Filtered by CWE-191
Total 327 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-3077 1 Zephyrproject 1 Zephyr 2025-01-23 6.8 Medium
An malicious BLE device can crash BLE victim device by sending malformed gatt packet
CVE-2024-38063 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-01-23 9.8 Critical
Windows TCP/IP Remote Code Execution Vulnerability
CVE-2024-28933 1 Microsoft 5 Odbc Driver For Sql Server, Sql Server 2019, Sql Server 2022 and 2 more 2025-01-23 8.8 High
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28930 1 Microsoft 5 Odbc Driver For Sql Server, Sql Server 2019, Sql Server 2022 and 2 more 2025-01-23 8.8 High
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-26208 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2025-01-23 7.2 High
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2024-26244 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2025-01-23 8.8 High
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-28945 1 Microsoft 3 Ole Db Driver For Sql Server, Sql Server 2019, Sql Server 2022 2025-01-23 8.8 High
Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2023-28293 1 Microsoft 12 Windows 10 1607, Windows 10 1809, Windows 10 20h2 and 9 more 2025-01-23 7.8 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-28250 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-01-23 9.8 Critical
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVE-2023-28272 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-01-23 7.8 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-28247 1 Microsoft 4 Windows Server 2012, Windows Server 2016, Windows Server 2019 and 1 more 2025-01-23 7.5 High
Windows Network File System Information Disclosure Vulnerability
CVE-2024-30008 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-01-16 5.5 Medium
Windows DWM Core Library Information Disclosure Vulnerability
CVE-2024-35980 1 Linux 1 Linux Kernel 2025-01-16 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: arm64: tlb: Fix TLBI RANGE operand KVM/arm64 relies on TLBI RANGE feature to flush TLBs when the dirty pages are collected by VMM and the page table entries become write protected during live migration. Unfortunately, the operand passed to the TLBI RANGE instruction isn't correctly sorted out due to the commit 117940aa6e5f ("KVM: arm64: Define kvm_tlb_flush_vmid_range()"). It leads to crash on the destination VM after live migration because TLBs aren't flushed completely and some of the dirty pages are missed. For example, I have a VM where 8GB memory is assigned, starting from 0x40000000 (1GB). Note that the host has 4KB as the base page size. In the middile of migration, kvm_tlb_flush_vmid_range() is executed to flush TLBs. It passes MAX_TLBI_RANGE_PAGES as the argument to __kvm_tlb_flush_vmid_range() and __flush_s2_tlb_range_op(). SCALE#3 and NUM#31, corresponding to MAX_TLBI_RANGE_PAGES, isn't supported by __TLBI_RANGE_NUM(). In this specific case, -1 has been returned from __TLBI_RANGE_NUM() for SCALE#3/2/1/0 and rejected by the loop in the __flush_tlb_range_op() until the variable @scale underflows and becomes -9, 0xffff708000040000 is set as the operand. The operand is wrong since it's sorted out by __TLBI_VADDR_RANGE() according to invalid @scale and @num. Fix it by extending __TLBI_RANGE_NUM() to support the combination of SCALE#3 and NUM#31. With the changes, [-1 31] instead of [-1 30] can be returned from the macro, meaning the TLBs for 0x200000 pages in the above example can be flushed in one shoot with SCALE#3 and NUM#31. The macro TLBI_RANGE_MASK is dropped since no one uses it any more. The comments are also adjusted accordingly.
CVE-2023-24817 1 Riot-os 1 Riot 2025-01-10 7.5 High
RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2023.04, an attacker can send a crafted frame to the device resulting in an integer underflow and out of bounds access in the packet buffer. Triggering the access at the right time will corrupt other packets or the allocator metadata. Corrupting a pointer will lead to denial of service. This issue is fixed in version 2023.04. As a workaround, disable SRH in the network stack.
CVE-2024-57823 1 Redhat 6 Enterprise Linux, Rhel Aus, Rhel E4s and 3 more 2025-01-10 9.3 Critical
In Raptor RDF Syntax Library through 2.0.16, there is an integer underflow when normalizing a URI with the turtle parser in raptor_uri_normalize_path().
CVE-2018-5852 1 Qualcomm 46 Mdm9206, Mdm9206 Firmware, Mdm9607 and 43 more 2025-01-09 8.4 High
An unsigned integer underflow vulnerability in IPA driver result into a buffer over-read while reading NAT entry using debugfs command 'cat /sys/kernel/debug/ipa/ip4_nat'
CVE-2024-46758 2025-01-09 5.5 Medium
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2024-46757 2025-01-09 7.8 High
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2024-46756 2025-01-09 4.4 Medium
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2024-55627 2025-01-06 5.9 Medium
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a specially crafted TCP stream can lead to a very large buffer overflow while being zero-filled during initialization with memset due to an unsigned integer underflow. The issue has been addressed in Suricata 7.0.8.