The Windows Media Player ActiveX control is prone to a security weakness that may allow a malicious Web page to enumerate files that exist on the client computer. This could aid in further attacks.
GNU UnRTF is prone to a buffer overflow vulnerability. This issue is exposed when the program converts RTF font table data. Since RTF documents may originate from an external or untrusted source, this vulnerability is considered to be remote in nature. Successful exploitation will result in execution of arbitrary code.
The csv2xml application is susceptible to a buffer overflow vulnerability. This occurs due to a failure of the application to properly bounds check user-supplied data before copying it into a fixed-size memory buffer. Remote attackers can exploit this vulnerability to alter the flow of execution and potentially execute their own malicious code within the context of the application.
abctab2ps is prone to a remote buffer overflow vulnerability. The vulnerability exists in the 'write_heading()' function, where the application fails to properly check the boundaries before copying user-supplied data into sensitive process buffers. An attacker can exploit this by crafting a malicious ABC file containing excessive string data, replacement memory addresses, and executable instructions. If a user processes this file through the application, the attacker's instructions may be executed, leading to unauthorized access to the vulnerable computer.
Mesh Viewer is susceptible to a buffer overflow vulnerability. This vulnerability allows remote attackers to alter the flow of execution of the application, potentially resulting in the execution of attacker-supplied machine code.
abc2ps and jcabc2ps are vulnerable to a buffer overflow vulnerability when processing the voice field in ABC music notation files. This allows an attacker to execute arbitrary code in the context of the user running the application.
Injecting scripts into the parameter config.wireless%5B0%5D.ssid_profiles%5B0%5D.ssid reveals that this parameter is not properly validated for malicious input. You need to be authenticated or you have to find other methods for inserting the malicious JavaScript code.
abcm2ps is prone to a remote buffer overflow vulnerability due to a lack of proper boundary checks. An attacker can exploit this issue by crafting a malicious ABC file containing excessive string data, replacement memory addresses, and executable instructions. If a user processes this file through the application, the attacker's instructions may be executed, potentially compromising the application.
abcpp is prone to a buffer overflow vulnerability. This issue is exposed when the program is used to handle directives in ABC music notation files. Since the ABC files may originate from an external or untrusted source, this issue is considered remote in nature. Successful exploitation will result in execution of arbitrary code in the context of the user running the application.
VB2C is prone to a remote buffer overflow vulnerability. This vulnerability occurs due to the application's failure to properly check boundaries before copying user-supplied data into sensitive process buffers. An attacker can exploit this issue by crafting a malicious FRM file containing excessive string data, replacement memory addresses, and executable instructions. If a user processes the file through the application, the attacker's instructions may be executed, potentially compromising the vulnerable computer.