Page 30 of 170 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

XnView Classic for Windows Version 2.40 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Data from Faulting Address controls Branch Selection starting at Xfpx!gffGetFormatInfo+0x00000000000228e8." XnView Classic para Windows en su versión 2.40 permite a atacantes remotos causar una denegación de servicio o posiblemente tener otro impacto no especificado mediante una archivo .fpx manipulado, relacionado a "Data from Faulting Address controls Branch Selection comenzando en Xfpx!gffGetFormatInfo+0x00000000000228e8." • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9905 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

XnView Classic for Windows Version 2.40 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpEnterCriticalSectionContended+0x0000000000000031." XnView Classic para Windows versión 2.40, podría permitir a los atacantes causar una denegación de servicio o posiblemente tener otro impacto no especificado por medio de un archivo .rle creado, relacionado a "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpEnterCriticalSectionContended+0x0000000000000031." • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-10754 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

XnView Classic for Windows Version 2.40 allows remote attackers to execute code via a crafted .fpx file, related to "Data from Faulting Address controls subsequent Write Address starting at Xfpx!gffGetFormatInfo+0x000000000002bfd5." XnView Classic para Windows en su versión 2.40 permite a atacantes remotos ejecutar código mediante un archivo .fpx manipulado, relacionado a "Data from Faulting Address controls subsequent Write Address comenzado en Xfpx!gffGetFormatInfo+0x000000000002bfd5." • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9901 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

XnView Classic for Windows Version 2.40 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpLowFragHeapFree+0x000000000000001f." XnView Classic para Windows en su versión 2.40 permite a atacantes remotos causar una denegación de servicio o posiblemente tener otro impacto no especificado mediante una archivo .fpx manipulado, relacionado a "Data from Faulting Address controls Branch Selection comenzando en ntdll_77df0000!RtlpLowFragHeapFree+0x000000000000001f." • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9904 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

XnView Classic for Windows Version 2.40 allows attackers to execute arbitrary code or cause a denial of service via a crafted .rle file, related to a "User Mode Write AV starting at ntdll_77df0000!RtlRbInsertNodeEx+0x000000000000002d." XnView Classic para Windows versión 2.40, permite a los atacantes ejecutar código arbitrario o causar una denegación de servicio por medio de un archivo .rle creado, relacionado a un "User Mode Write AV starting at ntdll_77df0000!RtlRbInsertNodeEx+0x000000000000002d." • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-10740 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •