exploit-db-mirror/exploits/windows/remote/33980.txt
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

9 lines
No EOL
572 B
Text

source: http://www.securityfocus.com/bid/40145/info
GEM Engine is prone to multiple vulnerabilities including multiple denial-of-service issues and a buffer-overflow issue.
An attacker can exploit these issues to cause applications using the engine to crash, resulting in a denial-of-service condition, or to execute arbitrary code in the context of the vulnerable application. Other attacks may also be possible.
GEM Engine 2 and GEM Engine 3 are vulnerable.
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33980.zip