Security
Headlines
HeadlinesLatestCVEs

Headline

PixieFail Proof Of Concepts

This archive contains proof of concepts to trigger the 7 vulnerabilities in Tianocore’s EDK II open source implementation of the UEFI specification. Issues include an integer underflow, buffer overflows, infinite loops, and an out of bounds read.

Packet Storm
#vulnerability#buffer_overflow

© 2022 Packet Storm. All rights reserved.

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution