Page 4 of 23 results (0.003 seconds)

CVSS: 9.3EPSS: 17%CPEs: 1EXPL: 3

Heap-based buffer overflow in XnView 1.97.4 and possibly earlier allows remote attackers to execute arbitrary code via a MultiBitMap (MBM) file with a Paint Data Section that contains a malformed Encoding field. Desbordamiento de búfer basado en memoria dinámica (heap) en XnView v1.97.4 y posiblemente versiones anteriores, permite a atacantes remotos ejecutar código de su elección a través de un archivo MultiBitMap (MBM) con una Paint Data Section que contiene un campo Encoded mal formado. • https://www.exploit-db.com/exploits/34143 http://secunia.com/advisories/40141 http://www.coresecurity.com/content/XnView-MBM-Processing-Heap-Overflow http://www.securityfocus.com/bid/40852 http://www.securitytracker.com/id?1024100 http://www.vupen.com/english/advisories/2010/1468 https://exchange.xforce.ibmcloud.com/vulnerabilities/59421 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 6%CPEs: 98EXPL: 0

Integer overflow in XnView before 1.97.2 might allow remote attackers to execute arbitrary code via a DICOM image with crafted dimensions, leading to a heap-based buffer overflow. Desbordamiento de entero en XnView anterior a v1.97.2, podría permitir a atacantes remotos ejecutar código de su elección a través de uba imagen DICOM con unas dimensiones manipuladas, provocando un desbordamiento de búfer basado en memoria dinámica (heap). • http://newsgroup.xnview.com/viewtopic.php?f=35&t=19469 http://secunia.com/secunia_research/2009-60 http://www.osvdb.org/62829 http://www.securityfocus.com/archive/1/509999/100/0/threaded http://www.securityfocus.com/bid/38629 https://exchange.xforce.ibmcloud.com/vulnerabilities/56802 • CWE-189: Numeric Errors •

CVSS: 9.3EPSS: 16%CPEs: 7EXPL: 1

Stack-based buffer overflow in NConvert 4.92, GFL SDK 2.82, and XnView 1.93.6 on Windows and 1.70 on Linux and FreeBSD allows user-assisted remote attackers to execute arbitrary code via a crafted format keyword in a Sun TAAC file. Desbordamiento de búfer basado en Pila en NConvert 4.92, GFL SDK 2.82, y XnView 1.93.6 sobre Windows y 1.70 sobre Linux y FreeBSD, lo que permite a los atacantes remotos asistidos por usuarios para ejecutar código arbitrario a través de un formato clave manipuda en un fichero Sun TAAC. • https://www.exploit-db.com/exploits/5951 http://secunia.com/advisories/30416 http://secunia.com/advisories/30789 http://secunia.com/secunia_research/2008-24/advisory http://securityreason.com/securityalert/3956 http://securitytracker.com/id?1020340 http://www.securityfocus.com/archive/1/493505/100/0/threaded http://www.securityfocus.com/bid/29851 http://www.vupen.com/english/advisories/2008/1896 http://www.vupen.com/english/advisories/2008/1897 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 10%CPEs: 2EXPL: 1

Stack-based buffer overflow in XnView 1.92 and 1.92.1 allows user-assisted remote attackers to execute arbitrary code via a long FontName parameter in a slideshow (.sld) file, a different vector than CVE-2008-1461. Desbordamiento de búfer basado en pila en XnView 1.92 y 1.92.1 permite a a atacantes remotos ayudados por el usuario ejecutar código de su elección a través de un parámetro FontName largo en un fichero slideshow (.sld), un vector distinto a CVE-2008-1461. • https://www.exploit-db.com/exploits/5346 http://secunia.com/advisories/29620 http://secunia.com/secunia_research/2008-6/advisory http://www.securityfocus.com/bid/28579 http://www.vupen.com/english/advisories/2008/1044/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41542 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.6EPSS: 12%CPEs: 1EXPL: 4

Buffer overflow in XnView 1.92.1 allows user-assisted remote attackers to execute arbitrary code via a long filename argument on the command line. NOTE: it is unclear whether there are common handler configurations in which this argument is controlled by an attacker. Desbordamiento de búfer en XnView 1.92.1 permite a atacantes remotos ayudados por elme usuario ejecutar código de su elección a través de un argumento nombre de archivo largo en la línea de comandos. NOTA: no está claro si hay configuraciones del gestor común en los que este argumento sea controlado por un atacante. • https://www.exploit-db.com/exploits/31405 http://securityreason.com/securityalert/3761 http://www.click-internet.fr/index.php?cki=News&news=9 http://www.securityfocus.com/archive/1/489658/100/0/threaded http://www.securityfocus.com/bid/28259 https://exchange.xforce.ibmcloud.com/vulnerabilities/41245 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •