No description available
The JavascriptArray::ConcatArgs method in JavaScriptCore in WebKit before r206375, as used in Apple iOS before 9.3.2, mishandles the spread operator, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted web site.
This exploit targets Interbase Server 2007 <=SP1 v8.0.0.123-w32 (UNIVERSAL) and allows an attacker to execute arbitrary code with the privileges of the Interbase service. The exploit uses a buffer overflow vulnerability in the Interbase server to overwrite the return address and redirect execution to the shellcode.
There is an overflow when constructing a new object with arguments which has 0xffff elements in Chakra. This issue can be reproduced steadily in the latest version of Edge in Windows 10 WIP.
There is a heap overflow vulnerability in Chakra when evaluating a string that is large enough. This vulnerability can be reproduced in the latest version of Edge on Windows 10 WIP. Opening a specific HTML file in Edge triggers an exception immediately. The vulnerable code is in the file GlobalObject.cpp in the ChakraCore-master library, specifically in the DefaultEvalHelper function. When evaluating the source code, a buffer of insufficient size is allocated on the heap, leading to an overflow when the source length is large enough. This results in an out-of-bounds write.
The CreateProcess & CreateProcessEx method in vielib.dll in VmWare Inc version 6.0.0 does not check if they're being called from the application or malicious users, allowing a remote attacker to execute code in a remote system with the actual user privileges. This can be achieved by crafting a malicious html page.
The use-after free vulnerability in Microsoft Edge can lead to memory disclosure. The vulnerability has been confirmed on Windows 10 Enterprise 64-bit (OS version 1607, OS build 14393.1198), Microsoft Edge 38.14393.1066.0, Microsoft EdgeHTML 14.14393.
The vulnerability allows an attacker to inject SQL commands.
The StartProcess method in vielib.dll in Vmware Version 6.0.0 does not check if it's being called from the application or by malicious users. This allows remote attackers to execute arbitrary code in a remote system with the actual user privileges.
The DALIM SOFTWARE ES Core 5.0 build 7184.1 is affected by multiple stored XSS and CSRF vulnerabilities. These vulnerabilities allow remote attackers to inject malicious script code into the application, which can lead to unauthorized actions or information disclosure.