Page 7 of 42 results (0.010 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to a "Read Access Violation starting at BabaCAD4Image!ShowPlugInOptions+0x000000000001e6b0." IrfanView 4.50 - 64bit, con la versión del plugin BabaCAD4Image 1.3, permite que los atacantes provoquen una denegación de servicio o, posiblemente, otro impacto sin especificar mediante un archivo .dwg manipulado. Esta vulnerabilidad está relacionada con "Read Access Violation starting at BabaCAD4Image!ShowPlugInOptions+0x000000000001e6b0". • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-15764 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

IrfanView 4.50 - 64bit allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dds file, related to "Read Access Violation starting at FORMATS!ReadBLP_W+0x0000000000001b22." IrfanView 4.50 - 64bit permite que los atacantes provoquen una denegación de servicio o, posiblemente, otro impacto sin especificar mediante un archivo .dds manipulado. Esta vulnerabilidad está relacionada con "Read Access Violation starting at FORMATS!ReadBLP_W+0x0000000000001b22". • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-15769 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to "Data from Faulting Address controls Branch Selection starting at verifier!AVrfpDphFindBusyMemoryNoCheck+0x0000000000000091." IrfanView 4.50 - 64bit, con la versión del plugin BabaCAD4Image 1.3, permite que los atacantes provoquen una denegación de servicio o, posiblemente, otro impacto sin especificar mediante un archivo .dwg manipulado. Esta vulnerabilidad está relacionada con "Data from Faulting Address controls Branch Selection starting at verifier!AVrfpDphFindBusyMemoryNoCheck+0x0000000000000091". • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-15755 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

IrfanView version 4.44 (32bit) with TOOLS Plugin 4.50 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted file, related to "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at ntdll_77df0000!RtlFreeHandle+0x0000000000000218." IrfanView en su versión 4.44 (32bits) con el plugin TOOLS en su versión 4.50 puede que permita a un atacante causar una denegación de servicio o ejecutar código arbitrario mediantes un archivo modificado, relacionado a "Data from Faulting Address controls Branch Selection que comienza en ntdll_77df0000!RtlFreeHandle+0x0000000000000218." • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9917 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

IrfanView version 4.44 (32bit) with TOOLS Plugin 4.50 might allow attackers to cause a denial of service or execute arbitrary code via a crafted file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!LdrpResSearchResourceInsideDirectory+0x000000000000029e." IrfanView en su versión 4.44 (32bits) con el plugin TOOLS en su versión 4.50 puede que permita a un atacante causar una denegación de servicio o ejecutar código arbitrario mediantes un archivo modificado, relacionado a "Data from Faulting Address controls Branch Selection que comienza en ntdll_77df0000!LdrpResSearchResourceInsideDirectory+0x000000000000029e." • https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9920 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •