The specific flaw exists within the getdirparams method. Authentication is not required to exploit this vulnerability. ![]() This vulnerability allows remote attackers to disclose sensitive information on affected installations of Netatalk. An attacker can leverage this vulnerability to execute code in the context of root. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. The specific flaw exists within the setfilparams function. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. The issue results from the lack of proper error handling when parsing AppleDouble entries. The specific flaw exists within the parse_entries function. An attacker can leverage this vulnerability to execute code in the context of the current process. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. ![]() The specific flaw exists within the processing of DSI structures in Netatalk. Authentication is not required to exploit this vulnerablity. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. The specific flaw exists within the ad_addcomment function.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |