Show filters
506 Total Results
Displaying 101-110 of 506
Sort by:
Attacker Value
Unknown
CVE-2022-34667
Disclosure Date: November 19, 2022 (last updated February 24, 2025)
NVIDIA CUDA Toolkit SDK contains a stack-based buffer overflow vulnerability in cuobjdump, where an unprivileged remote attacker could exploit this buffer overflow condition by persuading a local user to download a specially crafted corrupted file and execute cuobjdump against it locally, which may lead to a limited denial of service and some loss of data integrity for the local user.
0
Attacker Value
Unknown
CVE-2022-41664
Disclosure Date: November 08, 2022 (last updated February 24, 2025)
A vulnerability has been identified in JT2Go (All versions < V14.1.0.4), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.7), Teamcenter Visualization V14.0 (All versions < V14.0.0.3), Teamcenter Visualization V14.1 (All versions < V14.1.0.4). The affected application contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process.
0
Attacker Value
Unknown
CVE-2022-3386
Disclosure Date: October 27, 2022 (last updated February 24, 2025)
Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can use an outsized filename to overflow the stack buffer and enable remote code execution.
0
Attacker Value
Unknown
CVE-2022-3385
Disclosure Date: October 27, 2022 (last updated February 24, 2025)
Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can remotely overflow the stack buffer and enable remote code execution.
0
Attacker Value
Unknown
CVE-2021-26731
Disclosure Date: October 24, 2022 (last updated February 24, 2025)
Command injection and multiple stack-based buffer overflows vulnerabilities in the modifyUserb_func function of spx_restservice allow an authenticated attacker to execute arbitrary code with the same privileges as the server user (root). This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
0
Attacker Value
Unknown
CVE-2021-26730
Disclosure Date: October 24, 2022 (last updated February 24, 2025)
A stack-based buffer overflow vulnerability in a subfunction of the Login_handler_func function of spx_restservice allows an attacker to execute arbitrary code with the same privileges as the server user (root). This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
0
Attacker Value
Unknown
CVE-2021-26729
Disclosure Date: October 24, 2022 (last updated February 24, 2025)
Command injection and multiple stack-based buffer overflows vulnerabilities in the Login_handler_func function of spx_restservice allow an attacker to execute arbitrary code with the same privileges as the server user (root). This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
0
Attacker Value
Unknown
CVE-2021-26728
Disclosure Date: October 24, 2022 (last updated February 24, 2025)
Command injection and stack-based buffer overflow vulnerabilities in the KillDupUsr_func function of spx_restservice allow an attacker to execute arbitrary code with the same privileges as the server user (root). This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
0
Attacker Value
Unknown
CVE-2021-26727
Disclosure Date: October 24, 2022 (last updated February 24, 2025)
Multiple command injections and stack-based buffer overflows vulnerabilities in the SubNet_handler_func function of spx_restservice allow an attacker to execute arbitrary code with the same privileges as the server user (root). This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
0
Attacker Value
Unknown
CVE-2022-23462
Disclosure Date: October 21, 2022 (last updated February 24, 2025)
IOWOW is a C utility library and persistent key/value storage engine. Versions 1.4.15 and prior contain a stack buffer overflow vulnerability that allows for Denial of Service (DOS) when it parses scientific notation numbers present in JSON. A patch for this issue is available at commit a79d31e4cff1d5a08f665574b29fd885897a28fd in the `master` branch of the repository. There are no workarounds other than applying the patch.
0