Page 6 of 31 results (0.009 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Norman SandBox Analyzer does not use the proper range for Interrupt Descriptor Table (IDT) entries, which allows local users to determine that the local machine is an emulator, or a similar environment not based on a physical Intel processor, which allows attackers to produce malware that is more difficult to analyze. Norman SandBox Analyzer no utiliza el rango adecuado para las entradas de Interrupt Descriptor Table (IDT), lo cual permite a un usuario local determinar que la máquina local es un emulador, o un entorno similar no basado en procesador fisico Intel, lo cual permiet a atacantes producir malware que es más dificil de analizar. • http://osvdb.org/34955 http://www.ntsecurity.nu/onmymind/2007/2007-02-27.html http://www.securityfocus.com/archive/1/461555/100/0/threaded http://www.securityfocus.com/archive/1/461804/100/100/threaded http://www.securityfocus.com/archive/1/461805/100/100/threaded • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

PHP remote file inclusion vulnerability in config.php in David Kent Norman Thatware 0.4.6 and possibly earlier allows remote attackers to execute arbitrary PHP code via a URL in the root_path parameter. Vulnerabilidad de inclusión remota de archivo en PHP en config.php en David Kent Norman Thatware 0.4.6 y posiblemente anetriores permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro root_path. • https://www.exploit-db.com/exploits/2166 http://www.vupen.com/english/advisories/2006/3257 https://exchange.xforce.ibmcloud.com/vulnerabilities/28313 •

CVSS: 1.2EPSS: 0%CPEs: 2EXPL: 0

noweb 2.10c and earlier allows local users to overwrite arbitrary files via symlink attacks on temporary files in (1) lib/toascii.nw and (2) shell/roff.mm. • http://secunia.com/advisories/18809 http://secunia.com/advisories/18812 http://secunia.com/advisories/18967 http://secunia.com/advisories/19027 http://www.debian.org/security/2006/dsa-968 http://www.gentoo.org/security/en/glsa/glsa-200602-14.xml http://www.securityfocus.com/bid/16610 http://www.ubuntu.com/usn/usn-254-1 http://www.vupen.com/english/advisories/2006/0547 •

CVSS: 5.1EPSS: 0%CPEs: 1EXPL: 0

Multiple interpretation error in Norman 5.81 with the 5.83.02 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug." • http://marc.info/?l=bugtraq&m=113026417802703&w=2 http://www.securityelf.org/magicbyte.html http://www.securityelf.org/magicbyteadv.html http://www.securityelf.org/updmagic.html http://www.securityfocus.com/bid/15189 •

CVSS: 5.1EPSS: 0%CPEs: 1EXPL: 0

Multiple interpretation error in unspecified versions of Norman Virus Control Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper. • http://marc.info/?l=bugtraq&m=112879611919750&w=2 http://shadock.net/secubox/AVCraftedArchive.html •