[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:704885
lua5.3 is installed

oval:org.secpod.oval:def:605136
lua5.3 is installed

oval:org.secpod.oval:def:1801418
lua5.3 is installed

oval:org.secpod.oval:def:54406
lua5.3: Simple, extensible, embeddable programming language Lua could be made to crash if it received a specially crafted script.

oval:org.secpod.oval:def:2003706
Lua through 5.4.0 has a segmentation fault in changedline in ldebug.c because it incorrectly expects that an oldpc value is always updated upon a return of the flow of control to a function.

oval:org.secpod.oval:def:1801422
Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships.

oval:org.secpod.oval:def:1801423
Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships.

oval:org.secpod.oval:def:1801424
Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships.

oval:org.secpod.oval:def:1801417
Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships.

oval:org.secpod.oval:def:704880
lua5.3: Simple, extensible, embeddable programming language Lua could be made to crash if it received a specially crafted script.

oval:org.secpod.oval:def:2004492
Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships.

*CPE
cpe:/a:lua:lua5.3

© SecPod Technologies