The host is installed with Adobe Audition and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to sanitize the user input resulting in a memory corruption. Successful exploitation allows attacker to execute arbitrary code or cause denial of service.
The host is installed with Novell GroupWise Messenger 2.04 and earlier or Novell Messenger 2.1 or earlier or 2.2.x before 2.2.2 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle an import command containing a long string in the filename parameter. Successful exploitation allows attackers to execute arbitrary code.
The host is installed with Groovy Media Player 3.2.0 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long string in a .m3u file. Successful exploitation allows remote attackers to execute arbitrary code.
The host is installed with Novell iPrint Client before 5.90 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle specially crafted data. Successful exploitation allows attackers to execute arbitrary code.
The host is installed with EMC AlphaStor 4.0 build 116 before build 910 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle certain crafted commands. Successful exploitation allows attackers to execute arbitrary code.
The host is installed with Microsoft Publisher 2003 and is prone to integer overflow vulnerability. A flaw is present in the application, which attempts to determine the size for an allocation. Successful exploitation allows attackers to execute arbitrary code.
The host is installed with Microsoft Publisher 2003 and is prone to return value handling vulnerability. A flaw is present in the application, which ignores a returned method value while parsing specially crafted Publisher files. Successful exploitation allows attackers to execute arbitrary code.
The host is installed with Microsoft Publisher 2003 and is prone to buffer overflow vulnerability. A flaw is present in the application, which reads incorrect number of bytes into an array while parsing specially crafted Publisher files. Successful exploitation allows attackers to execute arbitrary code.
The host is installed with Microsoft Publisher 2003 and is prone to invalid range check vulnerability. A flaw is present in the application, which fails to properly validate table range data while parsing specially crafted Publisher files. Successful exploitation allows attackers to execute arbitrary code.
The host is installed with Novell iPrint Client an dis prone to stack-based buffer overflow vulnerbility. A flaw is present in nipplib.dll where the process blindly copies user supplied data into a fixed-length buffer on the stack. Successful exploitation allows remote attacker to execute arbitrary code under the context of the browser.