CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. |
Microsoft Office Graphics Remote Code Execution Vulnerability |
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability |
Windows Resilient File System (ReFS) Information Disclosure Vulnerability |
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Remote Desktop Protocol Client Information Disclosure Vulnerability |
Buffer over-read in Windows NTFS allows an unauthorized attacker to disclose information locally. |
The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.
This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x.
Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js. |
jq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function `jv_string_vfmt` in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 `void* p = malloc(sz);`. As of time of publication, no patched versions are available. |
Buffer over-read in PostgreSQL GB18030 encoding validation allows a database input provider to achieve temporary denial of service on platforms where a 1-byte over-read can elicit process termination. This affects the database server and also libpq. Versions before PostgreSQL 17.5, 16.9, 15.13, 14.18, and 13.21 are affected. |
Transient DOS while parsing ieee80211_parse_mscs_ie in WIN WLAN driver. |
Improper register access control in ASP may allow a privileged attacker to perform unauthorized access to ASP’s Crypto Co-Processor (CCP) registers from x86, resulting in potential loss of control of cryptographic key pointer/index, leading to loss of integrity or confidentiality. |
A buffer over-read in Fortinet FortiOS versions 7.4.0 through 7.4.3, versions 7.2.0 through 7.2.7, and versions 7.0.0 through 7.0.14 may allow a remote unauthenticated attacker to crash the FGFM daemon via a specially crafted request, under rare conditions that are outside of the attacker's control. |
Information disclosure may occur while decoding the RTP packet with invalid header extension from network. |
Information disclosure when an invalid RTCP packet is received during a VoLTE/VoWiFi IMS call. |
Information disclosure may occur while processing goodbye RTCP packet from network. |
Transient DOS while processing the EHT operation IE in the received beacon frame. |
Transient DOS in Data Modem during DTLS handshake. |
In the Linux kernel, the following vulnerability has been resolved:
riscv: prevent pt_regs corruption for secondary idle threads
Top of the kernel thread stack should be reserved for pt_regs. However
this is not the case for the idle threads of the secondary boot harts.
Their stacks overlap with their pt_regs, so both may get corrupted.
Similar issue has been fixed for the primary hart, see c7cdd96eca28
("riscv: prevent stack corruption by reserving task_pt_regs(p) early").
However that fix was not propagated to the secondary harts. The problem
has been noticed in some CPU hotplug tests with V enabled. The function
smp_callin stored several registers on stack, corrupting top of pt_regs
structure including status field. As a result, kernel attempted to save
or restore inexistent V context. |