Filtered by CWE-120
Total 4230 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-54328 1 Aimonesoft 1 Aimone Video Converter 2026-02-02 6.5 Medium
AimOne Video Converter 2.04 Build 103 contains a buffer overflow vulnerability in its registration form that causes application crashes. Attackers can generate a 7000-byte payload to trigger the denial of service and potentially exploit the software's registration mechanism.
CVE-2025-59947 1 Emqx 1 Nanomq 2026-01-30 9.0 Critical
NanoMQ is a messaging broker/bus for IoT Edge & SDV. Versions prior to 0.24.4 have a buffer overflow case while the PUBLISH packets trigger both shared subscription and vanila subscription. This is fixed in version 0.24.4. As a workaround, disable shared subscription.
CVE-2020-36995 1 Telnet-lite 1 Mocha Telnet Lite 2026-01-30 7.5 High
Mocha Telnet Lite for iOS 4.2 contains a denial of service vulnerability that allows attackers to crash the application by manipulating the user configuration input. Attackers can overwrite the 'User' field with 350 bytes of repeated characters to trigger an application crash and prevent normal functionality.
CVE-2020-37010 1 Bearshare 1 Bearshare Lite 2026-01-30 9.8 Critical
BearShare Lite 5.2.5 contains a buffer overflow vulnerability in the Advanced Search keywords input that allows attackers to execute arbitrary code. Attackers can craft a specially designed payload to overwrite the EIP register and execute shellcode by pasting malicious content into the search keywords field.
CVE-2020-36940 1 Tucows 1 Easy Cd & Dvd Cover Creator 2026-01-29 9.8 Critical
Easy CD & DVD Cover Creator 4.13 contains a buffer overflow vulnerability in the serial number input field that allows attackers to crash the application. Attackers can generate a 6000-byte payload and paste it into the serial number field to trigger an application crash.
CVE-2025-14187 1 Ugreen 1 Dh2100+ 2026-01-28 7.2 High
A weakness has been identified in UGREEN DH2100+ up to 5.3.0.251125. This affects the function handler_file_backup_create of the file /v1/file/backup/create of the component nas_svr. Executing a manipulation of the argument path can lead to buffer overflow. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. It is recommended to upgrade the affected component.
CVE-2025-47334 1 Qualcomm 293 Csra6620, Csra6620 Firmware, Csra6640 and 290 more 2026-01-27 6.7 Medium
Memory corruption while processing shared command buffer packet between camera userspace and kernel.
CVE-2025-47335 1 Qualcomm 91 Fastconnect 6700, Fastconnect 6700 Firmware, Fastconnect 6900 and 88 more 2026-01-27 6.7 Medium
Memory corruption while parsing clock configuration data for a specific hardware type.
CVE-2026-24823 1 Fastshift 1 X-track 2026-01-27 N/A
Out-of-bounds Write, Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in FASTSHIFT X-TRACK (Software/X-Track/USER/App/Utils/lv_img_png/PNGdec/src modules). This vulnerability is associated with program files inflate.C. This issue affects X-TRACK: through v2.7.
CVE-2026-24799 1 Davisking 1 Dlib 2026-01-27 N/A
Out-of-bounds Write, Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in davisking dlib (dlib/external/zlib modules). This vulnerability is associated with program files inflate.C. This issue affects dlib: before v19.24.9.
CVE-2026-24810 1 Rethinkdb 1 Rethinkdb 2026-01-27 N/A
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in rethinkdb (src/cjson modules). This vulnerability is associated with program files cJSON.Cc. This issue affects rethinkdb: through v2.4.4.
CVE-2026-24800 1 Tildearrow 1 Furnace 2026-01-27 N/A
Out-of-bounds Write, Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in tildearrow furnace (extern/zlib modules). This vulnerability is associated with program files inflate.C.
CVE-2026-24344 1 Actions-micro 2 Ezcast Pro Ii, Ezcast Pro Ii Firmware 2026-01-27 N/A
Multiple Buffer Overflows in Admin UI of EZCast Pro II version 1.17478.146 allow attackers to cause a program crash and potential remote code execution
CVE-2025-47321 1 Qualcomm 231 Ar8031, Ar8031 Firmware, Ar8035 and 228 more 2026-01-27 7.8 High
Memory corruption while copying packets received from unix clients.
CVE-2025-47388 1 Qualcomm 91 Fastconnect 6200, Fastconnect 6200 Firmware, Fastconnect 6700 and 88 more 2026-01-27 7.8 High
Memory corruption while passing pages to DSP with an unaligned starting address.
CVE-2025-47394 1 Qualcomm 91 Fastconnect 6200, Fastconnect 6200 Firmware, Fastconnect 6700 and 88 more 2026-01-27 7.8 High
Memory corruption when copying overlapping buffers during memory operations due to incorrect offset calculations.
CVE-2025-69209 1 Arduino 1 Arduino Core 2026-01-26 N/A
ArduinoCore-avr contains the source code and configuration files of the Arduino AVR Boards platform. A vulnerability in versions prior to 1.8.7 allows an attacker to trigger a stack-based buffer overflow when converting floating-point values to strings with high precision. By passing very large `decimalPlaces` values to the affected String constructors or concat methods, the `dtostrf` function writes beyond fixed-size stack buffers, causing memory corruption and denial of service. Under specific conditions, this could enable arbitrary code execution on AVR-based Arduino boards. ### Patches - The Fix is included starting from the `1.8.7` release available from the following link [ArduinoCore-avr v1.8.7](https://github.com/arduino/ArduinoCore-avr) - The Fixing Commit is available at the following link [1a6a417f89c8901dad646efce74ae9d3ddebfd59](https://github.com/arduino/ArduinoCore-avr/pull/613/commits/1a6a417f89c8901dad646efce74ae9d3ddebfd59) ### References - [ASEC-26-001 ArduinoCore-avr vXXXX Resolves Buffer Overflow Vulnerability](https://support.arduino.cc/hc/en-us/articles/XXXXX) ### Credits - Maxime Rossi Bellom and Ramtine Tofighi Shirazi from SecMate (https://secmate.dev/)
CVE-2021-47854 1 Dd-wrt 1 Dd-wrt 2026-01-26 9.8 Critical
DD-WRT version 45723 contains a buffer overflow vulnerability in the UPNP network discovery service that allows remote attackers to potentially execute arbitrary code. Attackers can send crafted M-SEARCH packets with oversized UUID payloads to trigger buffer overflow conditions on the target device.
CVE-2022-48620 1 Troglobit 1 Libeuv 2026-01-25 9.8 Critical
uev (aka libuev) before 2.4.1 has a buffer overflow in epoll_wait if maxevents is a large number.
CVE-2024-39543 2 Juniper, Juniper Networks 4 Junos, Junos Os Evolved, Junos Os and 1 more 2026-01-23 6.5 Medium
A Buffer Copy without Checking Size of Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to send specific RPKI-RTR packets resulting in a crash, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects  Junos OS:  * All versions before 21.2R3-S8,  * from 21.4 before 21.4R3-S8, * from 22.2 before 22.2R3-S4,  * from 22.3 before 22.3R3-S3,  * from 22.4 before 22.4R3-S2,  * from 23.2 before 23.2R2-S1,  * from 23.4 before 23.4R2. Junos OS Evolved: * All versions before 21.2R3-S8-EVO, * from 21.4 before 21.4R3-S8-EVO, * from 22.2 before 22.2R3-S4-EVO,  * from 22.3 before 22.3R3-S3-EVO, * from 22.4 before 22.4R3-S2-EVO,  * from 23.2 before 23.2R2-S1-EVO, * from 23.4 before 23.4R2-EVO.