![]() The WebGL `DrawElementsInstanced` method was susceptible to a heap buffer overflow when used on systems with the Mesa VM driver. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.Ī flaw was found in the X.Org server. VDB-250702 is the identifier assigned to this vulnerability. The exploit has been disclosed to the public and may be used. The manipulation of the argument wpapsk_crypto2_4g leads to stack-based buffer overflow. This vulnerability affects unknown code of the file /goform/WifiExtraSet of the component Web-based Management Interface. A local attacker could execute arbitrary code via a long filename argument by monitoring Structured Exception Handler (SEH) records.Ī vulnerability was found in Tenda A15 15.13.07.13. Handle_request in http.c in cherry through 4b877df has an sscanf stack-based buffer overflow via a long URI, leading to remote code execution.īuffer overflow vulnerability in Explorer++ affecting version 1.3.5.531. Route in main.c in Pico HTTP Server in C through f3b69a6 has an sprintf stack-based buffer overflow via a long URI, leading to remote code execution. ![]() It allows an attacker to cause code execution. It allows an attacker to cause code execution.Ī global-buffer-overflow was found in SWFTools v0.9.2, in the function countline at swf5compiler.flex:327. ![]() A heap-buffer-overflow was found in SWFTools v0.9.2, in the function swf5lex at :1321.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |