4 results (0.001 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow vulnerability in OllyDbg, version 1.10, which could allow a local attacker to execute arbitrary code due to lack of proper bounds checking. Vulnerabilidad de desbordamiento de búfer en OllyDbg, versión 1.10, que podría permitir a un atacante local ejecutar código arbitrario debido a la falta de verificación de los límites adecuada. • https://www.incibe.es/en/incibe-cert/notices/aviso/buffer-overflow-ollydbg • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 1

Stack-based buffer overflow in (1) OllyDBG 1.10 and (2) ImpREC 1.7f allows user-assisted attackers to execute arbitrary code via a crafted DLL file that contains a long string. Desbordamiento de búfer basado en pila en (1) OllyDBG 1.10 y (2) ImpREC 1.7f permite a atacantes asistidos por usuario ejecutar código de su elección a través de un fichero DLL manipulado que contiene una cadena larga. • https://www.exploit-db.com/exploits/6031 http://www.securityfocus.com/bid/30139 https://exchange.xforce.ibmcloud.com/vulnerabilities/43673 https://exchange.xforce.ibmcloud.com/vulnerabilities/43675 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 4EXPL: 2

OllyDbg 1.10 and earlier allows remote attackers to cause a denial of service (application crash) via a dynamic link library (DLL) with a long filename. • http://marc.info/?l=bugtraq&m=111125734701262&w=2 http://securitytracker.com/id?1013478 http://www.securityfocus.com/bid/12850 https://exchange.xforce.ibmcloud.com/vulnerabilities/19750 •

CVSS: 7.5EPSS: 11%CPEs: 4EXPL: 2

Format string vulnerability in OllyDbg 1.10 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers that are directly provided to the OutputDebugString function call. Vulnerabilidad de cadena de formato en OllyDbg 1.10 permite a atacantes remotos causar una denegación de servicio (caída) y posiblemente ejecutar código arbitrairo mediante esfecificadores de cadena que son provistos directamente a la llamada de la función OutputDebugString • https://www.exploit-db.com/exploits/388 https://www.exploit-db.com/exploits/3757 http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0711.html http://marc.info/?l=bugtraq&m=109007978822810&w=2 http://www.securityfocus.com/bid/10742 https://exchange.xforce.ibmcloud.com/vulnerabilities/16711 •