Vulnerabilities (CVE)

Filtered by CWE-787
Total 11736 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-0231 1 Google 1 Android 2020-07-21 7.5 HIGH 9.8 CRITICAL
There is a possible out of bounds write due to an incorrect bounds check. Product: AndroidVersions: Android SoCAndroid ID: A-156333727
CVE-2011-0495 3 Debian, Digium, Fedoraproject 6 Debian Linux, Asterisk, Asterisknow and 3 more 2020-07-15 6.0 MEDIUM N/A
Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function.
CVE-2018-16999 1 Nasm 1 Netwide Assembler 2020-07-13 4.3 MEDIUM 5.5 MEDIUM
Netwide Assembler (NASM) 2.14rc15 has an invalid memory write (segmentation fault) in expand_smacro in preproc.c, which allows attackers to cause a denial of service via a crafted input file.
CVE-2020-14482 1 Deltaww 1 Dopsoft 2020-07-10 6.8 MEDIUM 7.8 HIGH
Delta Industrial Automation DOPSoft, Version 4.00.08.15 and prior. Opening a specially crafted project file may overflow the heap, which may allow remote code execution, disclosure/modification of information, or cause the application to crash.
CVE-2019-19505 1 Tendacn 2 Pa6, Pa6 Firmware 2020-07-08 9.0 HIGH 8.8 HIGH
Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the "Wireless" section in the web-UI. By sending a specially crafted hostname, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
CVE-2020-15474 1 Ntop 1 Ndpi 2020-07-06 7.5 HIGH 9.8 CRITICAL
In nDPI through 3.2, there is a stack overflow in extractRDNSequence in lib/protocols/tls.c.
CVE-2020-15365 1 Libraw 1 Libraw 2020-07-06 4.3 MEDIUM 6.5 MEDIUM
LibRaw before 0.20-Beta3 has an out-of-bounds write in parse_exif() in metadata\exif_gps.cpp via an unrecognized AtomName and a zero value of tiff_nifds.
CVE-2020-9659 2 Adobe, Microsoft 2 Audition, Windows 2020-07-02 9.3 HIGH 7.8 HIGH
Adobe Audition versions 13.0.6 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-9654 2 Adobe, Microsoft 2 Premiere Pro, Windows 2020-07-02 9.3 HIGH 7.8 HIGH
Adobe Premiere Pro versions 14.2 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-9653 2 Adobe, Microsoft 2 Premiere Pro, Windows 2020-07-02 9.3 HIGH 7.8 HIGH
Adobe Premiere Pro versions 14.2 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-9657 2 Adobe, Microsoft 2 Premiere Rush, Windows 2020-07-02 9.3 HIGH 7.8 HIGH
Adobe Premiere Rush versions 1.5.12 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-9656 2 Adobe, Microsoft 2 Premiere Rush, Windows 2020-07-02 9.3 HIGH 7.8 HIGH
Adobe Premiere Rush versions 1.5.12 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-9658 2 Adobe, Microsoft 2 Audition, Windows 2020-07-02 9.3 HIGH 7.8 HIGH
Adobe Audition versions 13.0.6 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-9590 2 Adobe, Microsoft 2 Digital Negative Software Development Kit, Windows 2020-07-02 9.3 HIGH 7.8 HIGH
Adobe DNG Software Development Kit (SDK) 1.5 and earlier versions have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2020-9621 2 Adobe, Microsoft 2 Digital Negative Software Development Kit, Windows 2020-07-02 9.3 HIGH 7.8 HIGH
Adobe DNG Software Development Kit (SDK) 1.5 and earlier versions have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2020-9620 2 Adobe, Microsoft 2 Digital Negative Software Development Kit, Windows 2020-07-02 9.3 HIGH 7.8 HIGH
Adobe DNG Software Development Kit (SDK) 1.5 and earlier versions have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2020-9589 2 Adobe, Microsoft 2 Digital Negative Software Development Kit, Windows 2020-07-01 9.3 HIGH 7.8 HIGH
Adobe DNG Software Development Kit (SDK) 1.5 and earlier versions have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2020-14938 1 Freedroid 1 Freedroidrpg 2020-07-01 7.5 HIGH 9.8 CRITICAL
An issue was discovered in map.c in FreedroidRPG 1.0rc2. It assumes lengths of data sets read from saved game files. It copies data from a file into a fixed-size heap-allocated buffer without size verification, leading to a heap-based buffer overflow.
CVE-2020-3967 1 Vmware 4 Cloud Foundation, Esxi, Fusion and 1 more 2020-07-01 4.4 MEDIUM 7.5 HIGH
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain a heap-overflow vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local access to a virtual machine may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible.
CVE-2020-3968 1 Vmware 4 Cloud Foundation, Esxi, Fusion and 1 more 2020-07-01 4.6 MEDIUM 8.2 HIGH
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds write vulnerability in the USB 3.0 controller (xHCI). A malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to crash the virtual machine's vmx process leading to a denial of service condition or execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible.