Show filters
231 Total Results
Displaying 31-40 of 231
Sort by:
Attacker Value
Unknown

CVE-2022-0361

Disclosure Date: January 26, 2022 (last updated February 23, 2025)
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Attacker Value
Unknown

CVE-2022-0359

Disclosure Date: January 26, 2022 (last updated February 23, 2025)
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Attacker Value
Unknown

CVE-2022-0318

Disclosure Date: January 21, 2022 (last updated February 23, 2025)
Heap-based Buffer Overflow in vim/vim prior to 8.2.
Attacker Value
Unknown

CVE-2022-0261

Disclosure Date: January 18, 2022 (last updated February 23, 2025)
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Attacker Value
Unknown

CVE-2022-0213

Disclosure Date: January 14, 2022 (last updated February 23, 2025)
vim is vulnerable to Heap-based Buffer Overflow
Attacker Value
Unknown

CVE-2021-34945

Disclosure Date: January 13, 2022 (last updated February 23, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15054.
Attacker Value
Unknown

CVE-2021-34938

Disclosure Date: January 13, 2022 (last updated February 23, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14995.
Attacker Value
Unknown

CVE-2021-34907

Disclosure Date: January 13, 2022 (last updated February 23, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14880.
Attacker Value
Unknown

CVE-2021-34905

Disclosure Date: January 13, 2022 (last updated February 23, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14878.
Attacker Value
Unknown

CVE-2021-34904

Disclosure Date: January 13, 2022 (last updated February 23, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14877.