![]() ![]() User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-232242894 This could lead to remote escalation of privilege with no additional execution privileges needed. In parseTrackFragmentRun() of MPEG4Extractor.cpp, there is a possible out of bounds read due to an integer overflow. The pullit package before 1.4.0 for Node.js allows OS Command Injection because eval is used on an attacker-supplied Git branch name. The identifier VDB-223801 was assigned to this vulnerability. It is recommended to apply a patch to fix this issue. ![]() Affected by this vulnerability is the function interface_disp_page/interface_disp_page of the file read.php. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis.Ī vulnerability was found in grinnellplans-php up to 3.0. Patch information is provided when available. This information may include identifying information, values, definitions, and related links. Low: vulnerabilities with a CVSS base score of 0.0–3.9Įntries may include additional information provided by organizations and efforts sponsored by CISA.Medium: vulnerabilities with a CVSS base score of 4.0–6.9. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |