![]() An attacker that is able to use the PAM Console (i.e. On Triangle MicroWorks' SCADA Data Gateway version = 18.2 but prior to 21.1.0, 20.0.6, and 19.2.12 is built and configured for PAM authentication, a failed PAM authentication will leak a small amount of memory. This issue does not affect Juniper Networks Junos OS on SRX Series and on MX Series: All versions prior to 18.2R1. This vulnerability affects Firefox show system buffers 783/1497/2280 mbufs in use (current/cache/total) show system buffers 793/1487/2280 mbufs in use (current/cache/total) show security alg status | match sip SIP : Enabled This issue affects Juniper Networks Junos OS on SRX Series and on MX Series: All versions prior to 19.3R3-S7 19.4 versions prior to 19.4R2-S8, 19.4R3-S10 20.1 versions 20.1R1 and later versions 20.2 versions prior to 20.2R3-S6 20.3 versions prior to 20.3R3-S6 20.4 versions prior to 20.4R3-S5 21.1 versions prior to 21.1R3-S5 21.2 versions prior to 21.2R3-S1 21.3 versions prior to 21.3R3 21.4 versions prior to 21.4R2-S2, 21.4R3 22.1 versions prior to 22.1R1-S2, 22.1R2, 22.1R3-S1. On some systems-depending on the graphics settings and drivers-it was possible to force an out-of-bounds read and leak memory data into the images created on the canvas element. The fix was introduced in the iText 8.0.2 release on October 25th 2023, prior to the disclosure. NOTE: The vendor was contacted early about this vulnerability. The identifier VDB-246125 was assigned to this vulnerability. It is recommended to upgrade the affected component. ![]() Upgrading to version 8.0.2 is able to address this issue. The exploit has been disclosed to the public and may be used. ![]() ![]() This issue affects some unknown processing of the file PdfDocument.java of the component Reference Table Handler. A vulnerability, which was classified as problematic, has been found in Apryse iText 8.0.1. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |