Vulnerabilities (CVE)

Filtered by CWE-119
Total 11642 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2006-1469 1 Apple 2 Mac Os X, Mac Os X Server 2024-11-21 7.5 HIGH N/A
Stack-based buffer overflow in ImageIO in Apple Mac OS X 10.4 up to 10.4.6 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image.
CVE-2006-1463 1 Apple 1 Quicktime 2024-11-21 5.1 MEDIUM N/A
Heap-based buffer overflow in Apple QuickTime before 7.1 allows remote attackers to execute arbitrary code via a H.264 (M4V) video format file with a certain modified size value.
CVE-2006-1461 1 Apple 1 Quicktime 2024-11-21 5.1 MEDIUM N/A
Multiple buffer overflows in Apple QuickTime before 7.1 allow remote attackers to execute arbitrary code via a crafted QuickTime Flash (SWF) file.
CVE-2006-1460 1 Apple 1 Quicktime 2024-11-21 5.1 MEDIUM N/A
Multiple buffer overflows in Apple QuickTime before 7.1 allow remote attackers to execute arbitrary code via a crafted QuickTime movie (.MOV), as demonstrated via a large size for a udta Atom.
CVE-2006-1454 1 Apple 1 Quicktime 2024-11-21 5.1 MEDIUM N/A
Heap-based buffer overflow in Apple QuickTime before 7.1 allows remote attackers to execute arbitrary code via a crafted QuickDraw PICT image format file with malformed image data.
CVE-2006-1453 1 Apple 1 Quicktime 2024-11-21 5.1 MEDIUM N/A
Stack-based buffer overflow in Apple QuickTime before 7.1 allows remote attackers to execute arbitrary code via a crafted QuickDraw PICT image format file containing malformed font information.
CVE-2006-1368 1 Linux 1 Linux Kernel 2024-11-21 10.0 HIGH N/A
Buffer overflow in the USB Gadget RNDIS implementation in the Linux kernel before 2.6.16 allows remote attackers to cause a denial of service (kmalloc'd memory corruption) via a remote NDIS response to OID_GEN_SUPPORTED_LIST, which causes memory to be allocated for the reply data but not the reply structure.
CVE-2006-1337 1 Mailenable 1 Mailenable 2024-11-21 7.5 HIGH N/A
Buffer overflow in the POP 3 (POP3) service in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 allows remote attackers to execute arbitrary code via unknown vectors before authentication.
CVE-2006-1302 1 Microsoft 2 Excel, Excel Viewer 2024-11-21 9.3 HIGH N/A
Buffer overflow in Microsoft Excel 2000 through 2003 allows user-assisted attackers to execute arbitrary code via a .xls file with certain crafted fields in a SELECTION record, which triggers memory corruption, aka "Malformed SELECTION record Vulnerability."
CVE-2006-1189 1 Microsoft 1 Internet Explorer 2024-11-21 10.0 HIGH N/A
Buffer overflow in URLMON.DLL in Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via a crafted URL with an International Domain Name (IDN) using double-byte character sets (DBCS), aka the "Double Byte Character Parsing Memory Corruption Vulnerability."
CVE-2006-1148 1 Peercast 1 Peercast 2024-11-21 7.5 HIGH N/A
Multiple stack-based buffer overflows in the procConnectArgs function in servmgr.cpp in PeerCast before 0.1217 allow remote attackers to execute arbitrary code via an HTTP GET request with a long (1) parameter name or (2) value in a URL, which triggers the overflow in the nextCGIarg function in servhs.cpp.
CVE-2006-1060 1 Xzgv 1 Xzgv 2024-11-21 7.5 HIGH N/A
Heap-based buffer overflow in zgv before 5.8 and xzgv before 0.8 might allow user-assisted attackers to execute arbitrary code via a JPEG image with more than 3 output components, such as a CMYK or YCCK color space, which causes less memory to be allocated than required.
CVE-2006-1043 1 Microsoft 2 Visual Interdev, Visual Studio 2024-11-21 5.1 MEDIUM N/A
Stack-based buffer overflow in Microsoft Visual Studio 6.0 and Microsoft Visual InterDev 6.0 allows user-assisted attackers to execute arbitrary code via a long DataProject field in a (1) Visual Studio Database Project File (.dbp) or (2) Visual Studio Solution (.sln).
CVE-2006-0966 1 Ncp Network Communications 1 Secure Client 2024-11-21 2.1 LOW N/A
NCP Network Communication Secure Client 8.11 Build 146, and possibly other versions, allows local users to cause a denial of service (CPU consumption) via a large number of arguments to ncprwsnt.exe, possibly due to a buffer overflow.
CVE-2006-0855 1 Rahul Dhesi 1 Zoo 2024-11-21 5.1 MEDIUM N/A
Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.
CVE-2006-0813 1 Winace 1 Winace 2024-11-21 5.1 MEDIUM N/A
Heap-based buffer overflow in WinACE 2.60 allows user-assisted attackers to execute arbitrary code via a large header block in an ARJ archive.
CVE-2006-0807 1 Njstar 2 Chinese Word Processor, Japanese Word Processor 2024-11-21 5.1 MEDIUM N/A
Stack-based buffer overflow in NJStar Chinese and Japanese Word Processor 4.x and 5.x before 5.10 allows user-assisted attackers to execute arbitrary code via font names in NJStar (.njx) documents.
CVE-2006-0734 1 Valve Software 1 Half-life Cstrike Dedicated Server 2024-11-21 4.0 MEDIUM N/A
The SV_CheckForDuplicateNames function in Valve Software Half-Life CSTRIKE Dedicated Server 1.6 and earlier allows remote authenticated users to cause a denial of service (infinite loop and daemon hang) via a backslash character at the end of a connection string to UDP port 27015.
CVE-2006-0730 1 Timo Sirainen 1 Dovecot 2024-11-21 5.0 MEDIUM N/A
Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
CVE-2006-0710 1 Isode 1 M-vault Server 2024-11-21 7.5 HIGH N/A
Double free vulnerability in isode.eddy in Isode M-Vault Server 11.3 allows remote attackers to execute arbitrary code via a crafted LDAP request, as demonstrated by ProtoVer Sample LDAP.