2 results (0.001 seconds)

CVSS: 7.5EPSS: 5%CPEs: 6EXPL: 0

libpng 1.2.5 and earlier does not properly calculate certain buffer offsets, which could allow remote attackers to execute arbitrary code via a buffer overflow attack. libpng 1.2.5 y anteriores no calculan adecuadamente ciertos desplazamientos de búfer, lo que podría permitir a atacantes remotos ejecutar código arbitrario mediante un ataque de desbordamiento de búfer. • http://secunia.com/advisories/33137 http://security.gentoo.org/glsa/glsa-200812-15.xml http://www.debian.org/security/2004/dsa-536 https://bugzilla.fedora.us/show_bug.cgi?id=1943 https://exchange.xforce.ibmcloud.com/vulnerabilities/16914 •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 0

Buffer overflow in libpng 1.0.12-3.woody.2 and libpng3 1.2.1-1.1.woody.2 on Debian GNU/Linux 3.0, and other operating systems, may allow attackers to cause a denial of service and possibly execute arbitrary code, a different vulnerability than CVE-2002-0728. • http://rhn.redhat.com/errata/RHSA-2002-151.html http://rhn.redhat.com/errata/RHSA-2002-152.html https://www.debian.org/security/2002/dsa-140 https://access.redhat.com/security/cve/CVE-2002-0660 https://bugzilla.redhat.com/show_bug.cgi?id=1616793 •