2 results (0.010 seconds)

CVSS: 10.0EPSS: 6%CPEs: 2EXPL: 0

Stack-based buffer overflow in the SetPath function in the shComboBox ActiveX control (shcmb80.ocx) in Sky Software Shell MegaPack ActiveX 8.0 allows remote attackers to execute arbitrary code via a long argument. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Desbordamiento de búfer basado en pila en la función SetPath del control ActiveX shComboBox (shcmb80.ocx) del Sky Software Shell MegaPack ActiveX 8.0 permite a atacantes remotos ejecutar código de su elección mediante un argumento largo. NOTA: la procedencia de esta información es desconocida; los detalles se obtienen a partir de la información de terceros. • http://osvdb.org/36581 http://secunia.com/advisories/25269 http://www.securityfocus.com/bid/24113 https://exchange.xforce.ibmcloud.com/vulnerabilities/34458 •

CVSS: 9.3EPSS: 63%CPEs: 7EXPL: 4

Stack-based buffer overflow in the Sky Software FileView ActiveX control, as used in WinZip 10 before build 7245 and in certain other applications, allows remote attackers to execute arbitrary code via a long FilePattern attribute in a WZFILEVIEW object, a different vulnerability than CVE-2006-5198. Desbordamiento de búfer basado en la pila en el control ActiveX Sky Software FileView, como el usado en WinZip 10 anterior a build 7245 y en otras ciertas aplicaciones, permite a atacantes remotos ejecutar código de su elección mediante un atributo FilePattern largo en un objeto WZFILEVIEW, una vulnerabilidad diferente que CVE-2006-5198. • https://www.exploit-db.com/exploits/3420 http://secunia.com/advisories/22891 http://www.kb.cert.org/vuls/id/225217 http://www.securityfocus.com/archive/1/451566/100/0/threaded http://www.securityfocus.com/bid/21060 http://www.securityfocus.com/bid/21108 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067 https://www.exploit-db.com/exploits/2785 •