Web1 mrt. 2024 · PJSUA offers a rich Media Manipulation API, where we have spotted the following vulnerabilities: CVE-2024-43299 was found in pjsua_player_create (OO … Web14 mrt. 2024 · None. A use-after-free vulnerability exists within the way Ichitaro Word Processor 2024, version 1.0.1.57600, processes protected documents. A specially …
5 New Vulnerabilities Discovered in PJSIP Open Source Library
WebA buffer overflow vulnerability exists in the Attribute Arena functionality of Ichitaro 2024 1.0.1.57600. A specially crafted document can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability. 2024-04-05: not yet calculated: CVE-2024-45115 MISC MISC: arm_developer -- mali_gpu_kernel_driver Web2 dagen geleden · Definition: Memory corruption can be described as the vulnerability that may occur in a computer system when its memory is altered without an explicit … bote hats
NVD - CVE-2024-11882 - NIST
Web11 apr. 2024 · An attacker could cause the memory manager to incorrectly free a pointer that addresses attacker-controlled memory, resulting in an assertion, memory … Web11 apr. 2024 · Description An attacker could have caused an out of bounds memory access using WebGL APIs, leading to memory corruption and a potentially exploitable crash. This bug only affects Thunderbird for macOS. Other operating systems are unaffected. References Bug 1794292 # CVE-2024-29532: Mozilla Maintenance Service Write-lock … Web11 dec. 2013 · Microsoft Windows 8 and Windows Server 2012, when Hyper-V is used, does not ensure memory-address validity, which allows guest OS users to execute arbitrary code in all guest OS instances, and allows guest OS users to cause a denial of service (host OS crash), via a guest-to-host hypercall with a crafted function parameter, aka "Address … hawthorne heights lead singer death