Filtered by vendor Wiris
Subscribe
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-31372 | 1 Wiris | 1 Mathtype | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Wiris Mathtype v7.28.0 was discovered to contain a path traversal vulnerability in the resourceFile parameter. This vulnerability is exploited via a crafted request to the resource handler. | |||||
CVE-2018-6641 | 1 Wiris | 1 Mathtype | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An Arbitrary Free (Remote Code Execution) issue was discovered in Design Science MathType 6.9c. Crafted input can overwrite a structure, leading to a function call with an invalid parameter, and a subsequent free of important data such as a function pointer or list pointer. This is fixed in 6.9d. | |||||
CVE-2018-6640 | 1 Wiris | 1 Mathtype | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
A Heap Overflow (Remote Code Execution) issue was discovered in Design Science MathType 6.9c. Crafted input can modify the next pointer of a linked list. This is fixed in 6.9d. | |||||
CVE-2018-6639 | 1 Wiris | 1 Mathtype | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An out-of-bounds write (Remote Code Execution) issue was discovered in Design Science MathType 6.9c. A size used by memmove is read from the input file. This is fixed in 6.9d. | |||||
CVE-2018-6638 | 1 Wiris | 1 Mathtype | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
A stack-based buffer overflow (Remote Code Execution) issue was discovered in Design Science MathType 6.9c. This occurs in a function call in which the first argument is a corrupted offset value and the second argument is a stack buffer. This is fixed in 6.9d. |