CWE:
 

Topic
Date
Author
High
tcprewrite Heap-Based Buffer Overflow
11.09.2017
Hosein Askari
High
SAP SAPCAR Heap Based Buffer Overflow Vulnerability
11.05.2017
SAP
Med.
SYBASE SQL Anywhere 12 and 16 Denial Of Service
19.06.2015
Vahagn Vardanyan
High
Delphi And C++ Builder VCL Library Heap Buffer Overflow
17.09.2014
Core
High
Windows Kernel ReadLayoutFile Heap Overflow
10.05.2012
Core


CVEMAP Search Results

CVE
Details
Description
2024-07-18
Waiting for details
CVE-2024-40764

Updating...
 

 
Heap-based buffer overflow vulnerability in the SonicOS IPSec VPN allows an unauthenticated remote attacker to cause Denial of Service (DoS).

 
2024-07-09
Waiting for details
CVE-2024-39883

Updating...
 

 
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.

 
Waiting for details
CVE-2024-20781

Updating...
 

 
InDesign Desktop versions ID19.3, ID18.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

 
Waiting for details
CVE-2024-20783

Updating...
 

 
InDesign Desktop versions ID19.3, ID18.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

 
2024-07-08
Waiting for details
CVE-2024-21778

Updating...
 

 
A heap-based buffer overflow vulnerability exists in the configuration file mib_init_value_array functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted .dat file can lead to arbitrary code execution. An attacker can upload a malicious file to trigger this vulnerability.

 
2024-06-20
Waiting for details
CVE-2024-29013

Updating...
 

 
Heap-based buffer overflow vulnerability in the SonicOS SSL-VPN allows an authenticated remote attacker to cause Denial of Service (DoS) via memcpy function.

 
2024-06-09
Waiting for details
CVE-2024-5389

Updating...
 

 
In lunary-ai/lunary version 1.2.13, an insufficient granularity of access control vulnerability allows users to create, update, get, and delete prompt variations for datasets not owned by their organization. This issue arises due to the application not properly validating the ownership of dataset prompts and their variations against the organization or project of the requesting user. As a result, unauthorized modifications to dataset prompts can occur, leading to altered or removed dataset prompts without proper authorization. This vulnerability impacts the integrity and consistency of dataset information, potentially affecting the results of experiments.

 
2024-05-28
Waiting for details
CVE-2023-49600

Updating...
 

 
An out-of-bounds write vulnerability exists in the PlyFile ply_cast_ascii functionality of libigl v2.5.0. A specially crafted .ply file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

 
2024-05-16
Waiting for details
CVE-2024-30294

Updating...
 

 
Animate versions 24.0.2, 23.0.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

 
2024-05-14
Waiting for details
CVE-2023-43040

Updating...
 

 
IBM Spectrum Fusion HCI 2.5.2 through 2.7.2 could allow an attacker to perform unauthorized actions in RGW for Ceph due to improper bucket access. IBM X-Force ID: 266807.

 

 


Copyright 2024, cxsecurity.com

 

Back to Top