Internet chess killer 3.1 uci engine3/17/2024 ![]() An attacker can leverage this vulnerability to execute code in the context of the current process. The issue results from the lack of proper validation of the length of user-supplied data before copying it to a stack-based buffer. ![]() A stack-based buffer overflow in image_load_bmp() in HTMLDOC before 1.9.13 results in remote code execution if the victim converts an HTML document linking to a crafted BMP file.Ī stack-based buffer overflow vulnerability exists in the DWF file reading procedure in Open Design Alliance Drawings SDK before 2022.8. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |