Page 6 of 159 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

XnView 2.45 allows remote attackers to cause a denial of service (User Mode Write AV starting at Qt5Core!QVariant::~QVariant+0x0000000000000014 and application crash) or possibly have unspecified other impact via a crafted RLE file. XnView 2.45 permite que atacantes remotos provoquen una denegación de servicio (AV de escritura del modo de usuario que comienza en Qt5Core!QVariant::~QVariant+0x0000000000000014 y cierre inesperado de la aplicación) o, posiblemente, otro impacto no especificado mediante un archivo RLE manipulado. • http://code610.blogspot.com/2018/08/updating-xnview.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

XnView 2.45 allows remote attackers to cause a denial of service (User Mode Write AV starting at MSVCR120!memcpy+0x0000000000000074 and application crash) or possibly have unspecified other impact via a crafted RLE file. XnView 2.45 permite que atacantes remotos provoquen una denegación de servicio (AV de escritura del modo de usuario que comienza en MSVCR120!memcpy+0x0000000000000074 y cierre inesperado de la aplicación) o, posiblemente, otro impacto no especificado mediante un archivo RLE manipulado. • http://code610.blogspot.com/2018/08/updating-xnview.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

XnView Classic for Windows Version 2.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dll file that is mishandled during an attempt to render the DLL icon, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77310000!LdrpResSearchResourceInsideDirectory+0x000000000000029e." XnView Classic para Windows en su versión 2.43 permite que los atacantes provoquen una denegación de servicio o, posiblemente, otro impacto sin especificar mediante un archivo .dll manipulado que se gestiona de manera incorrecta durante un intento de representar el icono DLL. Esta vulnerabilidad está relacionada con "Data from Faulting Address controls Branch Selection starting at ntdll_77310000!LdrpResSearchResourceInsideDirectory+0x000000000000029e". • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-15801 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

XnView Classic for Windows Version 2.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dll file that is mishandled during an attempt to render the DLL icon, related to "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at ntdll_77310000!LdrpResCompareResourceNames+0x0000000000000150." XnView Classic para Windows en su versión 2.43 permite que los atacantes provoquen una denegación de servicio o, posiblemente, otro impacto sin especificar mediante un archivo .dll manipulado que se gestiona de manera incorrecta durante un intento de representar el icono DLL. Esta vulnerabilidad está relacionada con "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at ntdll_77310000!LdrpResCompareResourceNames+0x0000000000000150". • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-15803 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

XnView Classic for Windows Version 2.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dll file that is mishandled during an attempt to render the DLL icon, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77310000!LdrpResCompareResourceNames+0x0000000000000087." XnView Classic para Windows en su versión 2.43 permite que los atacantes provoquen una denegación de servicio o, posiblemente, otro impacto sin especificar mediante un archivo .dll manipulado que se gestiona de manera incorrecta durante un intento de representar el icono DLL. Esta vulnerabilidad está relacionada con "Data from Faulting Address controls Branch Selection starting at ntdll_77310000!LdrpResCompareResourceNames+0x0000000000000087". • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-15802 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •