

The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. Typically an application will call this function twice. In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt().

This vulnerability allows unauthenticated attackers to upload files into the server.ĭ through v21.1 allows attackers to execute arbitrary code via insecure deserialization. IncomCMS 2.0 has a modules/uploader/showcase/script.php insecure file upload vulnerability. Prototype pollution vulnerability in 'object-hierarchy-access' versions 0.2.0 through 0.32.0 allows attacker to cause a denial of service and may lead to remote code execution. The attack vector is: Bug can be used when application pass invalid utf-8 strings to functions like pango_itemize. The component is: function name: pango_log2vis_get_embedding_levels, assignment of nchars and the loop condition. The impact is: The heap based buffer overflow can be used to get code execution.

Gnome Pango 1.42 and later is affected by: Buffer Overflow. This does require the attacker to be able to spoof or take over original IP address of the original user's session. This allows an attacker (whether from a different computer, different web browser on the same machine, etc.) to take over an existing session. The router's management software manages web sessions based on IP address rather than verifying client cookies/session tokens/etc. Trendnet AC2600 TEW-827DRU version 2.08B01 contains a flaw in the session management for the device.
