Page 10 of 54 results (0.018 seconds)

CVSS: 9.3EPSS: 4%CPEs: 1EXPL: 0

Multiple buffer overflows in acgm.dll in the Corel / Micrografx ActiveCGM Browser ActiveX control before 7.1.4.19 allow remote attackers to execute arbitrary code via unspecified vectors. Múltiples desbordamientos de búfer en acgm.dll en el control ActiveX, Corel / Micrografx ActiveCGM Browser versiones anteriores a 7.1.4.19 permiten a atacantes remotos ejecutar código de su elección mediante vectores no especificados. • http://secunia.com/advisories/25672 http://www.kb.cert.org/vuls/id/983249 http://www.nessus.org/plugins/index.php?view=single&id=25494 http://www.osvdb.org/35468 http://www.securityfocus.com/bid/24464 http://www.vupen.com/english/advisories/2007/2191 https://exchange.xforce.ibmcloud.com/vulnerabilities/34863 •

CVSS: 7.4EPSS: 89%CPEs: 1EXPL: 1

Buffer overflow in Corel Paint Shop Pro 11.20 allows user-assisted remote attackers to execute arbitrary code via a crafted .PNG file. Desbordamiento de búfer en el Corel Paint Shop Pro 11.20 permite a atacantes con la intervención del usuario ejecutar código de su elección mediante una imagen .PNG modificada. • https://www.exploit-db.com/exploits/3812 http://osvdb.org/35467 http://secunia.com/advisories/25034 http://www.securityfocus.com/bid/23698 http://www.vupen.com/english/advisories/2007/1576 https://exchange.xforce.ibmcloud.com/vulnerabilities/33956 •

CVSS: 6.8EPSS: 19%CPEs: 2EXPL: 1

Buffer overflow in igcore15d.dll 15.1.2.0 and 15.2.0.0 for AccuSoft ImageGear, as used in Corel Paint Shop Pro Photo 11.20 and possibly other products, allows user-assisted remote attackers to execute arbitrary code via a crafted .CLP file. NOTE: some details were obtained from third party sources. Un desbordamiento de búfer en igcore15d.dll versiones 15.1.2.0 y 15.2.0.0 para AccuSoft ImageGear, como es usado en Corel Paint Shop Pro Photo versión 11.20 y posiblemente otros productos, permite a atacantes remotos asistidos por el usuario ejecutar código arbitrario por medio de un archivo .CLP diseñado. NOTA: algunos detalles fueron obtenidos a partir de fuentes de terceros. • https://www.exploit-db.com/exploits/3779 http://osvdb.org/35308 http://osvdb.org/35386 http://secunia.com/advisories/25016 http://secunia.com/advisories/25050 http://www.securityfocus.com/bid/23604 http://www.securitytracker.com/id?1017963 http://www.vupen.com/english/advisories/2007/1506 https://exchange.xforce.ibmcloud.com/vulnerabilities/33821 •

CVSS: 9.3EPSS: 15%CPEs: 1EXPL: 3

Stack-based buffer overflow in Corel WordPerfect Office X3 (13.0.0.565) allows user-assisted remote attackers to execute arbitrary code via a long printer selection (PRS) name in a Wordperfect document. Desbordamiento de búfer basado en pila en Corel WordPerfect Office X3 (13.0.0.565) permite a atacantes remotos con intervención del usuario ejecutar código de su elección mediante un nombre de selección de impresora (PRS) largo en un documento Wordperfect. • https://www.exploit-db.com/exploits/3593 http://secunia.com/advisories/24664 http://securityreason.com/securityalert/2489 http://www.nop-art.net/advisories/wpwinX3.txt http://www.securityfocus.com/archive/1/464046/100/0/threaded http://www.securityfocus.com/bid/23177 http://www.vupen.com/english/advisories/2007/1145 https://exchange.xforce.ibmcloud.com/vulnerabilities/33286 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

The default configuration of Dosemu in Corel Linux 1.0 allows local users to execute the system.com program and gain privileges. • https://www.exploit-db.com/exploits/19787 http://www.securityfocus.com/bid/1030 http://www.securityfocus.com/templates/archive.pike?list=1&msg=200003020436.PAA20168%40jawa.chilli.net.au •