유틸리티·해킹보안 검색 결과, 466
Hitachi Products MDAC "RDS.Dataspace" ActiveX Remote Code Execution Vulnerability
Technical Description A vulnerability has been identified in various Hitachi products, which could be exploited by attackers to compromise a vulnerable system. For additional information, see : FrSIRT/ADV-2006-1319 Affected Products Hitachi DBPARTNER ODBC Driver version 01-06 through 01-11 Hitachi DBPARTNER ODBC 3.0 Driver version 01-00 through 01-03 Hitachi DABroker for ODBC version 01-00 throu..Nullsoft Winamp Midi File Header Handling Client-Side Buffer Overflow Vulnerability
Technical Description A vulnerability has been identified in Nullsoft Winamp, which could be exploited by remote attackers to take complete control of an affected system. This flaw is due to a buffer overflow error in the "in_midi.dll" library that does not properly handle malformed Midi file headers, which could be exploited by remote attackers to crash a vulnerable application or execute arbit..제로보드 파일 업로드 취약점 4.1 pl18 해당
Basically, the PHP, HTML, and CGI files are prohibited to upload in Zeroboard. But uploading of the other files which can modify the configuration of Apache such as .htaccess is not considered as a serious issue. Therefore, an unknown attacker can execute any malicious codes on the system and acquire system control also. * The FileType in the .htaccess can be modified by configuring the Override..Microsoft Internet Explorer ART File Heap Corruption
Vulnerable Systems: * Windows XP * Windows XP SP1 * Windows XP SP2 * Windows 2003 * Windows 2003 SP1 * Windows 2000 SP4 when jgdw400.dll installed Internet Explorer supports Johnson-Grace compressed images, or .art files. Johnson-Grace developed this technology in 1991. In 1994, American Online Inc. began using the technology and, in 1996, purchased the company to secure rights to it. It is now ..