Total
10481 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-39525 | 1 Gnu | 1 Libredwg | 2021-09-24 | 6.8 MEDIUM | 8.8 HIGH |
An issue was discovered in libredwg through v0.10.1.3751. bit_read_fixed() in bits.c has a heap-based buffer overflow. | |||||
CVE-2021-39527 | 1 Gnu | 1 Libredwg | 2021-09-24 | 6.8 MEDIUM | 8.8 HIGH |
An issue was discovered in libredwg through v0.10.1.3751. appinfo_private() in decode.c has a heap-based buffer overflow. | |||||
CVE-2021-39530 | 1 Gnu | 1 Libredwg | 2021-09-24 | 6.8 MEDIUM | 8.8 HIGH |
An issue was discovered in libredwg through v0.10.1.3751. bit_wcs2nlen() in bits.c has a heap-based buffer overflow. | |||||
CVE-2021-39540 | 1 Pdftools Project | 1 Pdftools | 2021-09-24 | 6.8 MEDIUM | 7.8 HIGH |
An issue was discovered in pdftools through 20200714. A stack-buffer-overflow exists in the function Analyze::AnalyzePages() located in analyze.cpp. It allows an attacker to cause code Execution. | |||||
CVE-2021-3751 | 1 Libmobi Project | 1 Libmobi | 2021-09-24 | 7.5 HIGH | 9.8 CRITICAL |
libmobi is vulnerable to Out-of-bounds Write | |||||
CVE-2021-33362 | 1 Gpac | 1 Gpac | 2021-09-23 | 6.8 MEDIUM | 7.8 HIGH |
Stack buffer overflow in the hevc_parse_vps_extension function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file. | |||||
CVE-2021-25665 | 1 Siemens | 1 Simcenter Star-ccm\+ | 2021-09-23 | 6.8 MEDIUM | 7.8 HIGH |
A vulnerability has been identified in Simcenter STAR-CCM+ Viewer (All versions < V2021.2.1). The starview+.exe application lacks proper validation of user-supplied data when parsing scene files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13700) | |||||
CVE-2020-12002 | 1 Advantech | 1 Webaccess | 2021-09-23 | 7.5 HIGH | 9.8 CRITICAL |
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple stack-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution. | |||||
CVE-2020-12019 | 1 Advantech | 1 Webaccess | 2021-09-23 | 7.5 HIGH | 9.8 CRITICAL |
WebAccess Node Version 8.4.4 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. | |||||
CVE-2020-12031 | 1 Rockwellautomation | 1 Factorytalk View | 2021-09-23 | 4.6 MEDIUM | 7.8 HIGH |
In all versions of FactoryTalk View SE, after bypassing memory corruption mechanisms found in the operating system, a local, authenticated attacker may corrupt the associated memory space allowing for arbitrary code execution. Rockwell Automation recommends applying patch 1126290. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx. | |||||
CVE-2020-12038 | 1 Rockwellautomation | 5 Eds Subsystem, Rslinx, Rslinx Enterprise and 2 more | 2021-09-23 | 4.3 MEDIUM | 5.5 MEDIUM |
Products that use EDS Subsystem: Version 28.0.1 and prior (FactoryTalk Linx software (Previously called RSLinx Enterprise): Versions 6.00, 6.10, and 6.11, RSLinx Classic: Version 4.11.00 and prior, RSNetWorx software: Version 28.00.00 and prior, Studio 5000 Logix Designer software: Version 32 and prior) is vulnerable. A memory corruption vulnerability exists in the algorithm that matches square brackets in the EDS subsystem. This may allow an attacker to craft specialized EDS files to crash the EDSParser COM object, leading to denial-of-service conditions. | |||||
CVE-2020-14511 | 1 Moxa | 8 Edr-g902, Edr-g902-t, Edr-g902-t Firmware and 5 more | 2021-09-23 | 7.5 HIGH | 9.8 CRITICAL |
Malicious operation of the crafted web browser cookie may cause a stack-based buffer overflow in the system web server on the EDR-G902 and EDR-G903 Series Routers (versions prior to 5.4). | |||||
CVE-2020-14524 | 1 Softing | 1 Opc | 2021-09-23 | 7.5 HIGH | 9.8 CRITICAL |
Softing Industrial Automation all versions prior to the latest build of version 4.47.0, The affected product is vulnerable to a heap-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. | |||||
CVE-2021-39558 | 1 Swftools | 1 Swftools | 2021-09-23 | 6.8 MEDIUM | 7.8 HIGH |
An issue was discovered in swftools through 20200710. A stack-buffer-overflow exists in the function VectorGraphicOutputDev::drawGeneralImage() located in VectorGraphicOutputDev.cc. It allows an attacker to cause code Execution. | |||||
CVE-2021-39561 | 1 Swftools | 1 Swftools | 2021-09-23 | 6.8 MEDIUM | 7.8 HIGH |
An issue was discovered in swftools through 20200710. A stack-buffer-overflow exists in the function Gfx::opSetFillColorN() located in Gfx.cc. It allows an attacker to cause code Execution. | |||||
CVE-2021-39564 | 1 Swftools | 1 Swftools | 2021-09-22 | 6.8 MEDIUM | 7.8 HIGH |
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function swf_DumpActions() located in swfaction.c. It allows an attacker to cause code Execution. | |||||
CVE-2021-39569 | 1 Swftools | 1 Swftools | 2021-09-22 | 6.8 MEDIUM | 7.8 HIGH |
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function OpAdvance() located in swfaction.c. It allows an attacker to cause code Execution. | |||||
CVE-2021-39574 | 1 Swftools | 1 Swftools | 2021-09-22 | 6.8 MEDIUM | 7.8 HIGH |
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function pool_read() located in pool.c. It allows an attacker to cause code Execution. | |||||
CVE-2021-39577 | 1 Swftools | 1 Swftools | 2021-09-22 | 6.8 MEDIUM | 7.8 HIGH |
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function main() located in swfdump.c. It allows an attacker to cause code Execution. | |||||
CVE-2021-39579 | 1 Swftools | 1 Swftools | 2021-09-22 | 6.8 MEDIUM | 7.8 HIGH |
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function string_hash() located in q.c. It allows an attacker to cause code Execution. |