Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:42964
HistoryAug 25, 2023 - 1:46 p.m.

Use After Free

2023-08-2513:46:26
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
7
use after free
dpic
thedeletestringbox
dpic.y
validation
user inputs
exploitation
crafted input

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

39.1%

Dpic is vulnerable to Use After Free. This vulnerability exists in the ‘thedeletestringbox’ function of ‘dpic.y’ due to the lack of validation of user inputs, which allows an attacker to exploit it through the use of maliciously crafted input

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

39.1%