Filtered by vendor Fujielectric
Subscriptions
Filtered by product V-sft
Subscriptions
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-46360 | 1 Fujielectric | 2 Tellus, V-sft | 2024-11-21 | 7.8 High |
Out-of-bounds read vulnerability in V-SFT v6.1.7.0 and earlier and TELLUS v4.0.12.0 and earlier allows a local attacker to obtain the information and/or execute arbitrary code by having a user to open a specially crafted image file. | ||||
CVE-2022-43448 | 1 Fujielectric | 2 Tellus, V-sft | 2024-11-21 | 7.8 High |
Out-of-bounds write vulnerability in V-SFT v6.1.7.0 and earlier and TELLUS v4.0.12.0 and earlier allows a local attacker to obtain the information and/or execute arbitrary code by having a user to open a specially crafted image file. | ||||
CVE-2022-29925 | 1 Fujielectric | 1 V-sft | 2024-11-21 | 7.8 High |
Access of uninitialized pointer vulnerability exists in the simulator module contained in the graphic editor 'V-SFT' versions prior to v6.1.6.0, which may allow an attacker to obtain information and/or execute arbitrary code by having a user to open a specially crafted image file. | ||||
CVE-2022-29522 | 1 Fujielectric | 2 V-server, V-sft | 2024-11-21 | 7.8 High |
Use after free vulnerability exists in the simulator module contained in the graphic editor 'V-SFT' versions prior to v6.1.6.0, which may allow an attacker to obtain information and/or execute arbitrary code by having a user to open a specially crafted image file. | ||||
CVE-2022-29506 | 1 Fujielectric | 2 V-server, V-sft | 2024-11-21 | 7.8 High |
Out-of-bounds read vulnerability exist in the simulator module contained in the graphic editor 'V-SFT' v6.1.3.0 and earlier, which may allow an attacker to obtain information and/or execute arbitrary code by having a user to open a specially crafted image file. | ||||
CVE-2022-26302 | 1 Fujielectric | 1 V-sft | 2024-11-21 | 7.8 High |
Heap-based buffer overflow exists in the simulator module contained in the graphic editor 'V-SFT' versions prior to v6.1.6.0, which may allow an attacker to obtain information and/or execute arbitrary code by having a user to open a specially crafted image file. |
Page 1 of 1.