Page 3 of 14 results (0.003 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

RTI Connext DDS Professional and Connext DDS Secure Versions 4.2x to 6.1.0 not correctly calculate the size when allocating the buffer, which may result in a buffer overflow. RTI Connext DDS Professional y Connext DDS Secure versiones 4.2x a 6.1.0, no calculan correctamente el tamaño cuando asignan el búfer, lo que puede resultar en un desbordamiento del búfer • https://support.rti.com/s/login/?ec=302&startURL=%2Fs%2F https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 • CWE-131: Incorrect Calculation of Buffer Size •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

RTI Connext DDS Professional and Connext DDS Secure Versions 4.2x to 6.1.0 vulnerable to a stack-based buffer overflow, which may allow a local attacker to execute arbitrary code. RTI Connext DDS Professional y Connext DDS Secure versiones 4.2x a 6.1.0, son vulnerables a un desbordamiento del búfer en la región stack de la memoria, que puede permitir a un atacante local ejecutar código arbitrario • https://support.rti.com/s/login/?ec=302&startURL=%2Fs%2F https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 • CWE-121: Stack-based Buffer Overflow •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

RTI Connext DDS Professional and Connext DDS Secure Versions 4.2.x to 6.1.0 are vulnerable to a stack-based buffer overflow, which may allow a local attacker to execute arbitrary code. RTI Connext DDS Professional y Connext DDS Secure versiones 4.2.x a 6.1.0, son vulnerables a un desbordamiento del búfer en la región stack de la memoria, que puede permitir a un atacante local ejecutar código arbitrario • https://support.rti.com/s/login/?ec=302&startURL=%2Fs%2F https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 9.1EPSS: 0%CPEs: 3EXPL: 0

RTI Connext DDS Professional, Connext DDS Secure versions 4.2x to 6.1.0, and Connext DDS Micro versions 2.4 and later are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic. This may result in a denial-of-service condition and information exposure. RTI Connext DDS Professional, Connext DDS Secure versiones 4.2x a 6.1.0, y Connext DDS Micro versiones 2.4 y posteriores, son vulnerables cuando un atacante envía un paquete especialmente diseñado para inundar los dispositivos de destino con tráfico no deseado. Esto puede resultar en una condición de denegación de servicio y a una exposición de información • https://support.rti.com/s/login/?ec=302&startURL=%2Fs%2F https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 • CWE-406: Insufficient Control of Network Message Volume (Network Amplification) •