Filtered by vendor Hinet
Subscriptions
Filtered by product Hicos Natural Person Credential Component Client
Subscriptions
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-35222 | 1 Hinet | 1 Hicos Natural Person Credential Component Client | 2024-11-21 | 6.8 Medium |
HiCOS Citizen verification component has a stack-based buffer overflow vulnerability due to insufficient parameter length validation. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system command or disrupt service. | ||||
CVE-2022-32962 | 1 Hinet | 1 Hicos Natural Person Credential Component Client | 2024-11-21 | 6.8 Medium |
HiCOS’ client-side citizen certificate component has a double free vulnerability. An unauthenticated physical attacker can exploit this vulnerability to corrupt memory and execute arbitrary code, manipulate system data or terminate service. | ||||
CVE-2022-32961 | 1 Hinet | 1 Hicos Natural Person Credential Component Client | 2024-11-21 | 6.8 Medium |
HICOS’ client-side citizen digital certificate component has a stack-based buffer overflow vulnerability when reading IC card due to insufficient parameter length validation for token information. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system data or terminate service. | ||||
CVE-2022-32960 | 1 Hinet | 1 Hicos Natural Person Credential Component Client | 2024-11-21 | 6.8 Medium |
HiCOS’ client-side citizen digital certificate component has a stack-based buffer overflow vulnerability when reading IC card due to insufficient parameter length validation for card number. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system data or terminate service. | ||||
CVE-2022-32959 | 1 Hinet | 1 Hicos Natural Person Credential Component Client | 2024-11-21 | 6.8 Medium |
HiCOS’ client-side citizen digital certificate component has a stack-based buffer overflow vulnerability when reading IC card due to insufficient parameter length validation for OS information. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system data or terminate service. |
Page 1 of 1.