Download
| Alert*
oval:org.secpod.oval:def:6323
Pro-face WinGP PC Runtime is installed. oval:org.secpod.oval:def:6327 The host is installed with Pro-face WinGP PC Runtime 3.01.100 or earlier and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet with a certain opcode and a large value in a size field. Successful exploitation could allow remote a ... oval:org.secpod.oval:def:6326 The host is installed with Pro-face WinGP PC Runtime 3.01.100 or earlier and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet with a certain opcode that triggers an invalid attempt to allocate a large amount of memory. Successf ... oval:org.secpod.oval:def:6325 The host is installed with Pro-face WinGP PC Runtime 3.01.100 or earlier and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted packet with a certain opcode that triggers an incorrect memory allocation and a buffer overflow. Successful e ... oval:org.secpod.oval:def:6324 The host is installed with Pro-face WinGP PC Runtime 3.01.100 or earlier and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet that triggers a certain Find Node check attempt. Successful exploitation could allow remote attackers ... oval:org.secpod.oval:def:6329 The host is installed with Pro-face WinGP PC Runtime 3.01.100 or earlier and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly check packet sizes before reusing packet memory buffers. Successful exploitation could allow remote attackers to cau ... oval:org.secpod.oval:def:6328 The host is installed with Pro-face WinGP PC Runtime 3.01.100 or earlier and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted packet with a certain opcode. Successful exploitation could allow remote attackers to obtain sensitive ... |