Best Way GEM Engine - Multiple Vulnerabilities
Author: Luigi Auriemma
type: remote
platform: windows
port:
date_added: 2009-10-12
date_updated: 2014-07-07
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/40145/info
GEM Engine is prone to multiple vulnerabilities including multiple denial-of-service issues and a buffer-overflow issue.
An attacker can exploit these issues to cause applications using the engine to crash, resulting in a denial-of-service condition, or to execute arbitrary code in the context of the vulnerable application. Other attacks may also be possible.
GEM Engine 2 and GEM Engine 3 are vulnerable.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33980.zip