Vulnerabilities > Use of Externally-Controlled Format String

DATE CVE VULNERABILITY TITLE RISK
2008-03-03 CVE-2008-1127 USE of Externally-Controlled Format String vulnerability in Crytek Crysis 1.1.1.5879
Format string vulnerability in the cryactio function in Crysis 1.1.1.5879 allows remote authenticated users to execute arbitrary code via format string specifiers in the user name, which is triggered when the game character is killed.
network
crytek CWE-134
6.0
2008-03-03 CVE-2008-1120 USE of Externally-Controlled Format String vulnerability in ICQ Mirabilis ICQ 6
Format string vulnerability in the embedded Internet Explorer component for Mirabilis ICQ 6 build 6043 allows remote servers to execute arbitrary code or cause a denial of service (crash) via unspecified vectors related to HTML code generation.
network
icq CWE-134
critical
9.3
2008-02-27 CVE-2008-1055 USE of Externally-Controlled Format String vulnerability in Netwin Surgemail and Webmail
Format string vulnerability in webmail.exe in NetWin SurgeMail 38k4 and earlier and beta 39a, and WebMail 3.1s and earlier, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in the page parameter.
network
low complexity
netwin CWE-134
7.5
2008-02-25 CVE-2008-0945 USE of Externally-Controlled Format String vulnerability in Ipswitch Imserver and Instant Messaging
Format string vulnerability in the logging function in the IM Server (aka IMserve or IMserver) in Ipswitch Instant Messaging (IM) 2.0.8.1 and earlier allows remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in an IP address field.
network
ipswitch CWE-134
3.5
2008-02-13 CVE-2008-0764 USE of Externally-Controlled Format String vulnerability in Larson Software Technology Network Print Server
Format string vulnerability in the logging function in Larson Network Print Server (LstNPS) 9.4.2 build 105 and earlier for Windows might allow remote attackers to execute arbitrary code via format string specifiers in a USEP command on TCP port 3114.
network
low complexity
larson-software-technology CWE-134
critical
10.0
2008-02-13 CVE-2008-0755 USE of Externally-Controlled Format String vulnerability in Cyan Soft products
Format string vulnerability in the ReportSysLogEvent function in the LPD server in cyan soft Opium OPI Server 4.10.1028 and earlier; cyanPrintIP Easy OPI, Professional, and Basic 4.10.1030 and earlier; Workstation 4.10.836 and earlier; and Standard 4.10.940 and earlier; might allow remote attackers to execute arbitrary code via format string specifiers in the queue name in a request.
network
low complexity
cyan-soft CWE-134
7.5
2008-01-04 CVE-2007-6625 USE of Externally-Controlled Format String vulnerability in Novell Identity Manager 3.5.1
The Platform Service Process (asampsp) in Fan-Out Driver Platform Services for Novell Identity Manager (IDM) 3.5.1 allows remote attackers to cause a denial of service (daemon crash) via unspecified network traffic that triggers a syslog message containing invalid format string specifiers, as demonstrated by a Nessus scan.
network
low complexity
novell CWE-134
5.0
2007-12-19 CVE-2007-4708 USE of Externally-Controlled Format String vulnerability in Apple mac OS X 10.4.11
Format string vulnerability in Address Book in Apple Mac OS X 10.4.11 allows remote attackers to execute arbitrary code via the URL handler.
network
apple CWE-134
critical
9.3
2007-12-07 CVE-2007-6273 USE of Externally-Controlled Format String vulnerability in Sonicwall Global VPN Client 3.1.556/4.0.0.810
Multiple format string vulnerabilities in the configuration file in SonicWALL GLobal VPN Client 3.1.556 and 4.0.0.810 allow user-assisted remote attackers to execute arbitrary code via format string specifiers in the (1) Hostname tag or the (2) name attribute in the Connection tag.
network
sonicwall CWE-134
critical
9.3
2007-11-30 CVE-2007-6183 USE of Externally-Controlled Format String vulnerability in Ruby Gnome2 Ruby Gnome2 0.16.0
Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attackers to execute arbitrary code via format string specifiers in the message parameter.
6.8