Page 20 of 159 results (0.010 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

XnView Classic for Windows Version 2.40 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpAllocateHeap+0x000000000000042f." XnView Classic para Windows versión 2.40, podría permitir a los atacantes causar una denegación de servicio o posiblemente tener otro impacto no especificado por medio de un archivo .rle creado, relacionado a "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpAllocateHeap+0x000000000000042f". • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-10762 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

XnView Classic for Windows Version 2.40 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Possible Stack Corruption starting at Xfpx!gffGetFormatInfo+0x0000000000022e1f." XnView Classic para Windows en su versión 2.40 permite a atacantes remotos causar una denegación de servicio o posiblemente tener otro impacto no especificado mediante una archivo .fpx manipulado, relacionado a "Possible Stack Corruption comenzando en Xfpx!gffGetFormatInfo+0x0000000000022e1f." • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9907 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

XnView Classic for Windows Version 2.40 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!TpAllocCleanupGroup+0x00000000000003d7." XnView Classic para Windows en su versión 2.40 permite a un atacante remoto provocar una denegación de servicio o la posibilidad de otro impacto no especificado mediante un archivo .fpx manipulado, relacionado a "Data from Faulting Address controls Selection comenzado en ntdll_77df0000!TpAllocCleanupGroup+0x00000000000003d7." • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9913 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

XnView Classic for Windows Version 2.40 allows user-assisted remote attackers to execute code via a crafted JPEG 2000 file that is mishandled during the opening of a directory in "Browser" mode, because of a "Stack Buffer Overrun" issue. XnView Classic para Windows versión 2.40, permite a atacantes remotos asistidos por el usuario ejecutar código por medio de un archivo JPEG 2000 especialmente diseñado que se maneja inapropiadamente durante la apertura de un directorio en el modo "Browser", debido a un problema de "Stack Buffer Overrun". • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-8781 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

XnView Classic for Windows Version 2.40 allows remote attackers to execute code via a crafted .fpx file, related to a "User Mode Write AV starting at Xfpx+0x0000000000004efd." XnView Classic para Windows versión 2.40, permite a atacantes remotos ejecutar código por medio de un archivo .fpx especialmente diseñado, relacionado a un "User Mode Write AV starting at Xfpx+0x0000000000004efd." • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9529 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •