The UAMQP is a general purpose C library for AMQP 1.0. During a call to open_get_offered_capabilities, a memory allocation may fail causing a use-after-free issue and if a client called it during connection communication it may cause a remote code execution. Users are advised to update the submodule with commit `30865c9c`. There are no known workarounds for this vulnerability.
Max CVSS
9.8
EPSS Score
0.04%
Published
2024-02-12
Updated
2024-02-12
Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack, that is fully integrated with Azure RTOS ThreadX. An attacker can cause remote code execution due to memory buffer and pointer vulnerabilities in Azure RTOS USBX. The affected components include functions/processes in pictbridge and host class, related to PIMA, storage, CDC ACM, ECM, audio, hub in RTOS v6.2.1 and below. The fixes have been included in USBX release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Max CVSS
9.8
EPSS Score
3.23%
Published
2023-12-05
Updated
2023-12-08
Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack, that is fully integrated with Azure RTOS ThreadX. An attacker can cause remote code execution due to out of bounds write vulnerabilities in Azure RTOS USBX. The affected components include functions/processes in host and device classes, related to CDC ECM and RNDIS in RTOS v6.2.1 and below. The fixes have been included in USBX release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Max CVSS
9.8
EPSS Score
0.92%
Published
2023-12-05
Updated
2023-12-08
Azure RTOS NetX Duo is a TCP/IP network stack designed specifically for deeply embedded real-time and IoT applications. An attacker can cause remote code execution due to memory overflow vulnerabilities in Azure RTOS NETX Duo. The affected components include processes/functions related to icmp, tcp, snmp, dhcp, nat and ftp in RTOS v6.2.1 and below. The fixes have been included in NetX Duo release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Max CVSS
9.8
EPSS Score
0.92%
Published
2023-12-05
Updated
2023-12-08
Azure RTOS NetX Duo is a TCP/IP network stack designed specifically for deeply embedded real-time and IoT applications. An attacker can cause an out-of-bounds write in Azure RTOS NETX Duo, that could lead to remote code execution. The affected components include process related to IGMP protocol in RTOS v6.2.1 and below. The fix has been included in NetX Duo release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Max CVSS
9.8
EPSS Score
0.92%
Published
2023-12-05
Updated
2023-12-08
Azure RTOS NetX Duo is a TCP/IP network stack designed specifically for deeply embedded real-time and IoT applications. An attacker can cause remote code execution due to memory overflow vulnerabilities in Azure RTOS NETX Duo. The affected components include processes/functions related to snmp, smtp, ftp and dtls in RTOS v6.2.1 and below. The fixes have been included in NetX Duo release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Max CVSS
9.8
EPSS Score
0.92%
Published
2023-12-05
Updated
2023-12-08
Azure RTOS NetX Duo is a TCP/IP network stack designed specifically for deeply embedded real-time and IoT applications. An attacker can cause remote code execution due to memory overflow vulnerabilities in Azure RTOS NETX Duo. The affected components include processes/functions related to ftp and sntp in RTOS v6.2.1 and below. The fixes have been included in NetX Duo release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Max CVSS
9.8
EPSS Score
0.92%
Published
2023-12-05
Updated
2023-12-08
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that host name can be is 255 bytes. If the host name is detected to be longer, curl switches to local name resolving and instead passes on the resolved address only. Due to this bug, the local variable that means "let the host resolve the name" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long host name to the target buffer instead of copying just the resolved address there. The target buffer being a heap based buffer, and the host name coming from the URL that curl has been told to operate with.
Max CVSS
9.8
EPSS Score
0.18%
Published
2023-10-18
Updated
2024-04-01
Windows Scripting Engine Memory Corruption Vulnerability
Max CVSS
8.8
EPSS Score
0.31%
Published
2023-11-14
Updated
2023-11-20
Memory corruption in Core Services while executing the command for removing a single event listener.
Max CVSS
9.3
EPSS Score
0.05%
Published
2024-03-04
Updated
2024-04-12

CVE-2023-5217

Known exploited
Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Max CVSS
8.8
EPSS Score
29.61%
Published
2023-09-28
Updated
2024-02-15
CISA KEV Added
2023-10-02

CVE-2023-4863

Known exploited
Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
Max CVSS
8.8
EPSS Score
49.10%
Published
2023-09-12
Updated
2024-01-07
CISA KEV Added
2023-09-13
An out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end of TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can lead to denial of service (crashing the TPM chip/process or rendering it unusable) and/or arbitrary code execution in the TPM context.
Max CVSS
7.8
EPSS Score
0.04%
Published
2023-02-28
Updated
2024-04-01

CVE-2022-41073

Known exploited
Used for ransomware
Windows Print Spooler Elevation of Privilege Vulnerability
Max CVSS
7.8
EPSS Score
0.11%
Published
2022-11-09
Updated
2023-09-06
CISA KEV Added
2022-11-08
Microsoft Windows SMBv3 suffers from a null pointer dereference in versions of Windows prior to the April, 2022 patch set. By sending a malformed FileNormalizedNameInformation SMBv3 request over a named pipe, an attacker can cause a Blue Screen of Death (BSOD) crash of the Windows kernel. For most systems, this attack requires authentication, except in the special case of Windows Domain Controllers, where unauthenticated users can always open named pipes as long as they can establish an SMB session. Typically, after the BSOD, the victim SMBv3 server will reboot.
Max CVSS
7.8
EPSS Score
0.25%
Published
2022-06-14
Updated
2022-06-23
HEIF Image Extensions Remote Code Execution Vulnerability
Max CVSS
7.8
EPSS Score
0.49%
Published
2022-03-09
Updated
2023-06-29
HEVC Video Extensions Remote Code Execution Vulnerability
Max CVSS
7.8
EPSS Score
0.49%
Published
2022-03-09
Updated
2023-06-29
HEVC Video Extensions Remote Code Execution Vulnerability
Max CVSS
7.8
EPSS Score
0.49%
Published
2022-03-09
Updated
2023-06-29
Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
Max CVSS
7.8
EPSS Score
0.04%
Published
2022-07-12
Updated
2023-05-17
Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
Max CVSS
8.8
EPSS Score
0.04%
Published
2022-07-12
Updated
2023-05-17
HEVC Video Extensions Remote Code Execution Vulnerability
Max CVSS
7.8
EPSS Score
0.49%
Published
2022-03-09
Updated
2023-06-29
HEVC Video Extensions Remote Code Execution Vulnerability
Max CVSS
7.8
EPSS Score
0.43%
Published
2022-03-09
Updated
2023-06-29
HEVC Video Extensions Remote Code Execution Vulnerability
Max CVSS
7.8
EPSS Score
0.51%
Published
2022-02-09
Updated
2023-06-29
HEVC Video Extensions Remote Code Execution Vulnerability
Max CVSS
9.3
EPSS Score
2.60%
Published
2022-01-11
Updated
2023-12-21

CVE-2022-21882

Known exploited
Public exploit
Win32k Elevation of Privilege Vulnerability
Max CVSS
7.8
EPSS Score
0.11%
Published
2022-01-11
Updated
2023-12-21
CISA KEV Added
2022-02-04
1946 vulnerabilities found
1 2 3 4 5 6 ...... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!