![]() ![]() An attacker can send a specific ISO file to trigger this vulnerability.ĭirectory traversal vulnerability in PowerISO 2.9 allows remote attackers to write arbitrary files via a. On Windows PC, it is very convenient to manipulate dmg files with PowerISO. Most of Mac operating systems and applications are distributed in dmg files. ![]() A specially crafted ISO file can cause a vulnerability resulting in potential code execution. Dmg file is the disc image file which is widely used by Mac systems. ISO file to trigger this vulnerability.Ī stack buffer overflow vulnerability exists in the ISO parsing functionality of Power Software Ltd PowerISO 6.8. ISO file can cause a vulnerability resulting in potential code execution. ISO parsing functionality of PowerISO 6.8. The vendor fixed it in a bug-release of the current version.Ī use-after-free vulnerability exists in the. An attacker can provide a malicious file to trigger this vulnerability. A specially crafted DMG file can lead to an out-of-bounds write. A memory corruption vulnerability exists in the DMG File Format Handler functionality of PowerISO 7.9.
0 Comments
Leave a Reply. |