A memory corruption vulnerability is present in bspatch as shipped in Colin Percival’s bsdiff tools version 4.3. Insufficient checks when handling external inputs allows an attacker to bypass the sanity checks in place and write out of a dynamically allocated buffer boundaries.
Source link
[Bug 1856747] CVE-2020-14315 bsdiff: handling external inputs allows attacker to bypass sanity checks
RELATED STORIES
Description. A remote unauthenticated cross-site request forgery (csrf) vulnerability was discovered in Aruba AirWave Management...
Original release date: March 4, 2021 Cisco has released security updates to address a vulnerability...
Ubuntu Security Notice 4754-4 – USN-4754-1 fixed vulnerabilities in Python. Because of a regression, a...
Recently, an enterprising security researcher, Alex Birsan hacked tech companies and managed to pocket over...
Critical vulnerability found in Snow Software’s Inventory Agent A vulnerability in Snow Software’s Snow Inventory Agent...
Hello everyone, I have returned to tackle part four of my series on Windows exploitation,...
Yeastar NeoGate TG400 中存在路径遍历漏洞。该漏洞源于产品未能正确地过滤资源或文件路径中的特殊元素,经过身份验证的用户可以解密固件,并可以读取敏感信息,如密码或解密密钥。以下产品及版本受到影响:Yeastar NeoGate TG400 91.3.0.3。 Copyright © 北京奇虎科技有限公司 360网络攻防实验室 安全客 All Rights Reserved...
Description: Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion...
# -*- coding: utf-8 -*- import socket from time import sleep from os import system...
Source: Bombardier Business jet maker Bombardier is the latest company to suffer a data breach...
You must be logged in to post a comment.