Show filters
1,625 Total Results
Displaying 301-310 of 1,625
Sort by:
Attacker Value
Unknown
CVE-2024-36728
Disclosure Date: June 03, 2024 (last updated February 26, 2025)
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action vlan_setting with a sufficiently long dns1 or dns 2 key.
0
Attacker Value
Unknown
CVE-2024-34171
Disclosure Date: May 30, 2024 (last updated February 26, 2025)
Fuji Electric Monitouch V-SFT
is vulnerable to a stack-based buffer overflow, which could allow an attacker to execute arbitrary code.
0
Attacker Value
Unknown
CVE-2024-35333
Disclosure Date: May 29, 2024 (last updated February 26, 2025)
A stack-buffer-overflow vulnerability exists in the read_charset_decl function of html2xhtml 1.3. This vulnerability occurs due to improper bounds checking when copying data into a fixed-size stack buffer. An attacker can exploit this vulnerability by providing a specially crafted input to the vulnerable function, causing a buffer overflow and potentially leading to arbitrary code execution, denial of service, or data corruption.
0
Attacker Value
Unknown
CVE-2024-31079
Disclosure Date: May 29, 2024 (last updated February 26, 2025)
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 requests can cause NGINX worker processes to terminate or cause other potential impact. This attack requires that a request be specifically timed during the connection draining process, which the attacker has no visibility and limited influence over.
0
Attacker Value
Unknown
CVE-2024-35403
Disclosure Date: May 28, 2024 (last updated February 26, 2025)
TOTOLINK CP900L v4.1.5cu.798_B20221228 was discovered to contain a stack overflow via the desc parameter in the function setIpPortFilterRules
0
Attacker Value
Unknown
CVE-2024-24963
Disclosure Date: May 28, 2024 (last updated February 26, 2025)
A stack-based buffer overflow vulnerability exists in the Programming Software Connection FileSelect functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to stack-based buffer overflow. An attacker can send an unauthenticated packet to trigger this vulnerability.This CVE tracks the stack-based buffer overflow that occurs at offset `0xb6e84` of v1.2.10.9 of the P3-550E firmware.
0
Attacker Value
Unknown
CVE-2024-24962
Disclosure Date: May 28, 2024 (last updated February 26, 2025)
A stack-based buffer overflow vulnerability exists in the Programming Software Connection FileSelect functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to stack-based buffer overflow. An attacker can send an unauthenticated packet to trigger this vulnerability.This CVE tracks the stack-based buffer overflow that occurs at offset `0xb6e98` of v1.2.10.9 of the P3-550E firmware.
0
Attacker Value
Unknown
CVE-2024-35399
Disclosure Date: May 28, 2024 (last updated February 26, 2025)
TOTOLINK CP900L v4.1.5cu.798_B20221228 was discovered to contain a stack overflow via the password parameter in the function loginAuth
0
Attacker Value
Unknown
CVE-2024-24686
Disclosure Date: May 28, 2024 (last updated February 26, 2025)
Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the parsing of comments within the faces section of an `.off` file processed via the `readOFF` function.
0
Attacker Value
Unknown
CVE-2024-24685
Disclosure Date: May 28, 2024 (last updated February 26, 2025)
Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the parsing of comments within the vertex section of an `.off` file processed via the `readOFF` function.
0