Safety vulnerability ID: 70905
The information on this page was manually curated by our Cybersecurity Intelligence Team.
A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688.
Latest version: 1.0.8
Automatic and platform-independent unpacker for Windows binaries based on emulation
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application