XnView Classic for Windows Version 2.40 allows user-assisted remote attackers to execute code via a crafted. One threat model is a victim who obtains an untrusted crafted file from a remote location and issues several user-defined commands including Ctrl-+ commands. STDU Viewer version 1.6.375 might allow user-assisted attackers to execute code via a crafted file. XnView Classic for Windows Version 2.40 allows user-assisted remote attackers to execute code via a crafted JPEG 2000 file that is mishandled during the opening of a directory in "Browser" mode, because of a "Stack Buffer Overrun" issue. One threat model is a victim who obtains an untrusted crafted file from a remote location and issues several user-defined commands. Notepad++ 7.3.3 (32-bit) with Hex Editor Plugin v0.9.5 might allow user-assisted attackers to execute code via a crafted file, because of a "Data from Faulting Address controls Code Flow" issue. It allows user-assisted attackers to inject arbitrary commands within pasted content.ĬKEditor 4.x before 4.11.0 allows user-assisted XSS involving a source-mode paste. ![]() ![]() The issue involves the Bracketed Paste Mode of the "Terminal" component. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-120551338Īn issue was discovered in certain Apple products. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. ![]() In generate_jsimd_ycc_rgb_convert_neon of jsimd_arm64_neon.S, there is a possible out of bounds write due to a missing bounds check. Stack-based buffer overflow in Free MP3 CD Ripper 2.6, when converting a file, allows user-assisted remote attackers to execute arbitrary code via a crafted. Mattermost 5.38 and earlier fails to sufficiently sanitize clipboard contents, which allows a user-assisted attacker to inject arbitrary web script in product deployments that explicitly disable the default CSP.Ī format string vulnerability in mpv through 0.33.0 allows user-assisted remote attackers to achieve code execution via a crafted m3u playlist file.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |