CVE-2024-35333

CVSS v3 Score
8.4
High

Vulnerability Description

A stack-buffer-overflow vulnerability exists in the read_charset_decl function of html2xhtml 1.3. This vulnerability occurs due to improper bounds checking when copying data into a fixed-size stack buffer. An attacker can exploit this vulnerability by providing a specially crafted input to the vulnerable function, causing a buffer overflow and potentially leading to arbitrary code execution, denial of service, or data corruption.

CVSS:8.4(High)

An issue was found on the Ruijie EG-2000 series gateway. There is a buffer overflow in client.so. Consequently, an attacker can use login.php to login to any account, without providing its password. T...

CVSS:8.4(High)

Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.

CVSS:8.4(High)

Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.

CVSS:8.4(High)

A stack buffer overflow occurs in libc/posix/ipc/mqueue.c in RT-Thread through 5.0.2.

CVSS:8.4(High)

Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to execute arbitrary code via the AssignPixel() function when reading images in TIFF format.

CVSS:8.4(High)

Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to execute arbitrary code via the ReadData() function when reading images in RAS format.