@vuldb.com
Published At:27 Feb, 2026 | 03:16
Updated At:27 Feb, 2026 | 14:06

A vulnerability was determined in berry-lang berry up to 1.1.0. The affected element is the function scan_string of the file src/be_lexer.c. This manipulation causes out-of-bounds read. The attack requires local access. The exploit has been publicly disclosed and may be utilized. Patch name: 7149c59a39ba44feca261b12f06089f265fec176. Applying a patch is the recommended action to fix this issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.01.9LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.13.3LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Secondary2.01.7LOW
AV:L/AC:L/Au:S/C:P/I:N/A:N
Type: Secondary
Version: 4.0
Base score: 1.9
Base severity: LOW
Vector:
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 3.3
Base severity: LOW
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Type: Secondary
Version: 2.0
Base score: 1.7
Base severity: LOW
Vector:
AV:L/AC:L/Au:S/C:P/I:N/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-119Primarycna@vuldb.com
CWE-125Primarycna@vuldb.com
CWE ID: CWE-119
Type: Primary
Source: cna@vuldb.com
CWE ID: CWE-125
Type: Primary
Source: cna@vuldb.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/berry-lang/berry/cna@vuldb.com
N/A
https://github.com/berry-lang/berry/commit/7149c59a39ba44feca261b12f06089f265fec176cna@vuldb.com
N/A
https://github.com/berry-lang/berry/issues/509cna@vuldb.com
N/A
https://github.com/berry-lang/berry/pull/511cna@vuldb.com
N/A
https://github.com/oneafter/0211/blob/main/be/reprocna@vuldb.com
N/A
https://vuldb.com/?ctiid.348014cna@vuldb.com
N/A
https://vuldb.com/?id.348014cna@vuldb.com
N/A
https://vuldb.com/?submit.758872cna@vuldb.com
N/A
Hyperlink: https://github.com/berry-lang/berry/
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://github.com/berry-lang/berry/commit/7149c59a39ba44feca261b12f06089f265fec176
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://github.com/berry-lang/berry/issues/509
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://github.com/berry-lang/berry/pull/511
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://github.com/oneafter/0211/blob/main/be/repro
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://vuldb.com/?ctiid.348014
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://vuldb.com/?id.348014
Source: cna@vuldb.com
Resource: N/A
Hyperlink: https://vuldb.com/?submit.758872
Source: cna@vuldb.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

38Records found

CVE-2026-3282
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.01% / 1.66%
||
7 Day CHG~0.00%
Published-27 Feb, 2026 | 02:32
Updated-27 Feb, 2026 | 18:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
libvips unpremultiply.c vips_unpremultiply_build out-of-bounds

A flaw has been found in libvips 8.19.0. This vulnerability affects the function vips_unpremultiply_build of the file libvips/conversion/unpremultiply.c. Executing a manipulation of the argument alpha_band can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been published and may be used. This patch is called 7215ead1e0cd7d3703cc4f5fca06d7d0f4c22b91. A patch should be applied to remediate this issue.

Action-Not Available
Vendor-n/a
Product-libvips
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-125
Out-of-bounds Read
CVE-2026-3283
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.01% / 1.66%
||
7 Day CHG~0.00%
Published-27 Feb, 2026 | 02:32
Updated-27 Feb, 2026 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
libvips extract.c vips_extract_band_build out-of-bounds

A vulnerability has been found in libvips 8.19.0. This issue affects the function vips_extract_band_build of the file libvips/conversion/extract.c. The manipulation of the argument extract_band leads to out-of-bounds read. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 24795bb3d19d84f7b6f5ed86451ad556c8f2fe70. To fix this issue, it is recommended to deploy a patch.

Action-Not Available
Vendor-n/a
Product-libvips
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-34635
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-4||MEDIUM
EPSS-0.23% / 45.68%
||
7 Day CHG~0.00%
Published-07 Aug, 2024 | 01:30
Updated-09 Aug, 2024 | 21:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in parsing textbox object in Samsung Notes prior to version 4.4.21.62 allows local attacker to access unauthorized memory.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-notesSamsung Notes
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-3588
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-3.3||LOW
EPSS-0.12% / 31.24%
||
7 Day CHG~0.00%
Published-10 Jun, 2021 | 02:30
Updated-16 Sep, 2024 | 23:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
memory contents disclosure in cli_feat_read_cb

The cli_feat_read_cb() function in src/gatt-database.c does not perform bounds checks on the 'offset' variable before using it as an index into an array for reading.

Action-Not Available
Vendor-BlueZ
Product-bluezBlueZ
CWE ID-CWE-788
Access of Memory Location After End of Buffer
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-35005
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-3.3||LOW
EPSS-0.10% / 26.59%
||
7 Day CHG~0.00%
Published-24 Jan, 2022 | 18:10
Updated-04 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows local attackers to disclose sensitive information on affected installations of TeamViewer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the TeamViewer service. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated array. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-13818.

Action-Not Available
Vendor-TeamViewer
Product-teamviewerTeamViewer
CWE ID-CWE-129
Improper Validation of Array Index
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-46837
Matching Score-4
Assigner-Xen Project
ShareView Details
Matching Score-4
Assigner-Xen Project
CVSS Score-3.3||LOW
EPSS-0.08% / 23.75%
||
7 Day CHG~0.00%
Published-05 Jan, 2024 | 16:36
Updated-04 Nov, 2025 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
arm32: The cache may not be properly cleaned/invalidated (take two)

Arm provides multiple helpers to clean & invalidate the cache for a given region. This is, for instance, used when allocating guest memory to ensure any writes (such as the ones during scrubbing) have reached memory before handing over the page to a guest. Unfortunately, the arithmetics in the helpers can overflow and would then result to skip the cache cleaning/invalidation. Therefore there is no guarantee when all the writes will reach the memory. This undefined behavior was meant to be addressed by XSA-437, but the approach was not sufficient.

Action-Not Available
Vendor-Xen Project
Product-xenXen
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2024-25991
Matching Score-4
Assigner-Google Devices
ShareView Details
Matching Score-4
Assigner-Google Devices
CVSS Score-3.3||LOW
EPSS-0.03% / 8.00%
||
7 Day CHG~0.00%
Published-11 Mar, 2024 | 18:55
Updated-03 Apr, 2025 | 15:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In acpm_tmu_ipc_handler of tmu_plugin.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-40085
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-3.3||LOW
EPSS-0.03% / 8.73%
||
7 Day CHG~0.00%
Published-16 Feb, 2024 | 18:33
Updated-16 Dec, 2024 | 14:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In convertSubgraphFromHAL of ShimConverter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-26271
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 3.84%
||
7 Day CHG~0.00%
Published-10 Dec, 2020 | 22:10
Updated-04 Aug, 2024 | 15:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap out of bounds access in MakeEdge in TensorFlow

In affected versions of TensorFlow under certain cases, loading a saved model can result in accessing uninitialized memory while building the computation graph. The MakeEdge function creates an edge between one output tensor of the src node (given by output_index) and the input slot of the dst node (given by input_index). This is only possible if the types of the tensors on both sides coincide, so the function begins by obtaining the corresponding DataType values and comparing these for equality. However, there is no check that the indices point to inside of the arrays they index into. Thus, this can result in accessing data out of bounds of the corresponding heap allocated arrays. In most scenarios, this can manifest as unitialized data access, but if the index points far away from the boundaries of the arrays this can be used to leak addresses from the library. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2024-0173
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-3.8||LOW
EPSS-0.09% / 25.88%
||
7 Day CHG~0.00%
Published-13 Mar, 2024 | 16:52
Updated-31 Jan, 2025 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an improper parameter initialization vulnerability. A local low privileged attacker could potentially exploit this vulnerability to read the contents of non-SMM stack memory.

Action-Not Available
Vendor-Dell Inc.
Product-poweredge_r860poweredge_r6625_firmwareemc_xc_core_xc7525_firmwarepoweredge_r750_firmwarepoweredge_c6320poweredge_r430poweredge_r760xa_firmwarenx440_firmwarexc_core_xc760_firmwareemc_xc_core_xc650_firmwaredss_8440poweredge_c6620poweredge_xr5610emc_xc_core_xc650poweredge_r630poweredge_c6620_firmwarepoweredge_r7615poweredge_r660_firmwarepoweredge_r860_firmwareemc_xc_core_6420_systemnx3340_firmwarepoweredge_r750xaemc_xc_core_xc940_systempoweredge_r730xd_firmwarenx3340poweredge_c6420_firmwareemc_xc_core_xc750_firmwareemc_xc_core_xc740xd2_firmwarepoweredge_r840poweredge_hs5620poweredge_r940xa_firmwarepoweredge_hs5620_firmwarepoweredge_xr7620_firmwarepoweredge_xe9680_firmwarepoweredge_r540poweredge_r350_firmwarepoweredge_t630_firmwarepoweredge_t640poweredge_fc430poweredge_mx840cpoweredge_r740poweredge_mx740cpoweredge_t340poweredge_r240poweredge_r760_firmwarepoweredge_t140poweredge_c4130xc6320_firmwarepoweredge_r660xsxc630_firmwarepoweredge_r450emc_xc_core_xc640_systempoweredge_r7625poweredge_r250_firmwarepoweredge_t340_firmwarenx3230poweredge_fc640_firmwarepoweredge_t550poweredge_r740xd_firmwarepoweredge_r230poweredge_m830_\(pe_vrtx\)_firmwarepoweredge_c6525_firmwarepoweredge_xr8620t_firmwarepoweredge_fc640poweredge_r430_firmwarepoweredge_r7515_firmwarepoweredge_r7525_firmwarepoweredge_m630_firmwarepoweredge_r730xdpoweredge_hs5610poweredge_r6625poweredge_t130poweredge_r650dss_8440_firmwarepoweredge_r550_firmwarepoweredge_r440_firmwarepoweredge_r240_firmwarepoweredge_r640_firmwarenx3240_firmwarepoweredge_r730poweredge_m640_\(pe_vrtx\)_firmwarepoweredge_m830poweredge_r760xapoweredge_r6515_firmwarepoweredge_r960poweredge_r350xc_core_xc660poweredge_r830poweredge_r760xd2_firmwarepoweredge_c6615_firmwarepoweredge_xr4510c_firmwarexc730nx440poweredge_xr7620poweredge_mx760c_firmwarepoweredge_xr4510cpoweredge_c4130_firmwarepoweredge_xr8610t_firmwarepoweredge_t150_firmwarenx3330_firmwarepoweredge_c6320_firmwarexc430poweredge_xr4520c_firmwarepoweredge_r340_firmwarexc_core_xc7625_firmwareemc_xc_core_xc450_firmwarepoweredge_r530_firmwarepoweredge_xr8620tpoweredge_xr12_firmwarenx3330emc_xc_core_xc740xd_systempoweredge_t430_firmwarepoweredge_xr2_firmwarepoweredge_m630_\(pe_vrtx\)_firmwarepoweredge_r330poweredge_m640poweredge_xe9680poweredge_t440_firmwarepoweredge_c4140emc_xc_core_xc640_system_firmwarepoweredge_t330poweredge_fc830_firmwareemc_xc_core_xc750xapoweredge_xr11poweredge_fc830poweredge_r760xspoweredge_t350xc730_firmwarepoweredge_r750xa_firmwarepoweredge_mx760cpoweredge_r7515poweredge_r740xd2poweredge_mx840c_firmwareemc_xc_core_xc750poweredge_m640_firmwarepoweredge_c4140_firmwarepoweredge_xe7420_firmwarepoweredge_r760xd2poweredge_m630_\(pe_vrtx\)poweredge_c6525poweredge_r6525poweredge_c6420nx3230_firmwarenx430_firmwarepoweredge_r750xs_firmwarexc_core_xc760xc730xdpoweredge_m830_firmwarepoweredge_r6525_firmwarepoweredge_r250poweredge_r440emc_xc_core_xc740xd_system_firmwarepoweredge_xe8640emc_xc_core_xc750xa_firmwarepoweredge_r7625_firmwarepoweredge_t550_firmwarepoweredge_r740_firmwarepoweredge_t640_firmwarepoweredge_mx740c_firmwarepoweredge_r930poweredge_xe7440poweredge_hs5610_firmwarepoweredge_c6615poweredge_r230_firmwarepoweredge_r630_firmwarepoweredge_r740xdpoweredge_r940xapoweredge_xe9640_firmwarepoweredge_t440poweredge_t140_firmwarepoweredge_r6615_firmwarepoweredge_r640poweredge_xr2poweredge_r940nx430poweredge_mx750c_firmwarenx3240poweredge_fc630_firmwarexc6320emc_xc_core_xc940_system_firmwarexc_core_xc7625poweredge_r6615xc730xd_firmwarepoweredge_r550xc630poweredge_r650xs_firmwarepoweredge_fc630poweredge_r6515xc430_firmwarepoweredge_r930_firmwarepoweredge_xr12poweredge_m640_\(pe_vrtx\)poweredge_r740xd2_firmwareemc_xc_core_xc450emc_xc_core_xc7525poweredge_xr8610tpoweredge_xr4520cpoweredge_xe9640poweredge_r750poweredge_r650xspoweredge_r530poweredge_r840_firmwarepoweredge_r730_firmwareemc_xc_core_xc6520poweredge_t150poweredge_xe8640_firmwarepoweredge_t350_firmwarepoweredge_c6520_firmwarepoweredge_t560_firmwarepoweredge_r960_firmwarepoweredge_r540_firmwarepoweredge_r330_firmwarepoweredge_t330_firmwarepoweredge_xe8545poweredge_t430poweredge_r7525poweredge_xe8545_firmwarepoweredge_r7615_firmwarepoweredge_t630emc_xc_core_6420_system_firmwarepoweredge_r340poweredge_m830_\(pe_vrtx\)poweredge_xr5610_firmwarepoweredge_xe7440_firmwarepoweredge_r760xs_firmwareemc_xc_core_xc740xd2emc_xc_core_xc6520_firmwarexc_core_xc660_firmwarepoweredge_t560poweredge_c6520poweredge_r450_firmwarepoweredge_xe7420poweredge_m630poweredge_xr11_firmwarepoweredge_r750xspoweredge_r660xs_firmwarepoweredge_t130_firmwareemc_xc_core_xcxr2_firmwareemc_xc_core_xcxr2poweredge_r760poweredge_r940_firmwarepoweredge_xe2420_firmwarepoweredge_r650_firmwarepoweredge_fc430_firmwarepoweredge_xe2420poweredge_mx750cpoweredge_r830_firmwarepoweredge_r660PowerEdge Platform
CWE ID-CWE-788
Access of Memory Location After End of Buffer
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-0154
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-3.8||LOW
EPSS-0.09% / 25.88%
||
7 Day CHG~0.00%
Published-13 Mar, 2024 | 16:41
Updated-31 Jan, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an improper parameter initialization vulnerability. A local low privileged attacker could potentially exploit this vulnerability to read the contents of non-SMM stack memory.

Action-Not Available
Vendor-Dell Inc.
Product-poweredge_r860poweredge_r6625_firmwareemc_xc_core_xc7525_firmwarepoweredge_r750_firmwarepoweredge_c6320poweredge_r430poweredge_r760xa_firmwarenx440_firmwarexc_core_xc760_firmwareemc_xc_core_xc650_firmwaredss_8440poweredge_c6620poweredge_xr5610emc_xc_core_xc650poweredge_r630poweredge_c6620_firmwarepoweredge_r7615poweredge_r660_firmwarepoweredge_r860_firmwareemc_xc_core_6420_systemnx3340_firmwarepoweredge_r750xaemc_xc_core_xc940_systempoweredge_r730xd_firmwarenx3340poweredge_c6420_firmwareemc_xc_core_xc750_firmwareemc_xc_core_xc740xd2_firmwarepoweredge_r840poweredge_hs5620poweredge_r940xa_firmwarepoweredge_hs5620_firmwarepoweredge_xr7620_firmwarepoweredge_xe9680_firmwarepoweredge_r540poweredge_r350_firmwarepoweredge_t630_firmwarepoweredge_t640poweredge_fc430poweredge_mx840cpoweredge_r740poweredge_mx740cpoweredge_t340poweredge_r240poweredge_r760_firmwarepoweredge_t140poweredge_c4130xc6320_firmwarepoweredge_r660xsxc630_firmwarepoweredge_r450emc_xc_core_xc640_systempoweredge_r7625poweredge_r250_firmwarepoweredge_t340_firmwarenx3230poweredge_fc640_firmwarepoweredge_t550poweredge_r740xd_firmwarepoweredge_r230poweredge_m830_\(pe_vrtx\)_firmwarepoweredge_c6525_firmwarepoweredge_xr8620t_firmwarepoweredge_fc640poweredge_r430_firmwarepoweredge_r7515_firmwarepoweredge_r7525_firmwarepoweredge_m630_firmwarepoweredge_r730xdpoweredge_hs5610poweredge_r6625poweredge_t130poweredge_r650dss_8440_firmwarepoweredge_r550_firmwarepoweredge_r440_firmwarepoweredge_r240_firmwarepoweredge_r640_firmwarenx3240_firmwarepoweredge_r730poweredge_m640_\(pe_vrtx\)_firmwarepoweredge_m830poweredge_r760xapoweredge_r6515_firmwarepoweredge_r960poweredge_r350xc_core_xc660poweredge_r830poweredge_r760xd2_firmwarepoweredge_c6615_firmwarepoweredge_xr4510c_firmwarexc730nx440poweredge_xr7620poweredge_mx760c_firmwarepoweredge_xr4510cpoweredge_c4130_firmwarepoweredge_xr8610t_firmwarepoweredge_t150_firmwarenx3330_firmwarepoweredge_c6320_firmwarexc430poweredge_xr4520c_firmwarepoweredge_r340_firmwarexc_core_xc7625_firmwareemc_xc_core_xc450_firmwarepoweredge_r530_firmwarepoweredge_xr8620tpoweredge_xr12_firmwarenx3330emc_xc_core_xc740xd_systempoweredge_t430_firmwarepoweredge_xr2_firmwarepoweredge_m630_\(pe_vrtx\)_firmwarepoweredge_r330poweredge_m640poweredge_xe9680poweredge_t440_firmwarepoweredge_c4140emc_xc_core_xc640_system_firmwarepoweredge_t330poweredge_fc830_firmwareemc_xc_core_xc750xapoweredge_xr11poweredge_fc830poweredge_r760xspoweredge_t350xc730_firmwarepoweredge_r750xa_firmwarepoweredge_mx760cpoweredge_r7515poweredge_r740xd2poweredge_mx840c_firmwareemc_xc_core_xc750poweredge_m640_firmwarepoweredge_c4140_firmwarepoweredge_xe7420_firmwarepoweredge_r760xd2poweredge_m630_\(pe_vrtx\)poweredge_c6525poweredge_r6525poweredge_c6420nx3230_firmwarenx430_firmwarepoweredge_r750xs_firmwarexc_core_xc760xc730xdpoweredge_m830_firmwarepoweredge_r6525_firmwarepoweredge_r250poweredge_r440emc_xc_core_xc740xd_system_firmwarepoweredge_xe8640emc_xc_core_xc750xa_firmwarepoweredge_r7625_firmwarepoweredge_t550_firmwarepoweredge_r740_firmwarepoweredge_t640_firmwarepoweredge_mx740c_firmwarepoweredge_r930poweredge_xe7440poweredge_hs5610_firmwarepoweredge_c6615poweredge_r230_firmwarepoweredge_r630_firmwarepoweredge_r740xdpoweredge_r940xapoweredge_xe9640_firmwarepoweredge_t440poweredge_t140_firmwarepoweredge_r6615_firmwarepoweredge_r640poweredge_xr2poweredge_r940nx430poweredge_mx750c_firmwarenx3240poweredge_fc630_firmwarexc6320emc_xc_core_xc940_system_firmwarexc_core_xc7625poweredge_r6615xc730xd_firmwarepoweredge_r550xc630poweredge_r650xs_firmwarepoweredge_fc630poweredge_r6515xc430_firmwarepoweredge_r930_firmwarepoweredge_xr12poweredge_m640_\(pe_vrtx\)poweredge_r740xd2_firmwareemc_xc_core_xc450emc_xc_core_xc7525poweredge_xr8610tpoweredge_xr4520cpoweredge_xe9640poweredge_r750poweredge_r650xspoweredge_r530poweredge_r840_firmwarepoweredge_r730_firmwareemc_xc_core_xc6520poweredge_t150poweredge_xe8640_firmwarepoweredge_t350_firmwarepoweredge_c6520_firmwarepoweredge_t560_firmwarepoweredge_r960_firmwarepoweredge_r540_firmwarepoweredge_r330_firmwarepoweredge_t330_firmwarepoweredge_xe8545poweredge_t430poweredge_r7525poweredge_xe8545_firmwarepoweredge_r7615_firmwarepoweredge_t630emc_xc_core_6420_system_firmwarepoweredge_r340poweredge_m830_\(pe_vrtx\)poweredge_xr5610_firmwarepoweredge_xe7440_firmwarepoweredge_r760xs_firmwareemc_xc_core_xc740xd2emc_xc_core_xc6520_firmwarexc_core_xc660_firmwarepoweredge_t560poweredge_c6520poweredge_r450_firmwarepoweredge_xe7420poweredge_m630poweredge_xr11_firmwarepoweredge_r750xspoweredge_r660xs_firmwarepoweredge_t130_firmwareemc_xc_core_xcxr2_firmwareemc_xc_core_xcxr2poweredge_r760poweredge_r940_firmwarepoweredge_xe2420_firmwarepoweredge_r650_firmwarepoweredge_fc430_firmwarepoweredge_xe2420poweredge_mx750cpoweredge_r830_firmwarepoweredge_r660PowerEdge Platform
CWE ID-CWE-788
Access of Memory Location After End of Buffer
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-0149
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-3.3||LOW
EPSS-0.15% / 34.97%
||
7 Day CHG+0.08%
Published-28 Jan, 2025 | 04:04
Updated-27 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA GPU Display Driver for Linux contains a vulnerability which could allow an attacker unauthorized access to files. A successful exploit of this vulnerability might lead to limited information disclosure.

Action-Not Available
Vendor-NVIDIA Corporation
Product-NVIDIA GPU Display Driver, vGPU software
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-34321
Matching Score-4
Assigner-Xen Project
ShareView Details
Matching Score-4
Assigner-Xen Project
CVSS Score-3.3||LOW
EPSS-0.06% / 17.13%
||
7 Day CHG~0.00%
Published-05 Jan, 2024 | 16:17
Updated-04 Nov, 2025 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
arm32: The cache may not be properly cleaned/invalidated

Arm provides multiple helpers to clean & invalidate the cache for a given region. This is, for instance, used when allocating guest memory to ensure any writes (such as the ones during scrubbing) have reached memory before handing over the page to a guest. Unfortunately, the arithmetics in the helpers can overflow and would then result to skip the cache cleaning/invalidation. Therefore there is no guarantee when all the writes will reach the memory.

Action-Not Available
Vendor-Xen Project
Product-xenXen
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2024-34634
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-4||MEDIUM
EPSS-0.23% / 45.68%
||
7 Day CHG~0.00%
Published-07 Aug, 2024 | 01:30
Updated-09 Aug, 2024 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in parsing connected object list in Samsung Notes prior to version 4.4.21.62 allows local attacker to access unauthorized memory.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-notesSamsung Notes
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-30760
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-3.3||LOW
EPSS-0.08% / 23.86%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-03 Oct, 2024 | 20:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in some Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA in version 0.25.0 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-realsense_450_fa_firmwarerealsense_450_faIntel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-55695
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.08% / 23.87%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 17:01
Updated-26 Feb, 2026 | 17:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows WLAN AutoConfig Service Information Disclosure Vulnerability

Out-of-bounds read in Windows WLAN Auto Config Service allows an authorized attacker to disclose information locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2012windows_10_21h2windows_11_24h2windows_server_2022windows_server_2022_23h2windows_server_2025windows_10_1507windows_11_22h2windows_server_2008windows_11_23h2windows_10_1607windows_10_22h2windows_10_1809windows_server_2019windows_11_25h2windows_server_2016Windows Server 2019 (Server Core installation)Windows 11 Version 25H2Windows 10 Version 21H2Windows 10 Version 22H2Windows 11 Version 23H2Windows Server 2012Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 R2 Service Pack 1Windows Server 2012 R2Windows Server 2025 (Server Core installation)Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2016Windows Server 2012 R2 (Server Core installation)Windows 11 version 22H2Windows 11 version 22H3Windows Server 2019Windows 10 Version 1607Windows Server 2022Windows 10 Version 1507Windows Server 2012 (Server Core installation)Windows Server 2025Windows Server 2016 (Server Core installation)Windows 11 Version 24H2Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 10 Version 1809
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-34632
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-4||MEDIUM
EPSS-0.23% / 45.68%
||
7 Day CHG~0.00%
Published-07 Aug, 2024 | 01:30
Updated-09 Aug, 2024 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in uuid parsing in Samsung Notes prior to version 4.4.21.62 allows local attacker to access unauthorized memory.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-notesSamsung Notes
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-34633
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-4||MEDIUM
EPSS-0.23% / 45.68%
||
7 Day CHG~0.00%
Published-07 Aug, 2024 | 01:30
Updated-09 Aug, 2024 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in parsing object header in Samsung Notes prior to version 4.4.21.62 allows local attacker to access unauthorized memory.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-notesSamsung Notes
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-22808
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-3.3||LOW
EPSS-0.17% / 38.41%
||
7 Day CHG~0.00%
Published-11 Apr, 2023 | 00:00
Updated-11 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Arm Android Gralloc Module. A non-privileged user can read a small portion of the allocator process memory. This affects Bifrost r24p0 through r41p0 before r42p0, Valhall r24p0 through r41p0 before r42p0, and Avalon r41p0 before r42p0.

Action-Not Available
Vendor-n/aArm Limited
Product-valhall_android_gralloc_moduleavalon_android_gralloc_modulebifrost_android_gralloc_modulen/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-46781
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-3.3||LOW
EPSS-0.14% / 34.83%
||
7 Day CHG~0.00%
Published-06 Apr, 2023 | 00:00
Updated-12 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Arm Mali GPU Kernel Driver. A non-privileged user can make improper GPU memory processing operations to access a limited amount outside of buffer bounds. This affects Valhall r29p0 through r41p0 before r42p0 and Avalon r41p0 before r42p0.

Action-Not Available
Vendor-n/aArm Limited
Product-avalon_gpu_kernel_drivervalhall_gpu_kernel_drivern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-46396
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.17% / 38.41%
||
7 Day CHG~0.00%
Published-11 Apr, 2023 | 00:00
Updated-11 Feb, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Arm Mali Kernel Driver. A non-privileged user can make improper GPU memory processing operations to access a limited amount outside of buffer bounds. This affects Valhall r29p0 through r41p0 before r42p0 and Avalon r41p0 before r42p0.

Action-Not Available
Vendor-n/aArm Limited
Product-valhall_gpu_kernel_driveravalon_gpu_kernel_drivern/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2024-26217
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.64% / 70.28%
||
7 Day CHG~0.00%
Published-09 Apr, 2024 | 17:01
Updated-03 May, 2025 | 00:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Remote Access Connection Manager Information Disclosure Vulnerability

Windows Remote Access Connection Manager Information Disclosure Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_server_2022_23h2windows_server_2016windows_server_2012windows_10_1507windows_11_21h2windows_10_22h2windows_11_22h2windows_10_1607windows_11_23h2Windows 11 version 22H3Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1507Windows Server 2012 R2Windows Server 2019Windows 10 Version 21H2Windows 11 version 22H2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 10 Version 1607Windows 11 Version 23H2Windows Server 2022Windows 11 version 21H2Windows Server 2019 (Server Core installation)Windows 10 Version 22H2Windows 10 Version 1809Windows Server 2012 R2 (Server Core installation)
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-40709
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-3.3||LOW
EPSS-0.18% / 38.99%
||
7 Day CHG~0.00%
Published-28 Sep, 2022 | 21:10
Updated-20 Nov, 2024 | 14:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. This vulnerability is similar to, but not identical to CVE-2022-40707 and 40708.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-windowsdeep_security_agentTrend Micro Deep Security
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-40708
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-3.3||LOW
EPSS-0.18% / 38.99%
||
7 Day CHG~0.00%
Published-28 Sep, 2022 | 21:10
Updated-20 May, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. This vulnerability is similar to, but not identical to CVE-2022-40707.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-windowsdeep_security_agentTrend Micro Deep Security
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-40707
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-3.3||LOW
EPSS-0.18% / 38.99%
||
7 Day CHG~0.00%
Published-28 Sep, 2022 | 21:10
Updated-03 Aug, 2024 | 12:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Out-of-bounds read vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. This vulnerability is similar to, but not identical to CVE-2022-40708.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-windowsdeep_security_agentTrend Micro Deep Security
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-25821
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-3.3||LOW
EPSS-0.02% / 3.82%
||
7 Day CHG~0.00%
Published-08 Mar, 2022 | 13:47
Updated-03 Aug, 2024 | 04:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper use of SMS buffer pointer in Shannon baseband prior to SMR Mar-2022 Release 1 allows OOB read.

Action-Not Available
Vendor-Google LLCSamsungSamsung Electronics
Product-androidexynosSamsung Mobile Devices
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-20239
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-3.3||LOW
EPSS-0.09% / 24.98%
||
7 Day CHG~0.00%
Published-28 May, 2021 | 10:42
Updated-03 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the Linux kernel in versions before 5.4.92 in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.

Action-Not Available
Vendor-n/aFedora ProjectLinux Kernel Organization, IncRed Hat, Inc.
Product-enterprise_linuxlinux_kernelfedorakernel
CWE ID-CWE-822
Untrusted Pointer Dereference
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-20528
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-3.3||LOW
EPSS-0.02% / 3.34%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-18 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In findParam of HevcUtils.cpp there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-230172711

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-3160
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.09% / 26.15%
||
7 Day CHG~0.00%
Published-03 Apr, 2025 | 14:31
Updated-28 May, 2025 | 14:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Open Asset Import Library Assimp File SceneCombiner.cpp AddNodeHashes out-of-bounds

A vulnerability has been found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This vulnerability affects the function Assimp::SceneCombiner::AddNodeHashes of the file code/Common/SceneCombiner.cpp of the component File Handler. The manipulation leads to out-of-bounds read. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as a0993658f40d8e13ff5823990c30b43c82a5daf0. It is recommended to apply a patch to fix this issue.

Action-Not Available
Vendor-assimpOpen Asset Import Library
Product-assimpAssimp
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-32386
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-3.3||LOW
EPSS-0.05% / 14.97%
||
7 Day CHG~0.00%
Published-23 Jun, 2023 | 00:00
Updated-05 Dec, 2024 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. An app may be able to observe unprotected user data.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOS
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-5833
Matching Score-4
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-4
Assigner-Symantec - A Division of Broadcom
CVSS Score-3.3||LOW
EPSS-0.07% / 20.22%
||
7 Day CHG~0.00%
Published-11 May, 2020 | 19:19
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec Endpoint Protection Manager, prior to 14.3, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-endpoint_protection_managerSymantec Endpoint Protection Manager
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-5829
Matching Score-4
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-4
Assigner-Symantec - A Division of Broadcom
CVSS Score-3.3||LOW
EPSS-0.07% / 20.75%
||
7 Day CHG~0.00%
Published-11 Feb, 2020 | 17:11
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-endpoint_protection_managerSymantec Endpoint Protection Manager (SEPM)
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-5828
Matching Score-4
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-4
Assigner-Symantec - A Division of Broadcom
CVSS Score-3.3||LOW
EPSS-0.07% / 20.75%
||
7 Day CHG~0.00%
Published-11 Feb, 2020 | 17:11
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-endpoint_protection_managerSymantec Endpoint Protection Manager (SEPM)
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-5830
Matching Score-4
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-4
Assigner-Symantec - A Division of Broadcom
CVSS Score-3.3||LOW
EPSS-0.07% / 20.75%
||
7 Day CHG~0.00%
Published-11 Feb, 2020 | 17:12
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-endpoint_protection_managerSymantec Endpoint Protection Manager (SEPM)
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-5827
Matching Score-4
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-4
Assigner-Symantec - A Division of Broadcom
CVSS Score-3.3||LOW
EPSS-0.07% / 20.75%
||
7 Day CHG~0.00%
Published-11 Feb, 2020 | 17:09
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-endpoint_protection_managerSymantec Endpoint Protection Manager (SEPM)
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-5831
Matching Score-4
Assigner-Symantec - A Division of Broadcom
ShareView Details
Matching Score-4
Assigner-Symantec - A Division of Broadcom
CVSS Score-3.3||LOW
EPSS-0.07% / 20.75%
||
7 Day CHG~0.00%
Published-11 Feb, 2020 | 17:12
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-endpoint_protection_managerSymantec Endpoint Protection Manager (SEPM)
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-20855
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-3.3||LOW
EPSS-0.11% / 29.36%
||
7 Day CHG~0.00%
Published-26 Jul, 2019 | 04:39
Updated-05 Aug, 2024 | 12:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncNetApp, Inc.openSUSE
Product-linux_kernelactive_iq_unified_managerdata_availability_servicesactive_iq_performance_analytics_serviceselement_softwareleapn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-16866
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.06% / 18.83%
||
7 Day CHG~0.00%
Published-11 Jan, 2019 | 19:00
Updated-09 Jun, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

Action-Not Available
Vendor-systemd_projectThe systemd ProjectNetApp, Inc.Canonical Ltd.Debian GNU/LinuxRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxenterprise_linux_server_update_services_for_sap_solutionsenterprise_linux_server_ausenterprise_linuxsystemdenterprise_linux_for_ibm_z_systems_\(structure_a\)enterprise_linux_desktopactive_iq_performance_analytics_servicesenterprise_linux_compute_node_euselement_softwareenterprise_linux_for_scientific_computingdebian_linuxenterprise_linux_workstationenterprise_linux_for_power_little_endian_eusenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutionsenterprise_linux_for_power_big_endian_eusenterprise_linux_server_tusenterprise_linux_for_power_little_endianenterprise_linux_for_ibm_z_systems_eusenterprise_linux_for_power_big_endiansystemd
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Details not found