[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with Pro-face WinGP PC Runtime 3.01.100 or earlier and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet with a certain opcode that triggers an invalid attempt to allocate a large amount of memory. Successful exploitation could allow remote attackers to cause a denial of service or unhandled exception or ...

The host is installed with Pro-face WinGP PC Runtime 3.01.100 or earlier and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet with a certain opcode and a large value in a size field. Successful exploitation could allow remote attackers to cause a denial of service or daemon crash.

The host is installed with Pro-face WinGP PC Runtime 3.01.100 or earlier and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly check packet sizes before reusing packet memory buffers. Successful exploitation could allow remote attackers to cause a denial of service or heap memory corruption or possibly have unspecified other impact.

The host is installed with WellinTech KingView 6.53 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet to TCP or UDP port 2001. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with WellinTech KingView 6.53 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted packet to TCP port 555. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with WellinTech KingView 6.53 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted packet to TCP port 555. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with XnView before 1.99 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted ImageLeftPosition value in an ImageDescriptor structure in a GIF image. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with XnView before 1.99 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted PCT image. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with XnView before 1.99 and is prone to multiple heap-based buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a SGI32LogLum compressed TIFF image or SGI32LogLum compressed TIFF image with the PhotometricInterpretation encoding set to LogL. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with Winlog Lite SCADA or Winlog Pro SCADA before 2.07.17 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle an incorrect file-open attempt by the _TCPIPS_BinOpenFileFP function. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1398    1399    1400    1401    1402    1403    1404    1405    1406    1407    1408    1409    1410    1411    ..   1429

© SecPod Technologies