On Sun, 24 Mar 2024 21:46:40 +0100 Moritz Muehlenhoff
wrote:
- 8< -
>
> I never tried to reproduce these, but reproducability of a given PoC
> made against a current version not working with an older version
> doesn't mean the old version is
On Thu, Mar 21, 2024 at 09:33:51PM +0100, Andreas Rönnquist wrote:
> On Fri, 10 Mar 2023 18:04:23 +0100 =?UTF-8?Q?Moritz_M=C3=BChlenhoff?=
> wrote:
> > Source: allegro4.4
> > X-Debbugs-CC: t...@security.debian.org
> > Severity: important
> > Tags: security
> >
> > Hi,
> >
> > The following vuln
On Fri, 10 Mar 2023 18:04:23 +0100 =?UTF-8?Q?Moritz_M=C3=BChlenhoff?=
wrote:
> Source: allegro4.4
> X-Debbugs-CC: t...@security.debian.org
> Severity: important
> Tags: security
>
> Hi,
>
> The following vulnerability was published for allegro4.4.
>
> CVE-2021-36489[0]:
> | Buffer Overflow vul
Source: allegro4.4
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security
Hi,
The following vulnerability was published for allegro4.4.
CVE-2021-36489[0]:
| Buffer Overflow vulnerability in Allegro through 5.2.6 allows
| attackers to cause a denial of service via crafted PCX/T
4 matches
Mail list logo