![]() ![]() This vulnerability affects Firefox ESR comment_list_length)` which may make `setup_malloc` allocate less memory than required. This issue could allow an attacker to perform remote code execution and sandbox escape. The WebGL `DrawElementsInstanced` method was susceptible to a heap buffer overflow when used on systems with the Mesa VM driver. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. VDB-250702 is the identifier assigned to this vulnerability. The exploit has been disclosed to the public and may be used. The manipulation of the argument wpapsk_crypto2_4g leads to stack-based buffer overflow. This vulnerability affects unknown code of the file /goform/WifiExtraSet of the component Web-based Management Interface. ![]() Handle_request in http.c in cherry through 4b877df has an sscanf stack-based buffer overflow via a long URI, leading to remote code execution.Ī vulnerability was found in Tenda A15 15.13.07.13. Route in main.c in Pico HTTP Server in C through f3b69a6 has an sprintf stack-based buffer overflow via a long URI, leading to remote code execution. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |