RSS   Podatności dla 'Libming'   RSS

2020-04-19
 
CVE-2020-11895

CWE-125
 

 
Ming (aka libming) 0.4.8 has a heap-based buffer over-read (2 bytes) in the function decompileIF() in decompile.c.

 
 
CVE-2020-11894

CWE-125
 

 
Ming (aka libming) 0.4.8 has a heap-based buffer over-read (8 bytes) in the function decompileIF() in decompile.c.

 
2020-01-09
 
CVE-2020-6629

CWE-476
 

 
Ming (aka libming) 0.4.8 has z NULL pointer dereference in the function decompileGETURL2() in decompile.c.

 
 
CVE-2020-6628

CWE-125
 

 
Ming (aka libming) 0.4.8 has a heap-based buffer over-read in the function decompile_SWITCH() in decompile.c.

 
2019-09-23
 
CVE-2019-16705

CWE-125
 

 
Ming (aka libming) 0.4.8 has an out of bounds read vulnerability in the function OpCode() in the decompile.c file in libutil.a.

 
2019-06-26
 
CVE-2019-12982

CWE-119
 

 
Ming (aka libming) 0.4.8 has a heap buffer overflow and underflow in the decompileCAST function in util/decompile.c in libutil.a. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted SWF file.

 
 
CVE-2019-12981

CWE-119
 

 
Ming (aka libming) 0.4.8 has an "fill overflow" vulnerability in the function SWFShape_setLeftFillStyle in blocks/shape.c.

 
 
CVE-2019-12980

CWE-190
 

 
In Ming (aka libming) 0.4.8, there is an integer overflow (caused by an out-of-range left shift) in the SWFInput_readSBits function in blocks/input.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted swf file.

 
2019-02-07
 
CVE-2019-7582

CWE-119
 

 
The readBytes function in util/read.c in libming through 0.4.8 allows remote attackers to have unspecified impact via a crafted swf file that triggers a memory allocation failure.

 
 
CVE-2019-7581

CWE-119
 

 
The parseSWF_ACTIONRECORD function in util/parser.c in libming through 0.4.8 allows remote attackers to have unspecified impact via a crafted swf file that triggers a memory allocation failure, a different vulnerability than CVE-2018-7876.

 


Copyright 2021, cxsecurity.com

 

Back to Top