Show filters
506 Total Results
Displaying 101-110 of 506
Sort by:
Attacker Value
Unknown

CVE-2022-34667

Disclosure Date: November 19, 2022 (last updated February 24, 2025)
NVIDIA CUDA Toolkit SDK contains a stack-based buffer overflow vulnerability in cuobjdump, where an unprivileged remote attacker could exploit this buffer overflow condition by persuading a local user to download a specially crafted corrupted file and execute cuobjdump against it locally, which may lead to a limited denial of service and some loss of data integrity for the local user.
Attacker Value
Unknown

CVE-2022-41664

Disclosure Date: November 08, 2022 (last updated February 24, 2025)
A vulnerability has been identified in JT2Go (All versions < V14.1.0.4), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.7), Teamcenter Visualization V14.0 (All versions < V14.0.0.3), Teamcenter Visualization V14.1 (All versions < V14.1.0.4). The affected application contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process.
Attacker Value
Unknown

CVE-2022-3386

Disclosure Date: October 27, 2022 (last updated February 24, 2025)
Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can use an outsized filename to overflow the stack buffer and enable remote code execution.
Attacker Value
Unknown

CVE-2022-3385

Disclosure Date: October 27, 2022 (last updated February 24, 2025)
Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can remotely overflow the stack buffer and enable remote code execution.
Attacker Value
Unknown

CVE-2021-26731

Disclosure Date: October 24, 2022 (last updated February 24, 2025)
Command injection and multiple stack-based buffer overflows vulnerabilities in the modifyUserb_func function of spx_restservice allow an authenticated attacker to execute arbitrary code with the same privileges as the server user (root). This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
Attacker Value
Unknown

CVE-2021-26730

Disclosure Date: October 24, 2022 (last updated February 24, 2025)
A stack-based buffer overflow vulnerability in a subfunction of the Login_handler_func function of spx_restservice allows an attacker to execute arbitrary code with the same privileges as the server user (root). This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
Attacker Value
Unknown

CVE-2021-26729

Disclosure Date: October 24, 2022 (last updated February 24, 2025)
Command injection and multiple stack-based buffer overflows vulnerabilities in the Login_handler_func function of spx_restservice allow an attacker to execute arbitrary code with the same privileges as the server user (root). This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
Attacker Value
Unknown

CVE-2021-26728

Disclosure Date: October 24, 2022 (last updated February 24, 2025)
Command injection and stack-based buffer overflow vulnerabilities in the KillDupUsr_func function of spx_restservice allow an attacker to execute arbitrary code with the same privileges as the server user (root). This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
Attacker Value
Unknown

CVE-2021-26727

Disclosure Date: October 24, 2022 (last updated February 24, 2025)
Multiple command injections and stack-based buffer overflows vulnerabilities in the SubNet_handler_func function of spx_restservice allow an attacker to execute arbitrary code with the same privileges as the server user (root). This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
Attacker Value
Unknown

CVE-2022-23462

Disclosure Date: October 21, 2022 (last updated February 24, 2025)
IOWOW is a C utility library and persistent key/value storage engine. Versions 1.4.15 and prior contain a stack buffer overflow vulnerability that allows for Denial of Service (DOS) when it parses scientific notation numbers present in JSON. A patch for this issue is available at commit a79d31e4cff1d5a08f665574b29fd885897a28fd in the `master` branch of the repository. There are no workarounds other than applying the patch.