![]() ![]() ![]() We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.Ī vulnerability was found in Xinhu RockOA 1.1/2.3.2/15.X3amdi and classified as problematic. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.Ī use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. VDB-241582 is the identifier assigned to this vulnerability. The exploit has been disclosed to the public and may be used. The manipulation leads to denial of service. This vulnerability affects unknown code of the component Password Transmission Handler. A vulnerability has been found in Delta Electronics DVP32ES2 PLC 1.48 and classified as critical.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |