4.3
CVSSv2

CVE-2018-16323

Published: 01/09/2018 Updated: 25/06/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 436
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

ReadXBMImage in coders/xbm.c in ImageMagick prior to 7.0.8-9 leaves data uninitialized when processing an XBM file that has a negative pixel value. If the affected code is used as a library loaded into a process that includes sensitive information, that information sometimes can be leaked via the image data.

Vulnerability Trend

Affected Products

Vendor Product Versions
ImagemagickImagemagick-, 4.2.7, 4.2.9, 5.2, 5.2.0, 5.2.4.3, 5.2.6, 5.3, 5.3.0, 5.3.1, 5.3.2, 5.3.3, 5.3.4, 5.3.5, 5.3.6, 5.3.7, 5.3.8, 5.3.8.2, 5.3.9, 5.4, 5.4.0.5, 5.4.1.2, 5.4.2.3, 5.4.3, 5.4.3.11, 5.4.4.5, 5.4.5.1, 5.4.6.3, 5.4.7, 5.4.7.4, 5.4.8, 5.4.8.3, 5.4.9.1, 5.5, 5.5.1.4, 5.5.2.5, 5.5.3.2, 5.5.3.2.1.2.0, 5.5.4, 5.5.4.4, 5.5.5.3, 5.5.6, 5.5.6.0 2003-04-09, 5.5.6.0 20030409, 5.5.7, 5.5.7.15, 5.5.7.31, 5.5.7.35, 5.5.7q8, 5.5.7q16, 6.0, 6.0.0.7, 6.0.1, 6.0.1.4, 6.0.2, 6.0.2.5, 6.0.2.7, 6.0.3, 6.0.3.5, 6.0.4, 6.0.4.4, 6.0.5, 6.0.5.3, 6.0.6, 6.0.6.1, 6.0.6.2, 6.0.7, 6.0.7.3, 6.0.8, 6.0.8.3, 6.1, 6.1.0.9, 6.1.1, 6.1.1.6, 6.1.2, 6.1.2.7, 6.1.3, 6.1.3.7, 6.1.4, 6.1.4.5, 6.1.5, 6.1.5.8, 6.1.6, 6.1.6.9, 6.1.7, 6.1.7.5, 6.1.8, 6.1.8.7, 6.1.9.4, 6.2, 6.2.0.3, 6.2.0.4, 6.2.0.7, 6.2.0.8, 6.2.1, 6.2.1.7, 6.2.2, 6.2.2.5, 6.2.3, 6.2.3.4, 6.2.3.6, 6.2.4, 6.2.4.3, 6.2.4.5, 6.2.5, 6.2.6, 6.2.7, 6.2.8, 6.2.8.0, 6.2.8.1, 6.2.8.2, 6.2.8.3, 6.2.9, 6.2.9.2, 6.3.0.0, 6.3.0.1, 6.3.0.2, 6.3.0.3, 6.3.0.4, 6.3.0.5, 6.3.0.7, 6.3.0.8, 6.3.1, 6.3.1-6, 6.3.1-7, 6.3.1.0, 6.3.1.1, 6.3.1.2., 6.3.1.3, 6.3.1.4, 6.3.1.5, 6.3.1.6, 6.3.1.7, 6.3.2, 6.3.2-0, 6.3.2-1, 6.3.2-2, 6.3.2-3, 6.3.2-4, 6.3.2-5, 6.3.2-6, 6.3.2-7, 6.3.2-8, 6.3.2.0, 6.3.2.1, 6.3.2.2, 6.3.2.3, 6.3.2.4, 6.3.2.5, 6.3.2.6, 6.3.2.7, 6.3.2.8, 6.3.3, 6.3.3-0, 6.3.3-1, 6.3.3-2, 6.3.3-3, 6.3.3-4, 6.3.3-5, 6.3.3-6, 6.3.3-7, 6.3.3-8, 6.3.3-9, 6.3.3.0, 6.3.3.1, 6.3.3.2, 6.3.3.3, 6.3.3.4, 6.3.3 3, 6.3.3 5, 6.3.3 6, 6.3.4, 6.3.4-0, 6.3.4-1, 6.3.4-2, 6.3.4-3, 6.3.4-4, 6.3.4-5, 6.3.4-6, 6.3.4-8, 6.3.4-9, 6.3.4-10, 6.3.5, 6.3.5-0, 6.3.5-4, 6.3.5-5, 6.3.5-6, 6.3.5-7, 6.3.5-9, 6.3.5-10, 6.3.6, 6.3.6-0, 6.3.6-1, 6.3.6-2, 6.3.6-3, 6.3.6-4, 6.3.6-5, 6.3.6-6, 6.3.6-7, 6.3.6-8, 6.3.6-9, 6.3.6-10, 6.3.7, 6.3.7-0, 6.3.7-1, 6.3.7-2, 6.3.7-3, 6.3.7-4, 6.3.7-5, 6.3.7-7, 6.3.7-9, 6.3.7-10, 6.3.8, 6.3.8-0, 6.3.8-1, 6.3.8-2, 6.3.8-3, 6.3.8-5, 6.3.8-6, 6.3.8-7, 6.3.8-9, 6.3.8-10, 6.3.9, 6.3.9-0, 6.3.9-1, 6.3.9-2, 6.3.9-4, 6.3.9-5, 6.3.9-6, 6.3.9-7, 6.3.9-8, 6.3.9-9, 6.3.9-10, 6.4.0, 6.4.0-0, 6.4.0-1, 6.4.0-4, 6.4.0-5, 6.4.0-6, 6.4.0-7, 6.4.0-8, 6.4.0-10, 6.4.0-11, 6.4.1, 6.4.1-0, 6.4.1-1, 6.4.1-2, 6.4.1-3, 6.4.1-4, 6.4.1-5, 6.4.1-6, 6.4.1-7, 6.4.1-8, 6.4.1-9, 6.4.2, 6.4.2-0, 6.4.2-1, 6.4.2-2, 6.4.2-4, 6.4.2-5, 6.4.2-6, 6.4.2-7, 6.4.2-8, 6.4.2-9, 6.4.2-10, 6.4.3, 6.4.3-0, 6.4.3-1, 6.4.3-2, 6.4.3-3, 6.4.3-5, 6.4.3-6, 6.4.3-7, 6.4.3-8, 6.4.3-10, 6.4.4, 6.4.4-0, 6.4.4-1, 6.4.4-3, 6.4.4-5, 6.4.4-7, 6.4.4-8, 6.4.5, 6.4.5-0, 6.4.5-1, 6.4.5-2, 6.4.5-3, 6.4.5-4, 6.4.5-6, 6.4.5-7, 6.4.5-9, 6.4.6, 6.4.6-0, 6.4.6-1, 6.4.6-2, 6.4.6-3, 6.4.6-4, 6.4.6-5, 6.4.6-6, 6.4.6-8, 6.4.6-9, 6.4.7-1, 6.4.7-2, 6.4.7-3, 6.4.7-4, 6.4.7-5, 6.4.7-6, 6.4.7-7, 6.4.7-8, 6.4.7-9, 6.4.7-10, 6.4.8, 6.4.8-0, 6.4.8-1, 6.4.8-2, 6.4.8-3, 6.4.8-4, 6.4.8-5, 6.4.8-6, 6.4.8-7, 6.4.8-8, 6.4.8-9, 6.4.8-10, 6.4.9, 6.4.9-0, 6.4.9-2, 6.4.9-3, 6.4.9-5, 6.4.9-7, 6.4.9-8, 6.4.9-9, 6.4.9-10, 6.5.0, 6.5.0-0, 6.5.0-1, 6.5.0-2, 6.5.0-3, 6.5.0-4, 6.5.0-5, 6.5.0-6, 6.5.0-7, 6.5.0-8, 6.5.0-9, 6.5.0-10, 6.5.1, 6.5.1-0, 6.5.1-1, 6.5.1-2, 6.5.1-3, 6.5.1-4, 6.5.1-5, 6.5.1-6, 6.5.1-7, 6.5.1-9, 6.5.1-10, 6.5.2, 6.5.2-0, 6.5.2-1, 6.5.2-2, 6.5.2-3, 6.5.2-4, 6.5.2-5, 6.5.2-6, 6.5.2-7, 6.5.2-8, 6.5.2-9, 6.5.2-10, 6.5.3, 6.5.3-0, 6.5.3-1, 6.5.3-3, 6.5.3-4, 6.5.3-5, 6.5.3-6, 6.5.3-7, 6.5.3-8, 6.5.3-10, 6.5.4, 6.5.4-0, 6.5.4-1, 6.5.4-2, 6.5.4-3, 6.5.4-4, 6.5.4-5, 6.5.4-6, 6.5.4-7, 6.5.4-8, 6.5.4-9, 6.5.4-10, 6.5.5, 6.5.5-0, 6.5.5-1, 6.5.5-2, 6.5.5-3, 6.5.5-4, 6.5.5-5, 6.5.5-6, 6.5.5-7, 6.5.5-8, 6.5.5-9, 6.5.5-10, 6.5.6, 6.5.6-0, 6.5.6-2, 6.5.6-3, 6.5.6-4, 6.5.6-5, 6.5.6-6, 6.5.6-7, 6.5.6-8, 6.5.6-9, 6.5.6-10, 6.5.7, 6.5.7-0, 6.5.7-1, 6.5.7-2, 6.5.7-3, 6.5.7-4, 6.5.7-5, 6.5.7-6, 6.5.7-7, 6.5.7-8, 6.5.7-9, 6.5.8, 6.5.8-0, 6.5.8-1, 6.5.8-2, 6.5.8-3, 6.5.8-4, 6.5.8-5, 6.5.8-6, 6.5.8-7, 6.5.8-8, 6.5.8-9, 6.5.9, 6.5.9-0, 6.5.9-1, 6.5.9-2, 6.5.9-3, 6.5.9-4, 6.5.9-5, 6.5.9-6, 6.5.9-7, 6.5.9-8, 6.5.9-10, 6.6.0, 6.6.0-0, 6.6.0-1, 6.6.0-2, 6.6.0-3, 6.6.0-4, 6.6.0-5, 6.6.0-6, 6.6.0-7, 6.6.0-8, 6.6.0-9, 6.6.0-10, 6.6.1, 6.6.1-0, 6.6.1-1, 6.6.1-2, 6.6.1-3, 6.6.1-4, 6.6.1-5, 6.6.1-6, 6.6.1-7, 6.6.1-8, 6.6.1-9, 6.6.1-10, 6.6.2, 6.6.2-0, 6.6.2-1, 6.6.2-2, 6.6.2-3, 6.6.2-4, 6.6.2-5, 6.6.2-6, 6.6.2-7, 6.6.2-8, 6.6.2-9, 6.6.2-10, 6.6.3, 6.6.3-0, 6.6.3-1, 6.6.3-2, 6.6.3-3, 6.6.3-4, 6.6.3-5, 6.6.3-6, 6.6.3-7, 6.6.3-10, 6.6.4, 6.6.4-0, 6.6.4-1, 6.6.4-2, 6.6.4-4, 6.6.4-5, 6.6.4-6, 6.6.4-7, 6.6.4-8, 6.6.4-9, 6.6.4-10, 6.6.5, 6.6.5-0, 6.6.5-1, 6.6.5-2, 6.6.5-3, 6.6.5-4, 6.6.5-5, 6.6.5-6, 6.6.5-7, 6.6.5-8, 6.6.5-9, 6.6.5-10, 6.6.6-0, 6.6.6-1, 6.6.6-2, 6.6.6-3, 6.6.6-4, 6.6.6-5, 6.6.6-6, 6.6.6-7, 6.6.6-8, 6.6.6-9, 6.6.6-10, 6.6.7-0, 6.6.7-1, 6.6.7-2, 6.6.7-3, 6.6.7-4, 6.6.7-5, 6.6.7-6, 6.6.7-7, 6.6.7-8, 6.6.7-9, 6.6.7-10, 6.6.8-0, 6.6.8-1, 6.6.8-2, 6.6.8-3, 6.6.8-4, 6.6.8-5, 6.6.8-6, 6.6.8-7, 6.6.8-8, 6.6.8-9, 6.6.8-10, 6.6.9-0, 6.6.9-1, 6.6.9-2, 6.6.9-3, 6.6.9-4, 6.6.9-5, 6.6.9-6, 6.6.9-7, 6.6.9-8, 6.6.9-9, 6.6.9-10, 6.7.0-0, 6.7.0-1, 6.7.0-2, 6.7.0-3, 6.7.0-4, 6.7.0-5, 6.7.0-6, 6.7.0-7, 6.7.0-8, 6.7.0-9, 6.7.0-10, 6.7.1-0, 6.7.1-1, 6.7.1-2, 6.7.1-3, 6.7.1-4, 6.7.1-5, 6.7.1-6, 6.7.1-7, 6.7.1-8, 6.7.1-9, 6.7.1-10, 6.7.2-0, 6.7.2-1, 6.7.2-2, 6.7.2-3, 6.7.2-4, 6.7.2-5, 6.7.2-6, 6.7.2-7, 6.7.2-8, 6.7.2-9, 6.7.2-10, 6.7.3-0, 6.7.3-1, 6.7.3-2, 6.7.3-3, 6.7.3-4, 6.7.3-5, 6.7.3-6, 6.7.3-7, 6.7.3-8, 6.7.3-9, 6.7.3-10, 6.7.4-0, 6.7.4-1, 6.7.4-2, 6.7.4-3, 6.7.4-4, 6.7.4-5, 6.7.4-6, 6.7.4-7, 6.7.4-8, 6.7.4-9, 6.7.4-10, 6.7.5-0, 6.7.5-1, 6.7.5-2, 6.7.5-3, 6.7.5-4, 6.7.5-5, 6.7.5-6, 6.7.5-7, 6.7.5-8, 6.7.5-9, 6.7.5-10, 6.7.6-0, 6.7.6-1, 6.7.6-2, 6.7.6-3, 6.7.6-4, 6.7.6-5, 6.7.6-6, 6.7.6-7, 6.7.6-8, 6.7.6-9, 6.7.6-10, 6.7.7-0, 6.7.7-1, 6.7.7-2, 6.7.7-3, 6.7.7-4, 6.7.7-5, 6.7.7-6, 6.7.7-7, 6.7.7-8, 6.7.7-9, 6.7.7-10, 6.7.8-0, 6.7.8-1, 6.7.8-2, 6.7.8-3, 6.7.8-4, 6.7.8-5, 6.7.8-6, 6.7.8-7, 6.7.8-8, 6.7.8-9, 6.7.8-10, 6.7.9-0, 6.7.9-1, 6.7.9-2, 6.7.9-3, 6.7.9-4, 6.7.9-5, 6.7.9-6, 6.7.9-7, 6.7.9-8, 6.7.9-9, 6.7.9-10, 6.8.0, 6.8.0-0, 6.8.0-1, 6.8.0-2, 6.8.0-3, 6.8.0-4, 6.8.0-5, 6.8.0-6, 6.8.0-7, 6.8.0-8, 6.8.0-9, 6.8.0-10, 6.8.1-0, 6.8.1-1, 6.8.1-2, 6.8.1-3, 6.8.1-4, 6.8.1-5, 6.8.1-6, 6.8.1-7, 6.8.1-8, 6.8.1-9, 6.8.1-10, 6.8.2-0, 6.8.2-1, 6.8.2-2, 6.8.2-3, 6.8.2-4, 6.8.2-5, 6.8.2-6, 6.8.2-7, 6.8.2-8, 6.8.2-9, 6.8.2-10, 6.8.3-0, 6.8.3-1, 6.8.3-2, 6.8.3-3, 6.8.3-4, 6.8.3-5, 6.8.3-6, 6.8.3-7, 6.8.3-8, 6.8.3-9, 6.8.3-10, 6.8.4-0, 6.8.4-1, 6.8.4-2, 6.8.4-3, 6.8.4-4, 6.8.4-5, 6.8.4-6, 6.8.4-7, 6.8.4-8, 6.8.4-9, 6.8.4-10, 6.8.5-0, 6.8.5-1, 6.8.5-2, 6.8.5-3, 6.8.5-4, 6.8.5-5, 6.8.5-6, 6.8.5-7, 6.8.5-8, 6.8.5-9, 6.8.5-10, 6.8.6-0, 6.8.6-1, 6.8.6-2, 6.8.6-3, 6.8.6-4, 6.8.6-5, 6.8.6-6, 6.8.6-7, 6.8.6-8, 6.8.6-9, 6.8.6-10, 6.8.6.2, 6.8.6.7, 6.8.6.9, 6.8.7-0, 6.8.7-1, 6.8.7-2, 6.8.7-3, 6.8.7-4, 6.8.7-5, 6.8.7-6, 6.8.7-7, 6.8.7-8, 6.8.7-9, 6.8.7-10, 6.8.8-0, 6.8.8-1, 6.8.8-2, 6.8.8-3, 6.8.8-4, 6.8.8-5, 6.8.8-6, 6.8.8-7, 6.8.8-8, 6.8.8-9, 6.8.8-10, 6.8.9-0, 6.8.9-1, 6.8.9-2, 6.8.9-3, 6.8.9-4, 6.8.9-5, 6.8.9-6, 6.8.9-7, 6.8.9-8, 6.8.9-9, 6.8.9-10, 6.9.0-0, 6.9.0-1, 6.9.0-2, 6.9.0-3, 6.9.0-4, 6.9.0-5, 6.9.0-6, 6.9.0-7, 6.9.0-8, 6.9.0-9, 6.9.0-10, 6.9.1-0, 6.9.1-1, 6.9.1-2, 6.9.1-3, 6.9.1-4, 6.9.1-5, 6.9.1-6, 6.9.1-7, 6.9.1-8, 6.9.1-9, 6.9.1-10, 6.9.2-0, 6.9.2-1, 6.9.2-2, 6.9.2-3, 6.9.2-4, 6.9.2-5, 6.9.2-6, 6.9.2-7, 6.9.2-8, 6.9.2-9, 6.9.2-10, 6.9.3-0, 6.9.3-1, 6.9.3-2, 6.9.3-3, 6.9.3-4, 6.9.3-5, 6.9.3-6, 6.9.3-7, 6.9.3-8, 6.9.3-9, 6.9.3-10, 6.9.4-0, 6.9.4-1, 6.9.4-2, 6.9.4-3, 6.9.4-4, 6.9.4-5, 6.9.4-6, 6.9.4-7, 6.9.4-8, 6.9.4-9, 6.9.4-10, 6.9.5-0, 6.9.5-1, 6.9.5-2, 6.9.5-3, 6.9.5-4, 6.9.5-5, 6.9.5-6, 6.9.5-7, 6.9.5-8, 6.9.5-9, 6.9.5-10, 6.9.6-0, 6.9.6-1, 6.9.6-2, 6.9.6-3, 6.9.6-4, 6.9.6-5, 6.9.6-6, 6.9.6-7, 6.9.6-8, 6.9.7, 6.9.7-0, 6.9.7-1, 6.9.7-2, 6.9.7-3, 6.9.7-4, 6.9.7-5, 6.9.7-6, 6.9.7-7, 6.9.7-8, 6.9.7-9, 6.9.7-10, 6.9.8-0, 6.9.8-1, 6.9.8-2, 6.9.8-3, 6.9.8-4, 6.9.8-5, 6.9.8-6, 6.9.8-7, 6.9.8-8, 6.9.8-9, 6.9.8-10, 6.9.9-0, 6.9.9-1, 6.9.9-2, 6.9.9-3, 6.9.9-4, 6.9.9-5, 6.9.9-6, 6.9.9-7, 6.9.9-8, 6.9.9-9, 6.9.9-10, 6.9.9-11, 6.9.9-12, 6.9.9-13, 6.9.9-14, 6.9.9-15, 6.9.9-17, 6.9.9-18, 6.9.9-19, 6.9.9-20, 6.9.9-21, 6.9.9-22, 6.9.9-23, 6.9.9-24, 6.9.9-25, 6.9.9-26, 6.9.9-27, 6.9.9-28, 6.9.9-29, 6.9.9-30, 6.9.9-31, 6.9.9-32, 6.9.9-33, 6.9.9-34, 7.0.0-0, 7.0.1-0, 7.0.1-1, 7.0.1-2, 7.0.1-3, 7.0.1-4, 7.0.1-5, 7.0.1-6, 7.0.1-7, 7.0.1-8, 7.0.1-9, 7.0.1-10, 7.0.2-0, 7.0.2-1, 7.0.2-2, 7.0.2-3, 7.0.2-4, 7.0.2-5, 7.0.2-6, 7.0.2-7, 7.0.2-8, 7.0.2-9, 7.0.2-10, 7.0.3-0, 7.0.3-1, 7.0.3-2, 7.0.3-3, 7.0.3-4, 7.0.3-5, 7.0.3-6, 7.0.3-7, 7.0.3-8, 7.0.3-9, 7.0.3-10, 7.0.4-0, 7.0.4-1, 7.0.4-2, 7.0.4-3, 7.0.4-4, 7.0.4-5, 7.0.4-6, 7.0.4-7, 7.0.4-8, 7.0.4-9, 7.0.4-10, 7.0.5-0, 7.0.5-1, 7.0.5-2, 7.0.5-3, 7.0.5-4, 7.0.5-5, 7.0.5-6, 7.0.5-7, 7.0.5-8, 7.0.5-9, 7.0.5-10, 7.0.6-0, 7.0.6-1, 7.0.6-2, 7.0.6-3, 7.0.6-4, 7.0.6-5, 7.0.6-6, 7.0.6-7, 7.0.6-8, 7.0.6-9, 7.0.6-10, 7.0.7, 7.0.7-0, 7.0.7-1, 7.0.7-2, 7.0.7-3, 7.0.7-4, 7.0.7-5, 7.0.7-6, 7.0.7-8, 7.0.7-9, 7.0.7-10, 7.0.7-11, 7.0.7-12, 7.0.7-13, 7.0.7-14, 7.0.7-15, 7.0.7-16, 7.0.7-17, 7.0.7-18, 7.0.7-19, 7.0.7-20, 7.0.7-21, 7.0.7-22, 7.0.7-23, 7.0.7-24, 7.0.7-25, 7.0.7-25q16, 7.0.7-26, 7.0.7-27, 7.0.7-28, 7.0.7-29, 7.0.7-30, 7.0.7-31, 7.0.7-32, 7.0.7-33, 7.0.7-34, 7.0.7-35, 7.0.7-36, 7.0.7-37, 7.0.7-38, 7.0.7-39, 7.0.7.7, 7.0.8-0, 7.0.8-1, 7.0.8-2, 7.0.8-3, 7.0.8-4, 7.0.8-5, 7.0.8-6, 7.0.8-7, 7.0.8-8
CanonicalUbuntu Linux14.04, 16.04, 18.04

Vendor Advisories

Debian Bug report logs - #907776 imagemagick: CVE-2018-16323 Package: src:imagemagick; Maintainer for src:imagemagick is ImageMagick Packaging Team <pkg-gmagick-im-team@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 1 Sep 2018 20:24:02 UTC Severity: important Tags: patch, ...
Debian Bug report logs - #910888 imagemagick: CVE-2018-16644 Package: src:imagemagick; Maintainer for src:imagemagick is ImageMagick Packaging Team <pkg-gmagick-im-team@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 12 Oct 2018 19:24:01 UTC Severity: grave Tags: fixed-upstr ...
Debian Bug report logs - #910889 imagemagick: CVE-2018-16645 Package: src:imagemagick; Maintainer for src:imagemagick is ImageMagick Packaging Team <pkg-gmagick-im-team@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 12 Oct 2018 19:27:01 UTC Severity: grave Tags: fixed-upstr ...
Several security issues were fixed in ImageMagick ...
Debian Bug report logs - #910887 imagemagick: CVE-2018-16412 CVE-2018-16413 Package: src:imagemagick; Maintainer for src:imagemagick is ImageMagick Packaging Team <pkg-gmagick-im-team@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 12 Oct 2018 19:18:02 UTC Severity: grave Ta ...
Several security issues were fixed in ImageMagick ...
Oracle Solaris Third Party Bulletin - October 2018 Description The Oracle Solaris Third Party Bulletin announces patches for one or more security vulnerabilities fixed in third party software that is included in Oracle Solaris distributions Starting January 20, 2015, Third Party Bulletins are released on the same day when Oracle Critic ...

Exploits

#!/bin/bash help() { echo "Usage poc generator: `basename $0` gen WIDTHxHEIGHT NAMExbm [minimal]" echo " Example gen: `basename $0` gen 512x512 pocxbm" echo "Usage result recovery: `basename $0` recover SAVED_PREVIEWpng|jpeg|gif|etc" echo " Example recovery: `basename $0` recover avatarpng" } if [ "$1" == "-h" ]; then help; exit ...

Github Repositories

XBadManners CVE Description CVE-2018-16323 is a memory leakage in processing XBM images After XBM image was converted to another image type you can extract leaked memory bytes from image data Discovered by d4d Tool A pretty simple tool for generating CVE-2018-16323 PoC Directory samples contains some pregenerated PoCs easy for use For using this tool you should install ima

Localroot Exploit This repository is a place where Localroot has been compiled and tested Linux Kernel Exploit with Compile #CVE  #Description  #Kernels CVE-2019-13272 [Linux 410 < 5117 PTRACE_TRACEME] (Ubuntu 16045, Debian 940, Parrot OS 451, ElementaryOS 041, etc) CVE-2019-12181 [Serv-U FTP Server] (FTP Server versions prior to 1517) CVE-

Awesome CVE PoC A curated list of CVE PoCs Here is a collection about Proof of Concepts of Common Vulnerabilities and Exposures, and you may also want to check out awesome-web-security Please read the contribution guidelines before contributing This repo is full of PoCs for CVEs If you enjoy this awesome list and would like to support it, check out my Patreon page :