Show filters
720 Total Results
Displaying 181-190 of 720
Sort by:
Attacker Value
Unknown

CVE-2022-0650

Disclosure Date: March 28, 2023 (last updated February 24, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR940N 3.20.1 Build 200316 Rel.34392n (5553) routers. Authentication is required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13993.
Attacker Value
Unknown

CVE-2022-0194

Disclosure Date: March 28, 2023 (last updated February 24, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ad_addcomment function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15876.
Attacker Value
Unknown

CVE-2023-1646

Disclosure Date: March 26, 2023 (last updated February 24, 2025)
A vulnerability was found in IObit Malware Fighter 9.4.0.776. It has been declared as critical. This vulnerability affects the function 0x8018E000/0x8018E004 in the library IMFCameraProtect.sys of the component IOCTL Handler. The manipulation leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. VDB-224026 is the identifier assigned to this vulnerability.
Attacker Value
Unknown

CVE-2023-26337

Disclosure Date: March 14, 2023 (last updated February 24, 2025)
Adobe Dimension versions 3.4.7 (and earlier) is affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Attacker Value
Unknown

CVE-2023-27590

Disclosure Date: March 14, 2023 (last updated February 24, 2025)
Rizin is a UNIX-like reverse engineering framework and command-line toolset. In version 0.5.1 and prior, converting a GDB registers profile file into a Rizin register profile can result in a stack-based buffer overflow when the `name`, `type`, or `groups` fields have longer values than expected. Users opening untrusted GDB registers files (e.g. with the `drpg` or `arpg` commands) are affected by this flaw. Commit d6196703d89c84467b600ba2692534579dc25ed4 contains a patch for this issue. As a workaround, review the GDB register profiles before loading them with `drpg`/`arpg` commands.
Attacker Value
Unknown

CVE-2023-27406

Disclosure Date: March 14, 2023 (last updated February 24, 2025)
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application is vulnerable to stack-based buffer while parsing specially crafted SPP files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-20449)
Attacker Value
Unknown

CVE-2023-27404

Disclosure Date: March 14, 2023 (last updated February 24, 2025)
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application is vulnerable to stack-based buffer while parsing specially crafted SPP files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-20433)
Attacker Value
Unknown

CVE-2023-27498

Disclosure Date: March 14, 2023 (last updated February 24, 2025)
SAP Host Agent (SAPOSCOL) - version 7.22, allows an unauthenticated attacker with network access to a server port assigned to the SAP Start Service to submit a crafted request which results in a memory corruption error. This error can be used to reveal but not modify any technical information about the server. It can also make a particular service temporarily unavailable
Attacker Value
Unknown

CVE-2022-33260

Disclosure Date: March 10, 2023 (last updated February 24, 2025)
Memory corruption due to stack based buffer overflow in core while sending command from USB of large size.
Attacker Value
Unknown

CVE-2022-33213

Disclosure Date: March 10, 2023 (last updated February 24, 2025)
Memory corruption in modem due to buffer overflow while processing a PPP packet