2 results (0.004 seconds)

CVSS: 7.5EPSS: 15%CPEs: 12EXPL: 0

Heap-based buffer overflow in Borland idsql32.dll 5.1.0.4, as used by RevilloC MailServer; 5.2.0.2 as used by Borland Developer Studio 2006; and possibly other versions allows remote attackers to execute arbitrary code via a long SQL statement, related to use of the DbiQExec function. Desbordamiento del buffer basado en pilas en el Borland idsql32.dll 5.1.0.4, como el usado en el RevilloC MailServer, la 5.2.0.2 como el usado en el Developer Studio 2006 y posiblemente otras versiones, permite a atacantes remotos ejecutar código de su elección a través de la declaración de una sentencia larga en SQL relacionada con el uso de la función DbiQExec. • http://secunia.com/advisories/22570 http://secunia.com/secunia_research/2006-70/advisory http://www.securityfocus.com/archive/1/453003/100/0/threaded http://www.securityfocus.com/bid/21342 http://www.vupen.com/english/advisories/2006/4763 https://exchange.xforce.ibmcloud.com/vulnerabilities/30583 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Borland C++Builder 6 (BCB6) with Update Pack 4 Enterprise edition (ent_upd4) evaluates the "i>sizeof(int)" expression to false when i equals -1, which might introduce integer overflow vulnerabilities into applications that could be exploited by context-dependent attackers. • http://securitytracker.com/id?1015588 http://www.osvdb.org/22953 http://www.securityfocus.com/archive/1/424085/100/0/threaded http://www.xfocus.net/releases/200602/a849.html https://exchange.xforce.ibmcloud.com/vulnerabilities/24514 •