Show filters
1,261 Total Results
Displaying 211-220 of 1,261
Sort by:
Attacker Value
Unknown

CVE-2022-34376

Disclosure Date: February 10, 2023 (last updated February 24, 2025)
Dell PowerEdge BIOS and Dell Precision BIOS contain an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by manipulating an SMI to cause a denial of service during SMM.
Attacker Value
Unknown

CVE-2023-0251

Disclosure Date: February 08, 2023 (last updated February 24, 2025)
Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to a buffer overflow through improper restrictions of operations within memory, which could allow an attacker to remotely execute arbitrary code.
Attacker Value
Unknown

CVE-2022-43762

Disclosure Date: February 08, 2023 (last updated February 24, 2025)
 Lack of verification in B&R APROL Tbase server versions < R 4.2-07 may lead to memory leaks when receiving messages
Attacker Value
Unknown

CVE-2023-20605

Disclosure Date: February 06, 2023 (last updated February 24, 2025)
In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07550104; Issue ID: ALPS07550104.
Attacker Value
Unknown

CVE-2022-41342

Disclosure Date: February 06, 2023 (last updated February 24, 2025)
Improper buffer restrictions in the Intel(R) C++ Compiler Classic before version 2021.7.1 for some Intel(R) oneAPI Toolkits before version 2022.3.1 may allow a privileged user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2023-0637

Disclosure Date: February 02, 2023 (last updated February 24, 2025)
A vulnerability, which was classified as critical, was found in TRENDnet TEW-811DRU 1.0.10.0. This affects an unknown part of the file wan.asp of the component Web Management Interface. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220017 was assigned to this vulnerability.
Attacker Value
Unknown

CVE-2023-0618

Disclosure Date: February 01, 2023 (last updated February 24, 2025)
A vulnerability was found in TRENDnet TEW-652BRP 3.04B01. It has been declared as critical. This vulnerability affects unknown code of the file cfg_op.ccp of the component Web Service. The manipulation leads to memory corruption. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-219958 is the identifier assigned to this vulnerability.
Attacker Value
Unknown

CVE-2023-0613

Disclosure Date: February 01, 2023 (last updated February 24, 2025)
A vulnerability has been found in TRENDnet TEW-811DRU 1.0.10.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /wireless/security.asp of the component httpd. The manipulation leads to memory corruption. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219937 was assigned to this vulnerability.
Attacker Value
Unknown

CVE-2022-42418

Disclosure Date: January 26, 2023 (last updated February 24, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of TIF files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18677.
Attacker Value
Unknown

CVE-2022-42396

Disclosure Date: January 26, 2023 (last updated February 24, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XPS files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18278.