Show filters
39 Total Results
Displaying 1-10 of 39
Sort by:
Attacker Value
High
CVE-2020-3118 (AKA: CDPwn)
Disclosure Date: February 05, 2020 (last updated February 21, 2025)
A vulnerability in the Cisco Discovery Protocol implementation for Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to execute arbitrary code or cause a reload on an affected device. The vulnerability is due to improper validation of string input from certain fields in Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to cause a stack overflow, which could allow the attacker to execute arbitrary code with administrative privileges on an affected device. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
1
Attacker Value
Low
CVE-2020-13160
Disclosure Date: June 09, 2020 (last updated February 21, 2025)
AnyDesk before 5.5.3 on Linux and FreeBSD has a format string vulnerability that can be exploited for remote code execution.
1
Attacker Value
Unknown
CVE-2021-35331
Disclosure Date: July 05, 2021 (last updated February 22, 2025)
In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow code execution via a crafted file. NOTE: multiple third parties dispute the significance of this finding
0
Attacker Value
Unknown
CVE-2021-33535
Disclosure Date: June 23, 2021 (last updated February 22, 2025)
In Weidmueller Industrial WLAN devices in multiple versions an exploitable format string vulnerability exists in the iw_console conio_writestr functionality. A specially crafted time server entry can cause an overflow of the time server buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2021-29740
Disclosure Date: May 31, 2021 (last updated February 22, 2025)
IBM Spectrum Scale 5.0.0 through 5.0.5.6 and 5.1.0 through 5.1.0.3 system core component is affected by a format string security vulnerability. An attacker could execute arbitrary code in the context of process memory, potentially escalating their system privileges and taking control over the entire system with root access. IBM X-Force ID: 201474.
0
Attacker Value
Unknown
CVE-2021-30145
Disclosure Date: May 18, 2021 (last updated February 22, 2025)
A format string vulnerability in mpv through 0.33.0 allows user-assisted remote attackers to achieve code execution via a crafted m3u playlist file.
0
Attacker Value
Unknown
CVE-2020-36323
Disclosure Date: April 14, 2021 (last updated February 22, 2025)
In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.
0
Attacker Value
Unknown
CVE-2021-20307
Disclosure Date: April 05, 2021 (last updated February 22, 2025)
Format string vulnerability in panoFileOutputNamesCreate() in libpano13 2.9.20~rc2+dfsg-3 and earlier can lead to read and write arbitrary memory values.
0
Attacker Value
Unknown
CVE-2020-29018
Disclosure Date: January 14, 2021 (last updated February 22, 2025)
A format string vulnerability in FortiWeb 6.3.0 through 6.3.5 may allow an authenticated, remote attacker to read the content of memory and retrieve sensitive data via the redir parameter.
0
Attacker Value
Unknown
CVE-2020-35869
Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated because rusqlite::trace::log mishandles format strings.
0