Show filters
231 Total Results
Displaying 31-40 of 231
Sort by:
Attacker Value
Unknown
CVE-2022-0361
Disclosure Date: January 26, 2022 (last updated February 23, 2025)
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
0
Attacker Value
Unknown
CVE-2022-0359
Disclosure Date: January 26, 2022 (last updated February 23, 2025)
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
0
Attacker Value
Unknown
CVE-2022-0318
Disclosure Date: January 21, 2022 (last updated February 23, 2025)
Heap-based Buffer Overflow in vim/vim prior to 8.2.
0
Attacker Value
Unknown
CVE-2022-0261
Disclosure Date: January 18, 2022 (last updated February 23, 2025)
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
0
Attacker Value
Unknown
CVE-2022-0213
Disclosure Date: January 14, 2022 (last updated February 23, 2025)
vim is vulnerable to Heap-based Buffer Overflow
0
Attacker Value
Unknown
CVE-2021-34945
Disclosure Date: January 13, 2022 (last updated February 23, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15054.
0
Attacker Value
Unknown
CVE-2021-34938
Disclosure Date: January 13, 2022 (last updated February 23, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14995.
0
Attacker Value
Unknown
CVE-2021-34907
Disclosure Date: January 13, 2022 (last updated February 23, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14880.
0
Attacker Value
Unknown
CVE-2021-34905
Disclosure Date: January 13, 2022 (last updated February 23, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14878.
0
Attacker Value
Unknown
CVE-2021-34904
Disclosure Date: January 13, 2022 (last updated February 23, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14877.
0