Lucene search

K

Winimage Security Vulnerabilities

cve
cve

CVE-2010-5253

Untrusted search path vulnerability in WinImage 8.50 allows local users to gain privileges via a Trojan horse wnaspi32.dll file in the current working directory, as demonstrated by a directory that contains a .imz file. NOTE: some of these details are obtained from third party...

7.2AI Score

0.0004EPSS

2012-09-07 10:32 AM
19
cve
cve

CVE-2007-4962

Directory traversal vulnerability in WinImage 8.10 and earlier allows user-assisted remote attackers to create or overwrite arbitrary files via a .. (dot dot) in a filename within a (1) .IMG or (2) .ISO file. NOTE: this can be leveraged for code execution by writing to a Startup...

8.2AI Score

0.11EPSS

2007-09-18 10:17 PM
16
cve
cve

CVE-2007-4963

Visual truncation vulnerability in WinImage 8.10 and earlier allows remote attackers to spoof a destination filename via a long sequence of space characters in a filename within a (1) .IMG or (2) .ISO file. NOTE: this can be leveraged with a separate directory traversal vulnerability to trick a...

7.5AI Score

0.008EPSS

2007-09-18 10:17 PM
20
cve
cve

CVE-2007-4964

WinImage 8.10 and earlier allows remote attackers to cause a denial of service (infinite loop) via an invalid BPB_BytsPerSec field in the header of a .IMG...

7.4AI Score

0.045EPSS

2007-09-18 10:17 PM
21
cve
cve

CVE-2007-2758

Multiple buffer overflows in WinImage 8.0.8000 allow user-assisted remote attackers to execute arbitrary code via a FAT image that contains long directory names in a deeply nested directory structure, which triggers (1) a stack-based buffer overflow during extraction, or (2) a heap-based buffer...

8.8AI Score

0.106EPSS

2007-05-18 10:30 PM
25