![]() ![]() Tenda i29 v1.0 V1.0.0.5 was discovered to contain a stack overflow via the ip parameter in the setPing function. This is possible because the application is vulnerable to SSRF.ĭelta Electronics DOPSoft is vulnerable to a stack-based buffer overflow, which may allow for arbitrary code execution if an attacker can lead a legitimate user to execute a specially crafted file. ![]() ![]() Stack-based buffer overflow in FPWin Pro version 7.7.0.0 and all previous versions may allow attackers to execute arbitrary code via a specially crafted project file.īook Stack version 23.10.2 allows filtering local files on the server. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. The identifier of this vulnerability is VDB-248248. The exploit has been disclosed to the public and may be used. The manipulation leads to stack-based buffer overflow. This vulnerability affects the function ParseRequestLine of the file RtspMesaage.cpp. The associated identifier of this vulnerability is VDB-248255.Ī vulnerability classified as critical was found in PHZ76 RtspServer 1.0.0. The manipulation of the argument search with the input sy2ap%22%3e%3cscript%3ealert(1)%3c%2fscript%3etkxh1 leads to cross site scripting. This issue affects some unknown processing. A vulnerability was found in SourceCodester Simple Image Stack Website 1.0. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |