Filtered by vendor Att
Subscribe
Total
29 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-21825 | 1 Att | 1 Xmill | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
A heap-based buffer overflow vulnerability exists in the XML Decompression PlainTextUncompressor::UncompressItem functionality of AT&T Labs’ Xmill 0.7. A specially crafted XMI file can lead to remote code execution. An attacker can provide a malicious file to trigger this vulnerability. | |||||
CVE-2021-21815 | 1 Att | 1 Xmill | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
A stack-based buffer overflow vulnerability exists in the command-line-parsing HandleFileArg functionality of AT&T Labs' Xmill 0.7. Within the function HandleFileArg the argument filepattern is under control of the user who passes it in from the command line. filepattern is passed directly to strcpy copying the path provided by the user into a staticly sized buffer without any length checks resulting in a stack-buffer overflow. An attacker can provide malicious input to trigger this vulnerability. | |||||
CVE-2021-21814 | 1 Att | 1 Xmill | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
Within the function HandleFileArg the argument filepattern is under control of the user who passes it in from the command line. filepattern is passed directly to strlen to determine the ending location of the char* passed in by the user, no checks are done to see if the passed in char* is longer than the staticly sized buffer data is memcpy‘d into, but after the memcpy a null byte is written to what is assumed to be the end of the buffer to terminate the char*, but without length checks, this null write occurs at an arbitrary offset from the buffer. An attacker can provide malicious input to trigger this vulnerability. | |||||
CVE-2021-21813 | 1 Att | 1 Xmill | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
Within the function HandleFileArg the argument filepattern is under control of the user who passes it in from the command line. filepattern is passed directly to memcpy copying the path provided by the user into a staticly sized buffer without any length checks resulting in a stack-buffer overflow. | |||||
CVE-2021-21812 | 1 Att | 1 Xmill | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
A stack-based buffer overflow vulnerability exists in the command-line-parsing HandleFileArg functionality of AT&T Labs’ Xmill 0.7. Within the function HandleFileArg the argument filepattern is under control of the user who passes it in from the command line. filepattern is passed directly to strcpy copying the path provided by the user into a static sized buffer without any length checks resulting in a stack-buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities. | |||||
CVE-2021-21811 | 1 Att | 1 Xmill | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
A memory corruption vulnerability exists in the XML-parsing CreateLabelOrAttrib functionality of AT&T Labs’ Xmill 0.7. A specially crafted XML file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. | |||||
CVE-2021-21810 | 1 Att | 1 Xmill | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
A memory corruption vulnerability exists in the XML-parsing ParseAttribs functionality of AT&T Labs’ Xmill 0.7. A specially crafted XML file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. | |||||
CVE-2020-22650 | 1 Att | 1 Alienvault Ossim | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
A memory leak vulnerability in sim-organizer.c of AlienVault Ossim v5 causes a denial of service (DOS) via a system crash triggered by the occurrence of a large number of alarm events. | |||||
CVE-2013-7286 | 1 Att | 2 Mobileiron Sentry, Mobileiron Virtual Smartphone Platform | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
MobileIron VSP < 5.9.1 and Sentry < 5.0 has a weak password obfuscation algorithm |