![]() This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. deserialize_string may read from uninitialized memory locations.Īpache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. deserialize_string_primitive may read from uninitialized memory locations.Īn issue was discovered in the messagepack-rs crate through for Rust. MDB Tools (aka mdbtools) 0.9.2 has a stack-based buffer overflow (at 0x7ffd0c689be0) in mdb_numeric_to_string (called from mdb_xfer_bound_data and _mdb_attempt_bind).Īn issue was discovered in the messagepack-rs crate through for Rust. MDB Tools (aka mdbtools) 0.9.2 has a stack-based buffer overflow (at 0x7ffd6e029ee0) in mdb_numeric_to_string (called from mdb_xfer_bound_data and _mdb_attempt_bind).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |