CWE:
 

Topic
Date
Author
High
MikroTik RouterOS SMB Buffer Overflow
20.03.2018
Core Security Technolo...
High
Digital Canal Structural Wind Analysis 9.1 Buffer Overflow
02.07.2017
Karn Ganeshen
High
Linux XFBurn Stack-based Buffer Overflow
24.03.2017
Hosein Askari
High
Putty pscp <= 0.66 - Stack Buffer Overwrite
11.03.2016
tintinweb
High
VAMPSET 2.2.145 Stack / Heap Buffer Overflow
31.03.2015
CORE
Med.
Fortinet Single Sign On Stack Overflow
19.03.2015
CORE
High
GetGo Download Manager 4.x Stack Buffer Overflow
04.03.2014
RCE
High
VideoCharge Studio 2.12.3.685 Stack Buffer Overflow
20.02.2014
Julien Ahrens
High
Android Camera Driver Buffer Overflow / Memory Disclosure
22.10.2013
Jonathan Salwan
Med.
nss-pam-ldapd FD_SET array index error (stack-based buffer overflow)
18.02.2013
Garth Mollett
Low
Photodex ProShow Producer 5.0.3297 ExpandMacroFilename() Local Buffer Overflow
26.01.2013
Julien Ahrens
High
Sony PC Companion 2.1 (DownloadURLToFile()) Stack-based Buffer Overload
21.12.2012
Gjoko LiquidWorm Krsti...
High
Sony PC Companion 2.1 (Load()) Stack-based Buffer Overload
21.12.2012
Gjoko LiquidWorm Krsti...
High
Sony PC Companion 2.1 (CheckCompatibility()) Stack-based Buffer Overload
21.12.2012
Gjoko LiquidWorm Krsti...
High
Sony PC Companion 2.1 (Admin_RemoveDirectory()) Stack-based Buffer Overload
21.12.2012
Gjoko LiquidWorm Krsti...
High
Sound Editor Pro v7.5.1 Stack-based Buffer Overflow
17.09.2012
Julien Ahrens
High
Photodex ProShow Producer v5.0.3256 Local Buffer Overflow Vulnerability
03.07.2012
Inshell Security
High
Photodex ProShow Producer 5.0.3256 Buffer Overflow
03.07.2012
Julien Ahrens


CVEMAP Search Results

CVE
Details
Description
2024-04-11
Waiting for details
CVE-2024-30273

Updating...
 

 
Illustrator versions 28.3, 27.9.2 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

 
2024-04-10
Waiting for details
CVE-2024-20772

Updating...
 

 
Media Encoder versions 24.2.1, 23.6.4 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

 
2024-04-09
Waiting for details
CVE-2023-49908

Updating...
 

 
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `profile` parameter at offset `0x0045abc8` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225.

 
Waiting for details
CVE-2023-49912

Updating...
 

 
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `profile` parameter at offset `0x4224b0` of the `httpd` binary shipped with v5.0.4 Build 20220216 of the EAP115.

 
Waiting for details
CVE-2023-49911

Updating...
 

 
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `band` parameter at offset `0x422420` of the `httpd` binary shipped with v5.0.4 Build 20220216 of the EAP115.

 
Waiting for details
CVE-2023-49910

Updating...
 

 
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `ssid` parameter at offset `0x42247c` of the `httpd` binary shipped with v5.0.4 Build 20220216 of the EAP115.

 
Waiting for details
CVE-2023-49909

Updating...
 

 
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `action` parameter at offset `0x0045ab38` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225.

 
Waiting for details
CVE-2023-49907

Updating...
 

 
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `band` parameter at offset `0x0045aad8` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225.

 
Waiting for details
CVE-2023-49906

Updating...
 

 
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `ssid` parameter at offset `0x0045ab7c` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225.

 
Waiting for details
CVE-2023-48724

Updating...
 

 
A memory corruption vulnerability exists in the web interface functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted HTTP POST request can lead to denial of service of the device's web interface. An attacker can send an unauthenticated HTTP POST request to trigger this vulnerability.

 

 


Copyright 2024, cxsecurity.com

 

Back to Top