![]() ![]() Of service via a crafted input file, as well as achieve remote codeĮxecution. Remote attackers can leverage this vulnerability to cause a denial The Lizard_decompress_LIZv1 function (lib/lizard_decompress_liz.h). Was renamed), there is an unchecked buffer size during a memcpy in In Lizard v1.0 and LZ5 v2.0 (the prior release, before the product PKCS12 Decoding crashes (CVE-2024-0727) CVE-2024-0727 CVE-2023-6237 lizard - Negative size passed to memcpy resulting in memory corruption lizard reports: Critical CVE-2024-0808: Integer underflow in WebUI.High CVE-2024-0807: Use after free in WebAudio.Backports for 3 security bugs in Chromium: ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |