Theheap-based buffer overflowvulnerabilityCVE-2021-44708exists in Adobe Acrobat Pro DC’s third-party library Solid Framework, which is located in the directoryC:\Program Files (x86)\Adobe\Acrobat DC\Acrobat\plu
UC Software - Heap Based Buffer Overflow A vulnerability was discovered in the firmware build 4.1.0 and 4.1.1 of the SoundStation IP 5000. This flaw allows code execution, which can then allow privilege escalation. Severity High Advisory ID PLYVC22-01 Initial public release 12/16/2022 ...
A heap-buffer-overflow vulnerability arises in thewabt::interp::(anonymous namespace)::BinaryReaderInterp::GetReturnCallDropKeepCountfunction defined inwabt/src/interp/binary-reader-interp.ccat line 451. This issue occurs when processing files with certain formatting errors, due to the lack of bound...
A heap-buffer-overflow vulnerability has been identified in theOpenDDLParser::parseStructurefunction within the Assimp library, specifically during the processing of OpenGEX files. The issue arises when reading beyond the bounds of a memory buffer during string manipulation, causing an out-of-bounds r...
Language: Synopsis An application installed on the remote host is affected by a heap-based buffer overflow vulnerability. Description According to its banner, the version of PHP running on the remote web server is 7.2.x prior to 7.2.18. It is, therefore, affected by a heap-based buffer over...
On June 12, Fortinet published an advisory (FG-IR-23-097) for a critical vulnerability in FortiOS and FortiProxy: CVEDescriptionCVSSv3Severity CVE-2023-27997 FortiOS and FortiProxy Heap Buffer Overflow in SSL-VPN 9.2 Critical In addition to CVE-2023-27997, Fortinet patched ...
(>= 0.13 <= 0.17.3): heap-based buffer overflow vulnerability in base64 functions Summary === David Bouman discovered a heap-based buffer overflow vulnerability in base64 functions of AIDE, an advanced intrusion detection system. An attacker could crash the program and possibly execute arbitrary...
software vulnerabilityconstraint solvingheap memoryexecutable codesIn this paper, we present a smart fuzzing method for detecting six classes of heap-based vulnerabilities in executable codes, that is, heap-based buffer overflow, buffer underwrite, buffer over-read, buffer under-read, double-free, and...
Remote Code Execution via Heap-based Buffer Overflow in Trend Micro ServerProtectTrend Micro ServerProtect 5.7 and 5.58 have a heap-based buffer overflow vulnerability. This issue is in an unspecified procedure. It allows remote attackers to run any code they want. The attack happens through unknown...
Trend Micro's Zero Day Initiative reported the following: ZDI-CAN-22164: Wireshark NetScreen File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability -- CVSS ---