Wiris

Mathtype

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.62%
  • Veröffentlicht 16.06.2022 14:15:09
  • Zuletzt bearbeitet 21.11.2024 07:04:25

Wiris Mathtype v7.28.0 was discovered to contain a path traversal vulnerability in the resourceFile parameter. This vulnerability is exploited via a crafted request to the resource handler.

Exploit
  • EPSS 6.61%
  • Veröffentlicht 28.02.2018 05:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:02

A stack-based buffer overflow (Remote Code Execution) issue was discovered in Design Science MathType 6.9c. This occurs in a function call in which the first argument is a corrupted offset value and the second argument is a stack buffer. This is fixe...

Exploit
  • EPSS 4.03%
  • Veröffentlicht 28.02.2018 05:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:02

An out-of-bounds write (Remote Code Execution) issue was discovered in Design Science MathType 6.9c. A size used by memmove is read from the input file. This is fixed in 6.9d.

Exploit
  • EPSS 6.61%
  • Veröffentlicht 28.02.2018 05:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:02

A Heap Overflow (Remote Code Execution) issue was discovered in Design Science MathType 6.9c. Crafted input can modify the next pointer of a linked list. This is fixed in 6.9d.

Exploit
  • EPSS 4.03%
  • Veröffentlicht 28.02.2018 05:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:03

An Arbitrary Free (Remote Code Execution) issue was discovered in Design Science MathType 6.9c. Crafted input can overwrite a structure, leading to a function call with an invalid parameter, and a subsequent free of important data such as a function ...