![]() Use-after-free vulnerability in icclib before 2.13, as used by Argyll CMS before 1.4 and possibly other programs, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted ICC profile file.Ĭisco - anyconnect_secure_mobility_client ![]() ![]() NOTE: some sources report this issue as an integer overflow. WPD document that causes a negative array index to be used. The WPXContentListener::_closeTableRow function in WPXContentListener.cpp in libwpd 0.8.8, as used by (OOo) before 3.4, allows remote attackers to execute arbitrary code via a crafted Wordperfect. DOC file, which triggers a heap-based buffer overflow. ![]() Integer overflow in the vclmi.dll module in (OOo) 3.3, 3.4 Beta, and possibly earlier, and LibreOffice before 3.5.3, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted embedded image object, as demonstrated by a JPEG image in a. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |