-
### Description
Hello,
during the last pen test of our app, the testers noticed that some compiler settings do not comply with best practices.
**Debugging symbols**:
During the compilation proc…
-
**Describe the bug**
The lucene-core package used today is vulnerable due to a Stack-based Buffer Overflow. The `parseUnionExp()`, `parseInterExp()`, and `parseConcatExp()` methods in the `RegExp` cl…
-
Vulnerable Library - github.com/caffix/netmap-v0.2.5
Path to dependency file: /go.mod
Path to vulnerable library: /go/pkg/mod/cache/download/modernc.org/libc/@v/v1.24.1.mod
Found in HEAD commit:…
-
The size of the buffer used by Buffer::getArrayBuffer in size, at line 15 of /widl-nanmaster/
test/buffer/buffer.cpp, is not properly verified before writing data to the buffer. This can enable a buf…
-
### 🚀 The Task
Given source code with (potential) security vulnerabilities, the model should be able to detect and discuss the issue with the programmer.
### Example
```
Is there any issue with t…
-
Findings for Container Security, Medium, [TheRedHatter/javagoof:exploits/tomcat-rce/Dockerfile]:Integer Overflow or Wraparound
## Component Details
- **Exploit Maturity**: no-known-exploit
- **Vulne…
-
**Is your feature request related to a problem? Please describe.**
Even if this project might not be considered as critical in terms of security, Hackers still may try to use it as an attack vector…
-
Hello, may I do an experiment on buffer overflow attacks on pulpino? @jim-wilson@zarubaf
-
## Summary
This module would exploit CVE-2024-30078 a remotely accessible RCE vulnerability in the Windows WiFi driver which requires no user authentication. It affects a wide range of Windows devi…
-
https://github.com/vratiskol/proxmark3/blob/8d9d03f05aea3ddfd2191ee387418b62478b204e/client/emv/apduinfo.c#L286-L291
The size of the buffer used by *GetAPDUCode in buf, at line 286 of client\emv\ap…