Page 6 of 42 results (0.002 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

IrfanView 4.50 - 64bit with CADImage plugin version 12.0.0.5 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to "Possible Stack Corruption starting at CADIMAGE+0x00000000003d2378." IrfanView 4.50 - 64bit, con la versión del plugin CADImage 12.0.0.5, permite que los atacantes provoquen una denegación de servicio o, posiblemente, otro impacto sin especificar mediante un archivo .dwg manipulado. Esta vulnerabilidad está relacionada con "Possible Stack Corruption starting at CADIMAGE+0x00000000003d2378". • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-15741 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to "Data from Faulting Address controls subsequent Write Address starting at BabaCAD4Image!ShowPlugInOptions+0x000000000004d7c4." IrfanView 4.50 - (64bit), con la versión del plugin BabaCAD4Image 1.3, permite que los atacantes ejecuten código arbitrario o que provoquen una denegación de servicio mediante un archivo .dwg manipulado. Esta vulnerabilidad está relacionada con "Data from Faulting Address controls subsequent Write Address starting at BabaCAD4Image!ShowPlugInOptions+0x000000000004d7c4". • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-15756 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to "Data from Faulting Address controls Branch Selection starting at BabaCAD4Image!ShowPlugInOptions+0x00000000000029c2." IrfanView 4.50 - 64bit, con la versión del plugin BabaCAD4Image 1.3, permite que los atacantes provoquen una denegación de servicio o, posiblemente, otro impacto sin especificar mediante un archivo .dwg manipulado. Esta vulnerabilidad está relacionada con "Data from Faulting Address controls Branch Selection starting at BabaCAD4Image!ShowPlugInOptions+0x00000000000029c2". • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-15753 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to a "User Mode Write AV near NULL starting at BabaCAD4Image!ShowPlugInOptions+0x000000000001b3f3." IrfanView 4.50 - (64bit), con la versión del plugin BabaCAD4Image 1.3, permite que los atacantes ejecuten código arbitrario o que provoquen una denegación de servicio mediante un archivo .dwg manipulado. Esta vulnerabilidad está relacionada con "User Mode Write AV near NULL starting at BabaCAD4Image!ShowPlugInOptions+0x000000000001b3f3". • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-15759 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

IrfanView version 4.50 - 64bit allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .tif file, related to "Data from Faulting Address controls Branch Selection starting at image000007f7_42060000+0x0000000000094113." IrfanView 4.50 - 64bit permite que los atacantes provoquen una denegación de servicio o, posiblemente, otro impacto sin especificar mediante un archivo .tif manipulado. Esta vulnerabilidad está relacionada con "Data from Faulting Address controls Branch Selection comenzando en image000007f7_42060000+0x0000000000094113". • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-15768 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •