(Chromium security severity: Low)Ī use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. Use after free in Cast in Google Chrome prior to 1.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. Use after free in Blink History in Google Chrome prior to 1.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. ![]() Use After Free in GitHub repository vim/vim prior to v. VDB-242186 is the identifier assigned to this vulnerability. The exploit has been disclosed to the public and may be used. The manipulation of the argument search leads to sql injection. Affected by this issue is some unknown functionality of the file /vm/admin/doctors.php of the component Parameter Handler. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.Ī vulnerability was found in SourceCodester Free Hospital Management System for Small Practices 1.0 and classified as critical. ![]() The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |