Release date:Updated on:
Affected Systems:Netmechanic ICA netdemo-tftp Server 4.5.1Unaffected system:Netmechanic ICA netdemo-tftp Server 4.6.1Description:--------------------------------------------------------------------------------Bugtraq id: 52194
Netdemo-http Server provides standard HTTP services on a Windows workstation or Server.
Netdemo-has two vulnerabilities that can be exploited by malicious users to leak sensitive information and control the affected systems.
1) the HTTP server
WebGate WinRDS 2.0.8 StopSiteAllChannel Stack Overflow Vulnerability
Release date:Updated on:
Affected Systems:Webgate WinRDS 2.0.8Description:CVE (CAN) ID: CVE-2015-2094
WebGate WinRDS can transmit DVR video streams over the network.
In WebGate WinRDS, The WESPPlayback. WESPPlaybackCtrl.1 control has the stack buffer overflo
In the beginning of the ACM Road, many times will encounter a large data range, and to use the array to store, you may encounter the following problems:#include compile and run when the error occurs immediately!!!! But then did not delve into, next to the seniors just put the array mentioned in front of the main function, and then tell me that in the future to define a large array when you remember to define it as a global variable;Just like that:#inc
Recursive call and stack depth.
Error cause: Java. Lang. stackoverflowerror stack memory overflow
Stack Overflow occurs in recursive calls, but loop traversal does not. However, recursive calls are generated in the cyclic method
Release date:Updated on:
Affected Systems:FreeBSD 8.1FreeBSD 8.0FreeBSD 7.1FreeBSD 7.0Description:--------------------------------------------------------------------------------FreeBSD is a UNIX operating system and an important branch of Unix developed from BSD, javasbsd, and 4.4BSD.
FreeBSD has a security vulnerability in implementation. Malicious users can exploit this vulnerability to cause denial of service and control of affected systems.
This vulnerability is caused by an
Release date:Updated on:
Affected Systems:IrfanView Formats Plug-in 4.36Description:--------------------------------------------------------------------------------Bugtraq id: 64385CVE (CAN) ID: CVE-2013-3944
IrfanView is a fast and free Image Viewer, browser, and converter. The FORMATS plugin allows IrfanView to read unusual image FORMATS.
In the Formats PlugIn 4.36 "IMAGE:" tag, the MrSID plug-in (MrSID. dll) has a boundary error. After successfu
Last night after the transfer of a DISUCZ forum, found open page back to more than one PHP has encountered a stack overflow this hint error, translated into "PHP encountered stack overflow." I feel strange, the new station no one to visit, how can
Release date: 2012-03-26Updated on:
Affected Systems:Flexera FlexNet License Server Manager 11.9.1Unaffected system:Flexera FlexNet License Server Manager 11.10Description:--------------------------------------------------------------------------------Bugtraq id: 52718
Flexera is a strategic solution provider for application usage management. FlexNet Publisher provides techniques for customizing pricing, software packages, and software license terms, and prevents unauthorized use. Lmgrd is the L
Released on: 2010-08-31Updated on: 2010-09-01
Affected Systems:Novell Netware 6.5Description:--------------------------------------------------------------------------------Bugtraq id: 42875
Novell Netware is a commercial network operating system.
The SSHD. NLM module of NetWare and Its SFTP-SVR.NLM submodule have Stack Overflow Vulnerability. In an SFTP or SCP session, if the file path specified by the aut
WebGate Control Center 4.8.7 GetThumbnail Stack Overflow Vulnerability
Release date:Updated on:
Affected Systems:Webgate WebGate Control Center 4.8.7Webgate WebGate Control CenterDescription:CVE (CAN) ID: CVE-2015-2099
WebGate Control Center is the central monitoring program of the network video monitoring terminal.
WESPPlayback. WESPPlaybackCtrl.1 security vulnerability exists. The GetThumbnail method copi
Today when debugging the program, found a strange problem, before debugging all no problem, this morning added a bit of something, error, jump to debug position, below 4 lines red section1 ; Find next lower page and probe2cs20:3 Sub eax, _pagesize_ ; decrease by PAGESIZE4 test dword ptr [Eax],eax ; Probe page. 5 jmp short cs1067_chkstk ENDP89 EndFeel good strange, and then debugging breakpoints, e
OSIsoft pi opc da Interface Remote Stack Buffer Overflow Vulnerability
Release date:Updated on:
Affected Systems:Osisoft pi opc da Interface Description:--------------------------------------------------------------------------------Bugtraq id: 54609Cve id: CVE-2012-3008
Pi opc da Interface can be used to transmit data in the OPC server and PI system.
Versions earlier than OSIsoft pi opc da Interface 2.
SMPlayer sub_read_line_sami function Stack Buffer Overflow Vulnerability
Release date:Updated on:
Affected Systems:SMPlayer 0.6.9Description:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-2011-3625Smplayer is a Media Player Based on the Qt library and uses Mplayer as the backend.Subreader in MPlayer used in SMPlayer 0.6.9. the sub_read_line_sami function in
FreeType 'src/cff/cf2hints. c' incomplete repair Remote Stack Buffer Overflow Vulnerability
Release date:Updated on:
Affected Systems:FreeType FreeTypeDescription:Bugtraq id: 71614
FreeType is a popular font function library.
The remote stack buffer overflow vulnerability exists in the implementation of 'src/cff/cf
Release date:Updated on:
Affected Systems:Apple QuickTime Player 7.xUnaffected system:Apple QuickTime Player 7.7Description:--------------------------------------------------------------------------------Bugtraq id: 49144CVE (CAN) ID: CVE-2011-0257
QuickTime is a multimedia architecture developed by Apple Computer. It can process many digital videos, media paragraphs, sound effects, text, animations, music formats, and interactive panoramic images.
The st
in TEB, TEB is located in Fs:[0]. The following is one of the SEH chains (the _exception_registration_record structure is simplified in the diagram):Figure Windows SEH ChainNot all of the seh mechanisms, but enough to understand the basic principles. Now, let's look at the SEH mechanism with an example.Well, the translation ends here, but what I write later is basically the content of the original text, but I changed my own example, so that it is easy to actually operate, basically the equivale
Release date:Updated on: 2010-09-15
Affected Systems:Samba 3.0.x-3.5.xUnaffected system:Samba 3.5.5Description:--------------------------------------------------------------------------------Bugtraq id: 43212Cve id: CVE-2010-3069
Samba is a set of programs that implement the SMB (Server Messages Block) protocol, cross-platform file sharing and print sharing services.
When reading the binary representation of Windows SID (Security ID) in the sid_parse () function of Samba and related dom_sid_pars
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.