mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 10:41:43 +00:00
28 lines
1.2 KiB
Markdown
28 lines
1.2 KiB
Markdown
![]() |
### [CVE-2018-16323](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16323)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
ReadXBMImage in coders/xbm.c in ImageMagick before 7.0.8-9 leaves data uninitialized when processing an XBM file that has a negative pixel value. If the affected code is used as a library loaded into a process that includes sensitive information, that information sometimes can be leaked via the image data.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://www.exploit-db.com/exploits/45890/
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xT11/CVE-POC
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/Flerov/WindowsExploitDev
|
||
|
- https://github.com/anoaghost/Localroot_Compile
|
||
|
- https://github.com/barrracud4/image-upload-exploits
|
||
|
- https://github.com/cranelab/exploit-development
|
||
|
- https://github.com/lnick2023/nicenice
|
||
|
- https://github.com/paulveillard/cybersecurity-exploit-development
|
||
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||
|
- https://github.com/ttffdd/XBadManners
|
||
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
||
|
|