CVE-2022-31372
- EPSS 0.62%
- Veröffentlicht 16.06.2022 14:15:09
- Zuletzt bearbeitet 21.11.2024 07:04:25
Wiris Mathtype v7.28.0 was discovered to contain a path traversal vulnerability in the resourceFile parameter. This vulnerability is exploited via a crafted request to the resource handler.
CVE-2018-6638
- EPSS 6.61%
- Veröffentlicht 28.02.2018 05:29:00
- Zuletzt bearbeitet 21.11.2024 04:11:02
A stack-based buffer overflow (Remote Code Execution) issue was discovered in Design Science MathType 6.9c. This occurs in a function call in which the first argument is a corrupted offset value and the second argument is a stack buffer. This is fixe...
CVE-2018-6639
- EPSS 4.03%
- Veröffentlicht 28.02.2018 05:29:00
- Zuletzt bearbeitet 21.11.2024 04:11:02
An out-of-bounds write (Remote Code Execution) issue was discovered in Design Science MathType 6.9c. A size used by memmove is read from the input file. This is fixed in 6.9d.
CVE-2018-6640
- EPSS 6.61%
- Veröffentlicht 28.02.2018 05:29:00
- Zuletzt bearbeitet 21.11.2024 04:11:02
A Heap Overflow (Remote Code Execution) issue was discovered in Design Science MathType 6.9c. Crafted input can modify the next pointer of a linked list. This is fixed in 6.9d.
CVE-2018-6641
- EPSS 4.03%
- Veröffentlicht 28.02.2018 05:29:00
- Zuletzt bearbeitet 21.11.2024 04:11:03
An Arbitrary Free (Remote Code Execution) issue was discovered in Design Science MathType 6.9c. Crafted input can overwrite a structure, leading to a function call with an invalid parameter, and a subsequent free of important data such as a function ...