ASUS TM-AC1900 Stack Buffer Overflow Vulnerability (CVE-2015-6949)ASUS TM-AC1900 Stack Buffer Overflow Vulnerability (CVE-2015-6949)
Release date:Updated on:Affected Systems:
Asus TM-AC1900.
Description:
CVE (CAN) ID: CVE-2015-6949The ASUS TM-AC1900 is a wireless router.The ASUS TM-AC1900 has a security vulnerabi
GNU less 'is _ utf8_well_formed () 'function Remote Buffer Overflow VulnerabilityGNU less 'is _ utf8_well_formed () 'function Remote Buffer Overflow Vulnerability
Release date:Updated on:Affected Systems:
GNU less
Description:
Bugtraq id: 74159CVE (CAN) ID: CVE-2014-9488GNU less is a terminal pager program on Un
GNU glibc 'swscanf' Remote Heap Buffer Overflow Vulnerability
Release date:Updated on:
Affected Systems:GNU glibcDescription:Bugtraq id: 72428
Glibc is the implementation of C libraries in most Linux operating systems.
GNU glibc has a heap buffer overflow vulnerability in the implementation of swscanf. Attackers ca
GNU glibc gethostbyname Buffer Overflow Vulnerability
The gethostbyname function of the GNU glibc standard library has a buffer overflow vulnerability. Vulnerability No.: CVE-2015-0235. For details, see here.
Glibc is a C library that provides system calls and basic functions, such as open, malloc, and printf. All pr
PCRE 'pcre _ exec. c' Heap Buffer Overflow Vulnerability
Release date:Updated on:
Affected Systems:PCRE 8.36Description:Bugtraq id: 71206
The PCRE (Perl Compatible with regular expressions) library is an open-source software that supports regular expressions.
A heap buffer overflow vulnerability exists in PCRE 8.36
Mutt 'mutt _ substrdup () 'Function Heap Buffer Overflow Vulnerability
Release date:Updated on:
Affected Systems:Mutt Description:Bugtraq id: 71334CVE (CAN) ID: CVE-2014-9116
Mutt is a Mail reader that supports IMAP, MIME, GPG, and PGP.
The mutt_substrdup () function of versions earlier than Mutt 1.5.23 does not perform correct boundary checks. a heap buffer
series* Bytes, with 7 bits in each byte. The most significant bit indicates* Whether or not this is the last byte. Winamp can decode any value* Without problems, but when it tries to re-encode them for the MIDI* Data, it uses the naive approach of shifting multiples of 7 bits. On* X86 a shift of more than 31 bits does NOT result in a cleared* Register, so after shifting 0, 7, 14, 21, and 28 bits, it will shift* 35 bits, resulting in a shift of only 3 bits. If the most significant* Bit is set, W
Release date:Updated on: 2012-09-05
Affected Systems:Adobe Photoshop CS5.1Adobe Photoshop CS5Description:--------------------------------------------------------------------------------Bugtraq id: 55372Cve id: CVE-2012-0275
Photoshop is one of the graphic processing series software developed by Adobe. It is mainly used in image processing and advertisement design.
Adobe Photoshop CS5, CS5.1, and CS6 have a buffer
OSIsoft pi opc da Interface Remote Stack Buffer Overflow Vulnerability
Release date:Updated on:
Affected Systems:Osisoft pi opc da Interface Description:--------------------------------------------------------------------------------Bugtraq id: 54609Cve id: CVE-2012-3008
Pi opc da Interface can be used to transmit data in the OPC server and PI system.
Versions earlier than OSIsoft pi opc da Interface 2.
QEMU 'savevm 'Data Buffer Overflow Vulnerability
Release date:Updated on:
Affected Systems:QEMUDescription:Bugtraq id: 69682CVE (CAN) ID: CVE-2013-4532
QEMU is an open source simulator software.
QEMU has multiple buffer overflow vulnerabilities during site migration. Attackers can exploit these vulnerabilities to e
Large Packet Buffer Overflow Vulnerability after QEMU systolic pressure and LPE flag are disabled
Release date:Updated on:
Affected Systems:QEMUDescription:--------------------------------------------------------------------------------Bugtraq id: 57420CVE (CAN) ID: CVE-2012-6075QEMU is an open source simulator software.This vulnerability is caused by the e1000_receive function in (! LPE and! The
Linux Kernel 'write _ tag_3_packet () 'Function Local Heap Buffer Overflow Vulnerability
Release date:Updated on:
Affected Systems:Linux kernel 2.6.18Description:--------------------------------------------------------------------------------Bugtraq id: 63493
Linux Kernel is the Kernel of the Linux operating system.
The write_tag_3_packet () in Linux kernel 2.6.18 eCryptfs does not check the memory repl
Google Chrome Heap Buffer Overflow Vulnerability (CVE-2014-3157)
Release date:Updated on:
Affected Systems:Google Chrome Description:--------------------------------------------------------------------------------Bugtraq id: 67972CVE (CAN) ID: CVE-2014-3157Google Chrome is a Web browser tool developed by Google.In versions earlier than Chrome 35.0.1916.153, The FFmpegVideoDecoder: GetVideoBuffer function in
SMPlayer sub_read_line_sami function Stack Buffer Overflow Vulnerability
Release date:Updated on:
Affected Systems:SMPlayer 0.6.9Description:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-2011-3625Smplayer is a Media Player Based on the Qt library and uses Mplayer as the backend.Subreader in MPlayer used in SMPlayer 0.6.9. the sub_read_line_sami function in
Remote Heap Buffer Overflow Vulnerability on multiple 'esap 'platforms of Huawei Products
Release date:Updated on:
Affected Systems:Huawei Ethernet SwitchesDescription:--------------------------------------------------------------------------------Bugtraq id: 68130Huawei Technology Co., Ltd. is a private technology company headquartered in Shenzhen City, Guangdong Province, China, where employees are resp
MIT kerberos 5 'ldap _ principal2.c' Buffer Overflow Vulnerability
Release date:Updated on:
Affected Systems:MIT Kerberos 5 1.6-1.12.1Description:--------------------------------------------------------------------------------Bugtraq id: 69168CVE (CAN) ID: CVE-2014-4345Kerberos is a widely used super-powerful encryption to verify the network protocol between the client and the server.The implementation of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.