Show filters
24 Total Results
Displaying 11-20 of 24
Sort by:
Attacker Value
Unknown
CVE-2022-22126
Disclosure Date: February 20, 2022 (last updated February 23, 2025)
Openmct versions 1.3.0 to 1.7.7 are vulnerable against stored XSS via the “Web Page” element, that allows the injection of malicious JavaScript into the ‘URL’ field. This issue affects: nasa openmct 1.7.7 version and prior versions; 1.3.0 version and later versions.
0
Attacker Value
Unknown
CVE-2019-1010060
Disclosure Date: July 16, 2019 (last updated November 27, 2024)
NASA CFITSIO prior to 3.43 is affected by: Buffer Overflow. The impact is: arbitrary code execution. The component is: over 40 source code files were changed. The attack vector is: remote unauthenticated attacker. The fixed version is: 3.43. NOTE: this CVE refers to the issues not covered by CVE-2018-3846, CVE-2018-3847, CVE-2018-3848, and CVE-2018-3849. One example is ftp_status in drvrnet.c mishandling a long string beginning with a '4' character.
0
Attacker Value
Unknown
CVE-2018-3847
Disclosure Date: August 01, 2018 (last updated November 27, 2024)
Multiple exploitable buffer overflow vulnerabilities exist in image parsing functionality of the CFITSIO library version 3.42. Specially crafted images parsed via the library, can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can deliver an FIT image to trigger this vulnerability and potentially gain code execution.
0
Attacker Value
Unknown
CVE-2018-3846
Disclosure Date: April 16, 2018 (last updated November 08, 2023)
In the ffgphd and ffgtkn functions in NASA CFITSIO 3.42, specially crafted images parsed via the library can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can deliver an FIT image to trigger this vulnerability and potentially gain code execution.
0
Attacker Value
Unknown
CVE-2018-3848
Disclosure Date: April 16, 2018 (last updated November 08, 2023)
In the ffghbn function in NASA CFITSIO 3.42, specially crafted images parsed via the library can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can deliver an FIT image to trigger this vulnerability and potentially gain code execution.
0
Attacker Value
Unknown
CVE-2018-3849
Disclosure Date: April 16, 2018 (last updated November 08, 2023)
In the ffghtb function in NASA CFITSIO 3.42, specially crafted images parsed via the library can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can deliver an FIT image to trigger this vulnerability and potentially gain code execution.
0
Attacker Value
Unknown
CVE-2018-1000046
Disclosure Date: February 09, 2018 (last updated November 26, 2024)
NASA Pyblock version v1.0 - v1.3 contains a CWE-502 vulnerability in Radar data parsing library that can result in remote code execution. This attack appear to be exploitable via Victim opening a specially crafted radar data file. This vulnerability appears to have been fixed in v1.4.
0
Attacker Value
Unknown
CVE-2018-1000048
Disclosure Date: February 09, 2018 (last updated November 26, 2024)
NASA RtRetrievalFramework version v1.0 contains a CWE-502 vulnerability in Data retrieval functionality of RtRetrieval framework that can result in remote code execution. This attack appear to be exploitable via Victim tries to retrieve and process a weather data file.
0
Attacker Value
Unknown
CVE-2018-1000047
Disclosure Date: February 09, 2018 (last updated November 26, 2024)
NASA Kodiak version v1.0 contains a CWE-502 vulnerability in Kodiak library's data processing function that can result in remote code execution. This attack appear to be exploitable via Victim opens an untrusted file for optimization using Kodiak library.
0
Attacker Value
Unknown
CVE-2018-1000045
Disclosure Date: February 09, 2018 (last updated November 26, 2024)
NASA Singledop version v1.0 contains a CWE-502 vulnerability in NASA Singledop library (Weather data) that can result in remote code execution. This attack appear to be exploitable via Victim opening a specially crafted radar data file. This vulnerability appears to have been fixed in v1.1.
0