• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

corruption

  1. 1

    Exploits WinRAR 5.80 Memory Corruption

    WinRAR version 5.80 suffers from a memory corruption vulnerability that allows for denial of service. View the full article
  2. 1

    Exploits Microsoft Windows Kernel win32k.sys TTF Font Processing win32k!ulClearTypeFilter Pool Corruption

    Microsoft Windows Kernel suffers from a TTF font processing win32k!ulClearTypeFilter pool corruption vulnerability in win32k.sys. View the full article
  3. 1

    Exploits Adobe Acrobat Reader DC For Windows Malformed TTF Font Memory Corruption

    Adobe Acrobat Reader DC for Windows suffers from a heap-based memory corruption vulnerability due to a malformed TTF font. View the full article
  4. 1

    Exploits Microsoft Font Subsetting DLL MakeFormat12MergedGlyphList Heap Corruption

    Microsoft Font Subsetting DLL suffers from a heap corruption vulnerability in MakeFormat12MergedGlyphList. View the full article
  5. 1

    Exploits Microsoft Font Subsetting DLL ReadAllocFormat12CharGlyphMapList Heap Corruption

    Microsoft Font Subsetting DLL suffers from a heap corruption vulnerability in ReadAllocFormat12CharGlyphMapList. View the full article
  6. 1

    Exploits Microsoft Font Subsetting DLL ReadTableIntoStructure Heap Corruption

    Microsoft Font Subsetting DLL suffers from a heap corruption vulnerability in ReadTableIntoStructure. View the full article
  7. 1

    Exploits Microsoft Font Subsetting DLL FixSbitSubTables Heap Corruption

    Microsoft Font Subsetting DLL suffers from a heap corruption vulnerability in FixSbitSubTables. View the full article
  8. 1

    Exploits Adobe Acrobat CoolType (AFDKO) Type 1 Font Memory Corruption

    Adobe Acrobat CoolType (AFDKO) suffers from a memory corruption vulnerability in the handling of Type 1 font load/store operators. View the full article
  9. 1

    Exploits iMessage NSKnownKeysDictionary1 Memory Corruption

    iMessage suffers from a memory corruption vulnerability when decoding NSKnownKeysDictionary1. View the full article
  10. 1

    Exploits Microsoft Font Subsetting DLL ComputeFormat4CmapData Heap Corruption

    There is a Microsoft Font Subsetting DLL heap corruption vulnerability in ComputeFormat4CmapData. View the full article
  11. 1

    Exploits Microsoft DirectWrite / AFDKO OpenType Stack Corruption

    Microsoft DirectWrite / AFDKO suffers from a stack corruption vulnerability in OpenType font handling while processing CFF blend DICT operator. View the full article
  12. 1

    Exploits Microsoft DirectWrite / AFDKO OpenType Stack Corruption Due To Negative nAxes

    Microsoft DirectWrite / AFDKO suffers from a stack corruption vulnerability in OpenType font handling due to negative nAxes. View the full article
  13. 1

    Exploits Microsoft DirectWrite / AFDKO OpenType Stack Corruption Due To Negative cubeStackDepth

    Microsoft DirectWrite / AFDKO suffers from a stack corruption vulnerability in OpenType font handling due to negative cubeStackDepth. View the full article
  14. 1

    Exploits Microsoft DirectWrite / AFDKO OpenType Stack Corruption Due To Out-Of-Bounds cubeStackDepth

    Microsoft DirectWrite / AFDKO suffers from a stack corruption vulnerability in OpenType font handling due to out-of-bounds cubeStackDepth. View the full article
  15. 1

    Exploits Microsoft DirectWrite / AFDKO OpenType blendArray Stack Corruption

    Microsoft DirectWrite / AFDKO suffers from a stack corruption vulnerability in OpenType font handling due to incorrect handling of blendArray. View the full article
  16. 1

    Exploits Shekar Endoscope Weak Default Settings / Memory Corruption

    Shekar Endoscope has telnet enabled by default, default wifi credentials, a flaw where an attacker can change the wifi password without any additional authentication, and four memory corruption vulnerabilities. View the full article
  17. 1

    Exploits Blipcare Clear Text Communication / Memory Corruption

    Blipcare web services suffer from having traffic in clear text, open wifi, and memory corruption vulnerabilities. View the full article
  18. 1

    Exploits Microsoft Internet Explorer Windows 10 1809 17763.316 Memory Corruption

    Microsoft Internet Explorer Windows 10 1809 17763.316 scripting engine memory corruption exploit. View the full article
  19. 1

    Exploits iOS 12.1.3 cfprefsd Memory Corruption

    iOS version 12.1.3 cfprefsd memory corruption exploit. View the full article
  20. 1

    Exploits Oracle Java Runtime Environment GlyphIterator::setCurrGlyphID Heap Corruption

    A heap corruption was observed in Oracle Java Runtime Environment version 8u202 (latest at the time of this writing) while fuzz-testing the processing of TrueType fonts. View the full article
Back
Top