Show filters
401 Total Results
Displaying 201-210 of 401
Sort by:
Attacker Value
Unknown

CVE-2022-34667

Disclosure Date: November 19, 2022 (last updated February 24, 2025)
NVIDIA CUDA Toolkit SDK contains a stack-based buffer overflow vulnerability in cuobjdump, where an unprivileged remote attacker could exploit this buffer overflow condition by persuading a local user to download a specially crafted corrupted file and execute cuobjdump against it locally, which may lead to a limited denial of service and some loss of data integrity for the local user.
Attacker Value
Unknown

CVE-2022-41851

Disclosure Date: October 11, 2022 (last updated February 24, 2025)
A vulnerability has been identified in JTTK (All versions < V11.1.1.0), Simcenter Femap V2022.1 (All versions < V2022.1.3), Simcenter Femap V2022.2 (All versions < V2022.2.2). The JTTK library is vulnerable to an uninitialized pointer reference vulnerability while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-16973)
Attacker Value
Unknown

CVE-2022-25899

Disclosure Date: August 18, 2022 (last updated February 26, 2025)
Authentication bypass for the Open AMT Cloud Toolkit software maintained by Intel(R) before versions 2.0.2 and 2.2.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Attacker Value
Unknown

CVE-2022-35954

Disclosure Date: August 15, 2022 (last updated February 24, 2025)
The GitHub Actions ToolKit provides a set of packages to make creating actions easier. The `core.exportVariable` function uses a well known delimiter that attackers can use to break out of that specific variable and assign values to other arbitrary variables. Workflows that write untrusted values to the `GITHUB_ENV` file may cause the path or other environment variables to be modified without the intention of the workflow or action author. Users should upgrade to `@actions/core v1.9.1`. If you are unable to upgrade the `@actions/core` package, you can modify your action to ensure that any user input does not contain the delimiter `_GitHubActionsFileCommandDelimeter_` before calling `core.exportVariable`.
Attacker Value
Unknown

CVE-2022-30791

Disclosure Date: July 08, 2022 (last updated February 24, 2025)
In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new TCP connections. Existing connections are not affected.
0
Attacker Value
Unknown

CVE-2022-30792

Disclosure Date: July 08, 2022 (last updated February 24, 2025)
In CmpChannelServer of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new communication channel connections. Existing connections are not affected.
0
Attacker Value
Unknown

CVE-2022-31806

Disclosure Date: June 23, 2022 (last updated February 24, 2025)
In CODESYS V2 PLCWinNT and Runtime Toolkit 32 in versions prior to V2.4.7.57 password protection is not enabled by default and there is no information or prompt to enable password protection at login in case no password is set at the controller.
0
Attacker Value
Unknown

CVE-2022-31805

Disclosure Date: June 23, 2022 (last updated February 24, 2025)
In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected.
0
Attacker Value
Unknown

CVE-2022-1818

Disclosure Date: June 20, 2022 (last updated February 23, 2025)
The Multi-page Toolkit WordPress plugin through 2.6 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping as well
Attacker Value
Unknown

CVE-2022-32140

Disclosure Date: June 16, 2022 (last updated February 24, 2025)
Multiple CODESYS products are affected to a buffer overflow.A low privileged remote attacker may craft a request, which can cause a buffer copy without checking the size of the service, resulting in a denial-of-service condition. User Interaction is not required.
0