Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Improper Handling of Overlap Between Protected Memory Ranges

The product allows address regions to overlap, which can result in the bypassing of intended memory protection.