A vulnerability classified as critical has been found in Atomicparsley up to 20210124.204813.840499f. Affected is the function APar_read64
of the file src/util.cpp. Applying a patch is able to eliminate this problem. The bugfix is ready for download at github.com.
Atomicparsley up to 20210124.204813.840499f src/util.cpp APar_read64 stack-based overflow
- Virtual Patching
- August 4, 2021
- 1:04 pm
CVE-2023-42917 : APPLE IOS/IPADOS WEB CONTENTS MEMORY CORRUPTION
Description A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2,
CVE-2023-4474 : ZYXEL NAS326/NAS542 WSGI SERVER OS COMMAND INJECTION
Description The improper neutralization of special elements in the WSGI server of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542
CVE-2023-46589 : APACHE TOMCAT UP TO 8.5.95/9.0.82/10.1.15/11.0.0-M10 HTTP TRAILER HEADER REQUEST SMUGGLING
Description Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82