Search

Microsoft Exchange Server Exploit Code Posted to GitHub - Dark Reading

sutitong.blogspot.com
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database CVE-2020-36278
PUBLISHED: 2021-03-12

Leptonica before 1.80.0 allows a heap-based buffer over-read in findNextBorderPixel in ccbord.c.

CVE-2020-36279
PUBLISHED: 2021-03-12

Leptonica before 1.80.0 allows a heap-based buffer over-read in rasteropGeneralLow, related to adaptmap_reg.c and adaptmap.c.

CVE-2020-36280
PUBLISHED: 2021-03-12

Leptonica before 1.80.0 allows a heap-based buffer over-read in pixReadFromTiffStream, related to tiffio.c.

CVE-2016-20009
PUBLISHED: 2021-03-11

** UNSUPPORTED WHEN ASSIGNED ** A DNS client stack-based buffer overflow in ipdnsc_decode_name() affects Wind River VxWorks 6.5 through 7. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

CVE-2020-24983
PUBLISHED: 2021-03-11

An issue was discovered in Quadbase EspressReports ES 7 Update 9. An unauthenticated attacker can create a malicious HTML file that houses a POST request made to the DashboardBuilder within the target web application. This request will utilise the target admin session and perform the authenticated r...

Let's block ads! (Why?)



"exchange" - Google News
March 12, 2021 at 02:15AM
https://ift.tt/3bCKdmP

Microsoft Exchange Server Exploit Code Posted to GitHub - Dark Reading
"exchange" - Google News
https://ift.tt/3c55nbe
https://ift.tt/3b2gZKy
Exchange

Bagikan Berita Ini

0 Response to "Microsoft Exchange Server Exploit Code Posted to GitHub - Dark Reading"

Post a Comment

Powered by Blogger.