Buffer Overflow 검색 결과, 8
Microsoft Windows animated cursors buffer overflow
I. Description A stack buffer overflow exists in the code that Microsoft Windows uses to processes animated cursor files. Specifically, Microsoft Windows fails to properly validate the size of an animated cursor file header supplied in animated cursor files. Animated cursor files can be included with HTML files. For instance, a web site can use an animated cursor file to specify the icon that th..Buffer Overflow in InterVetions' NaviCopa HTTP server 2.01
Buffer Overflow in InterVetions' NaviCopa HTTP server 2.01 While developing one of our advanced security training modules, we identified a remotely exploitable buffer overflow vulnerability in the latest release of InterVetions' HTTP server NaviCopa 2.01. Successful exploitation of this vulnerability allows an attacker to execute arbitrary code in the context of the NaviCopa HTTP server. .... Th..IBM Lotus Domino Multiple Remote Buffer Overflow and Cross Site Scripting Vulnerabilities
Multiple vulnerabilities have been identified in IBM Lotus Domino, which could be exploited by attackers to execute arbitrary commands or scripting code. The first issue is due to an input validation error in the Active Content Filter feature when processing certain email messages, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the..uTorrent "announce" URL Handling Buffer Overflow and Code Execution Vulnerability
A vulnerability has been identified in uTorrent, which could be exploited by attackers to take complete control of an affected system. This issue is due to a buffer overflow error when handling a "torrent" file containing an overly long "announce" URL, which could be exploited by remote attackers to execute arbitrary commands by tricking a user into opening a specially crafted torrent file or vi..Trend Micro Antivirus Products UPX File Parsing Kernel Buffer Overflow Vulnerability
A vulnerability has been identified in various Trend Micro products, which could be exploited by attackers or malware to take complete control of an affected system. This issue is due to a buffer overflow error when processing malformed UPX compressed files, which could be exploited by attackers to execute arbitrary commands e.g. by sending an email containing a malicious file to a system being ..CA BrightStor ARCserve Backup for Laptops and Desktops Buffer Overflow Vulnerabilities
which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system. These issues are due to buffer overflow errors in various services when processing specially crafted requests, which could be exploited by remote unauthenticated attackers to crash a vulnerable application or execute arbitrary commands with SYSTEM privileges. Affected Product..