Exploiting memory corruption vulnerabilities in server-side software often requires knowledge of the binary and environment, which limits the attack surface, especially for unknown binaries and load-balanced environments. Successful exploitation is challenging due to the difficulty of preparing the heap and deploying ROP chains without this information. Researchers discovered vulnerabilities in the Kakadu JPEG 2000 library, […] The post Critical Vulnerabilities in JPEG 2000 Library Let Attackers Execute Remote Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Source: gbhackers.com/vulnerabilities-in-jpeg-2000-library/
Source: gbhackers.com/vulnerabilities-in-jpeg-2000-library/
comments: 0