Use After Free in GitHub repository vim/vim prior to v. If the pointer is warped from a screen 1 to a screen 0, a use-after-free issue may be triggered during shutdown or reset of the Xvfb server, allowing for possible escalation of privileges or denial of service. This issue occurs in Xvfb with a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode). VDB-242186 is the identifier assigned to this vulnerability.Ī use-after-free flaw was found in xorg-x11-server-Xvfb. The exploit has been disclosed to the public and may be used. The manipulation of the argument search leads to sql injection. Affected by this issue is some unknown functionality of the file /vm/admin/doctors.php of the component Parameter Handler. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.Ī vulnerability was found in SourceCodester Free Hospital Management System for Small Practices 1.0 and classified as critical. The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |