Количество 4
Количество 4
CVE-2023-35057
An integer overflow vulnerability exists in the LXT2 lxt2_rd_trace value elements allocation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability.
CVE-2023-35057
An integer overflow vulnerability exists in the LXT2 lxt2_rd_trace value elements allocation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability.
CVE-2023-35057
An integer overflow vulnerability exists in the LXT2 lxt2_rd_trace val ...
GHSA-3mqx-ggcf-qxwg
An integer overflow vulnerability exists in the LXT2 lxt2_rd_trace value elements allocation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-35057 An integer overflow vulnerability exists in the LXT2 lxt2_rd_trace value elements allocation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability. | CVSS3: 7.8 | 0% Низкий | около 2 лет назад | |
CVE-2023-35057 An integer overflow vulnerability exists in the LXT2 lxt2_rd_trace value elements allocation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability. | CVSS3: 7.8 | 0% Низкий | около 2 лет назад | |
CVE-2023-35057 An integer overflow vulnerability exists in the LXT2 lxt2_rd_trace val ... | CVSS3: 7.8 | 0% Низкий | около 2 лет назад | |
GHSA-3mqx-ggcf-qxwg An integer overflow vulnerability exists in the LXT2 lxt2_rd_trace value elements allocation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability. | CVSS3: 7.8 | 0% Низкий | около 2 лет назад |
Уязвимостей на страницу