![]() WolfSSH v1.4.7 was discovered to contain an integer overflow via the function wolfSSH_SFTP_RecvRMDIR. An attacker can provide a malicious file to trigger this vulnerability. ![]() ![]() A specially-crafted OLE file can lead to a heap buffer overflow which can result in arbitrary code execution. Improper input validation in baseband prior to SMR Aug-2022 Release 1 allows attackers to cause integer overflow to heap overflow.Īn integer overflow in the component of Harfbuzz v4.3.0 allows attackers to cause a Denial of Service (DoS) via unspecified vectors.Īn integer overflow vulnerability exists in the way ESTsoft Alyac 2.5.8.544 parses OLE files. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted binary. Rizin v0.4.0 and below was discovered to contain an integer overflow via the function get_long_object(). In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based buffer overflow in the "i2c md" command enables the corruption of the return address pointer of the do_i2c_md function.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |