Total
7966 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-3847 | 1 Nasa | 1 Cfitsio | 2022-11-28 | 6.8 MEDIUM | 8.8 HIGH |
Multiple exploitable buffer overflow vulnerabilities exist in image parsing functionality of the CFITSIO library version 3.42. Specially crafted images parsed via the library, can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can deliver an FIT image to trigger this vulnerability and potentially gain code execution. | |||||
CVE-2018-3862 | 1 Computer-insel | 1 Photoline | 2022-11-28 | 6.8 MEDIUM | 7.8 HIGH |
A specially crafted TIFF image processed via the application can lead to an out-of-bounds write, overwriting | |||||
CVE-2018-3846 | 2 Fedoraproject, Nasa | 2 Fedora, Cfitsio | 2022-11-28 | 6.8 MEDIUM | 8.8 HIGH |
In the ffgphd and ffgtkn functions in NASA CFITSIO 3.42, specially crafted images parsed via the library can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can deliver an FIT image to trigger this vulnerability and potentially gain code execution. | |||||
CVE-2022-31606 | 2 Microsoft, Nvidia | 7 Windows, Cloud Gaming Guest, Geforce and 4 more | 2022-11-28 | N/A | 7.8 HIGH |
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a failure to properly validate data might allow an attacker with basic user capabilities to cause an out-of-bounds access in kernel mode, which could lead to denial of service, information disclosure, escalation of privileges, or data tampering. | |||||
CVE-2022-44256 | 1 Totolink | 2 Nr1800x, Nr1800x Firmware | 2022-11-25 | N/A | 8.8 HIGH |
TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter lang in the setLanguageCfg function. | |||||
CVE-2022-44259 | 1 Totolink | 2 Lr350, Lr350 Firmware | 2022-11-25 | N/A | 8.8 HIGH |
TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter week, sTime, and eTime in the setParentalRules function. | |||||
CVE-2022-44260 | 1 Totolink | 2 Lr350, Lr350 Firmware | 2022-11-25 | N/A | 8.8 HIGH |
TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter sPort/ePort in the setIpPortFilterRules function. | |||||
CVE-2022-44258 | 1 Totolink | 2 Lr350, Lr350 Firmware | 2022-11-25 | N/A | 8.8 HIGH |
TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter command in the setTracerouteCfg function. | |||||
CVE-2022-44257 | 1 Totolink | 2 Lr350, Lr350 Firmware | 2022-11-25 | N/A | 8.8 HIGH |
TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter pppoeUser in the setOpModeCfg function. | |||||
CVE-2022-44255 | 1 Totolink | 2 Lr350, Lr350 Firmware | 2022-11-25 | N/A | 9.8 CRITICAL |
TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a pre-authentication buffer overflow in the main function via long post data. | |||||
CVE-2022-44253 | 1 Totolink | 2 Lr350, Lr350 Firmware | 2022-11-25 | N/A | 8.8 HIGH |
TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter ip in the setDiagnosisCfg function. | |||||
CVE-2022-44254 | 1 Totolink | 2 Lr350, Lr350 Firmware | 2022-11-25 | N/A | 8.8 HIGH |
TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter text in the setSmsCfg function. | |||||
CVE-2019-0053 | 1 Juniper | 1 Junos | 2022-11-25 | 4.6 MEDIUM | 7.8 HIGH |
Insufficient validation of environment variables in the telnet client supplied in Junos OS can lead to stack-based buffer overflows, which can be exploited to bypass veriexec restrictions on Junos OS. A stack-based overflow is present in the handling of environment variables when connecting via the telnet client to remote telnet servers. This issue only affects the telnet client — accessible from the CLI or shell — in Junos OS. Inbound telnet services are not affected by this issue. This issue affects: Juniper Networks Junos OS: 12.3 versions prior to 12.3R12-S13; 12.3X48 versions prior to 12.3X48-D80; 14.1X53 versions prior to 14.1X53-D130, 14.1X53-D49; 15.1 versions prior to 15.1F6-S12, 15.1R7-S4; 15.1X49 versions prior to 15.1X49-D170; 15.1X53 versions prior to 15.1X53-D237, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69; 16.1 versions prior to 16.1R3-S11, 16.1R7-S4; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S6, 17.4R2-S3, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R1-S5, 18.2R2-S2, 18.2R3; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2. | |||||
CVE-2022-44807 | 1 Dlink | 2 Dir-882, Dir-882 Firmware | 2022-11-23 | N/A | 9.8 CRITICAL |
D-Link DIR-882 1.10B02 and 1.20B06 is vulnerable to Buffer Overflow via webGetVarString. | |||||
CVE-2022-44202 | 1 Dlink | 2 Dir-878, Dir-878 Firmware | 2022-11-23 | N/A | 9.8 CRITICAL |
D-Link DIR878 1.02B04 and 1.02B05 are vulnerable to Buffer Overflow. | |||||
CVE-2022-44806 | 1 Dlink | 2 Dir-882, Dir-882 Firmware | 2022-11-23 | N/A | 9.8 CRITICAL |
D-Link DIR-882 1.10B02 and 1.20B06 is vulnerable to Buffer Overflow. | |||||
CVE-2022-44804 | 1 Dlink | 2 Dir-882, Dir-882 Firmware | 2022-11-23 | N/A | 9.8 CRITICAL |
D-Link DIR-882 1.10B02 and1.20B06 is vulnerable to Buffer Overflow via the websRedirect function. | |||||
CVE-2022-44191 | 1 Netgear | 2 R7000p, R7000p Firmware | 2022-11-23 | N/A | 9.8 CRITICAL |
Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameters KEY1 and KEY2. | |||||
CVE-2022-44190 | 1 Netgear | 2 R7000p, R7000p Firmware | 2022-11-23 | N/A | 9.8 CRITICAL |
Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameter enable_band_steering. | |||||
CVE-2022-44188 | 1 Netgear | 2 R7000p, R7000p Firmware | 2022-11-23 | N/A | 9.8 CRITICAL |
Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameter enable_band_steering. |