The TextField setFormat method in Adobe Flash contains a use-after-free vulnerability. By passing an object parameter with a defined valueOf function, or by overriding a constructor of the object parameter, an attacker can free the TextField parent object. This can lead to subsequent use of the freed object, potentially allowing for arbitrary code execution.
The MovieClip.attachBitmap method in Adobe Flash Player is vulnerable to a use-after-free vulnerability. When the depth parameter is an object with the valueOf method defined, the method can free the MovieClip, which is then used, leading to potential code execution or crash.
There is an overflow in the ui::PlatformCursor WebCursor::GetPlatformCursor method. The issue is in the x11 implementation, but it appears to affect other platform-specific implementations as well. The buffer is allocated based on the width and height of the custom_size_, but the memcpy is performed using the size of the custom_data_. This can lead to a buffer overflow.
Monalbum 0.8.7 is vulnerable to remote code execution. The vulnerability exists in the 'glangage' parameter, which is not properly validated before being included in the 'config.inc.php' file. An attacker can exploit this vulnerability to execute arbitrary code on the server.
There are a number of use-after-frees in MovieClip.lineStyle. If any of the String parameters are an object with toString defined, the toString method can delete the MovieClip, which is subsequently used.
The R2K Gallery v1.7 is vulnerable to a local file inclusion vulnerability. An attacker can exploit this vulnerability by manipulating the 'pictures_folder' and 'lang2' parameters in the 'galeria.php' script to include arbitrary files from the local system. This can lead to unauthorized access, information disclosure, and possibly remote code execution.
The vulnerability exists due to improper handling of user-supplied input in the 'src' parameter of the 'phpThumb.php' script. An attacker can exploit this vulnerability to disclose arbitrary files on the target system.
A stack-based out-of-bounds memory read vulnerability exists in Wireshark. By feeding a malformed file to tshark, an attacker can trigger a crash due to a stack-based buffer overflow, leading to potential remote code execution or denial of service.
A use-after-free vulnerability exists in Wireshark which can be triggered by feeding a malformed file to tshark. This vulnerability leads to a crash due to a heap-use-after-free condition.
This exploit allows an attacker to change the password of a user in Snaps! Gallery 1.4.4 remotely.