3 results (0.002 seconds)

CVSS: 9.3EPSS: 23%CPEs: 1EXPL: 0

Multiple stack-based buffer overflows in the Online Media Technologies NCTSoft NCTAudioGrabber2 ActiveX control in NCTAudioGrabber2.dll allow remote attackers to execute arbitrary code via unspecified vectors. Múltiples desbordamientos de búfer basados en pila en el control Online Media Technologies NCTSoft NCTAudioGrabber2 ActiveX en NCTAudioGrabber2.dll permite a atacantes remotos ejecutar código de su elección a través de vectores no especificados. • http://secunia.com/advisories/30414 http://secunia.com/advisories/30451 http://secunia.com/advisories/30452 http://secunia.com/advisories/30453 http://secunia.com/advisories/30454 http://secunia.com/advisories/30458 http://www.kb.cert.org/vuls/id/656593 http://www.vupen.com/english/advisories/2008/1669 https://exchange.xforce.ibmcloud.com/vulnerabilities/42678 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 8%CPEs: 2EXPL: 2

The NCTAudioEditor2 ActiveX control in NCTWMAFile2.dll 2.6.2.157, as distributed in NCTAudioEditor and NCTAudioStudio 2.7, allows remote attackers to overwrite arbitrary files via the CreateFile method. El control ActiveX NCTAudioEditor2 en la biblioteca NCTWMAFile2.dll versión 2.6.2.157, distribuido en NCTAudioEditor y NCTAudioStudio versión 2.7, permite a atacantes remotos sobrescribir archivos arbitrarios por medio del método CreateFile. • https://www.exploit-db.com/exploits/4101 http://osvdb.org/37674 http://secunia.com/advisories/25825 http://www.securityfocus.com/bid/24613 http://www.vupen.com/english/advisories/2007/2351 https://exchange.xforce.ibmcloud.com/vulnerabilities/35018 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 95%CPEs: 83EXPL: 3

Stack-based buffer overflow in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll), as used by multiple products, allows remote attackers to execute arbitrary code via a long argument to the SetFormatLikeSample function. NOTE: the products include (1) NCTsoft NCTAudioStudio, NCTAudioEditor, and NCTDialogicVoice; (2) Magic Audio Recorder, Music Editor, and Audio Converter; (3) Aurora Media Workshop; DB Audio Mixer And Editor; (4) J. Hepple Products including Fx Audio Editor and others; (5) EXPStudio Audio Editor; (6) iMesh; (7) Quikscribe; (8) RMBSoft AudioConvert and SoundEdit Pro 2.1; (9) CDBurnerXP; (10) Code-it Software Wave MP3 Editor and aBasic Editor; (11) Movavi VideoMessage, DVD to iPod, and others; (12) SoftDiv Software Dexster, iVideoMAX, and others; (13) Sienzo Digital Music Mentor (DMM); (14) MP3 Normalizer; (15) Roemer Software FREE and Easy Hi-Q Recorder, and Easy Hi-Q Converter; (16) Audio Edit Magic; (17) Joshua Video and Audio Converter; (18) Virtual CD; (19) Cheetah CD and DVD Burner; (20) Mystik Media AudioEdit Deluxe, Blaze Media, and others; (21) Power Audio Editor; (22) DanDans Digital Media Full Audio Converter, Music Editing Master, and others; (23) Xrlly Software Text to Speech Makerand Arial Sound Recorder / Audio Converter; (24) Absolute Sound Recorder, Video to Audio Converter, and MP3 Splitter; (25) Easy Ringtone Maker; (26) RecordNRip; (27) McFunSoft iPod Audio Studio, Audio Recorder for Free, and others; (28) MP3 WAV Converter; (29) BearShare 6.0.2.26789; and (30) Oracle Siebel SimBuilder and CRM 7.x. Un desbordamiento de búfer en la región stack de la memoria en el control ActiveX NCTAudioFile2.AudioFile (NCTAudioFile2.dll), tal y como es usado en varios productos, permite a atacantes remotos ejecutar código arbitrario por medio de un argumento largo a la función SetFormatLikeSample. NOTA: los productos incluyen (1) NCTsoft NCTAudioStudio, NCTAudioEditor and NCTDialogicVoice; (2) Magic Audio Recorder, Music Editor and Audio Converter; (3) Aurora Media Workshop; DB Audio Mixer And Editor; (4) J. • https://www.exploit-db.com/exploits/3728 https://www.exploit-db.com/exploits/3808 https://www.exploit-db.com/exploits/16603 http://secunia.com/advisories/22922 http://secunia.com/advisories/23475 http://secunia.com/advisories/23485 http://secunia.com/advisories/23493 http://secunia.com/advisories/23495 http://secunia.com/advisories/23511 http://secunia.com/advisories/23516 http://secunia.com/advisories/23530 http://secunia.com/advisories/23532 http://secunia.com/ad • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •