In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade zapping-vbi/zvbi
to version 0.2.44 or higher.
Affected versions of this package are vulnerable to Integer Overflow or Wraparound involving the src_length
argument to the strndup_utf8_ucs2()
function in conv.c
. An attacker can trigger a buffer overflow condition by sending crafted input that exceeds the expected length.