Page 4 of 20 results (0.007 seconds)

CVSS: 6.8EPSS: 10%CPEs: 2EXPL: 1

Stack-based buffer overflow in XnView 1.92 and 1.92.1 allows user-assisted remote attackers to execute arbitrary code via a long FontName parameter in a slideshow (.sld) file, a different vector than CVE-2008-1461. Desbordamiento de búfer basado en pila en XnView 1.92 y 1.92.1 permite a a atacantes remotos ayudados por el usuario ejecutar código de su elección a través de un parámetro FontName largo en un fichero slideshow (.sld), un vector distinto a CVE-2008-1461. • https://www.exploit-db.com/exploits/5346 http://secunia.com/advisories/29620 http://secunia.com/secunia_research/2008-6/advisory http://www.securityfocus.com/bid/28579 http://www.vupen.com/english/advisories/2008/1044/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41542 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.6EPSS: 12%CPEs: 1EXPL: 4

Buffer overflow in XnView 1.92.1 allows user-assisted remote attackers to execute arbitrary code via a long filename argument on the command line. NOTE: it is unclear whether there are common handler configurations in which this argument is controlled by an attacker. Desbordamiento de búfer en XnView 1.92.1 permite a atacantes remotos ayudados por elme usuario ejecutar código de su elección a través de un argumento nombre de archivo largo en la línea de comandos. NOTA: no está claro si hay configuraciones del gestor común en los que este argumento sea controlado por un atacante. • https://www.exploit-db.com/exploits/31405 http://securityreason.com/securityalert/3761 http://www.click-internet.fr/index.php?cki=News&news=9 http://www.securityfocus.com/archive/1/489658/100/0/threaded http://www.securityfocus.com/bid/28259 https://exchange.xforce.ibmcloud.com/vulnerabilities/41245 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 8%CPEs: 4EXPL: 0

Stack-based buffer overflow in Pierre-emmanuel Gougelet (1) XnView 1.91 and 1.92, (2) NConvert 4.85, and (3) libgfl280.dll in GFL SDK 2.870 for Windows allows user-assisted remote attackers to execute arbitrary code via a crafted Radiance RGBE (.hdr) file. Desbordamiento de búfer basado en pila en Pierre-emmanuel Gougelet (1) XnView 1.91 y 1.92, (2) NConvert 4.85 y (3) libgfl280.dll en GFL SDK 2.870 para Windows. Permite a atacantes remotos con colaboración del usuario ejecutar código arbitrario a través de un archivo Radiance RGBE (.hdr) manipulado. • http://secunia.com/advisories/28326 http://secunia.com/advisories/28710 http://secunia.com/secunia_research/2008-1/advisory http://www.securityfocus.com/bid/27514 http://www.vupen.com/english/advisories/2008/0328 http://www.vupen.com/english/advisories/2008/0329 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 26%CPEs: 1EXPL: 1

Stack-based buffer overflow in XnView 1.90.3 allows user-assisted remote attackers to execute arbitrary code via a crafted XPM file with a long section string. NOTE: some of these details are obtained from third party information. Desbordamiento de búfer basado en pila en XnView 1.90.3 permite a atacantes con la intervención del usuario ejecutar código de su elección a través de ficheros XPM manipulados con una sección de cadena larga. NOTA: algunos de los detalles fueron obtenidos de terceras fuentes de información. • https://www.exploit-db.com/exploits/3777 http://osvdb.org/35235 http://secunia.com/advisories/24973 http://secunia.com/advisories/26006 http://security.gentoo.org/glsa/glsa-200707-06.xml http://www.securityfocus.com/bid/23625 http://www.vupen.com/english/advisories/2007/1488 https://exchange.xforce.ibmcloud.com/vulnerabilities/33810 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Untrusted search path vulnerability (RPATH) in XnView 1.70 and NView 4.51 on Gentoo Linux allows local users to execute arbitrary code via a malicious library in the current working directory. • http://bugs.gentoo.org/show_bug.cgi?id=117063 http://secunia.com/advisories/18235 http://secunia.com/advisories/18240 http://www.gentoo.org/security/en/glsa/glsa-200512-18.xml http://www.osvdb.org/22093 http://www.osvdb.org/22094 http://www.securityfocus.com/bid/16087 https://exchange.xforce.ibmcloud.com/vulnerabilities/23910 •