Search and Replace is reported prone to a remote buffer overflow vulnerability. This issue may allow a remote attacker to execute arbitrary code on a vulnerable computer to gain unauthorized access. This vulnerability arises when the application handles malformed ZIP files. A successful attack may facilitate unauthorized access to the affected computer. Search and Replace 5.0 and prior versions are reported vulnerable to this issue.
Search and Replace is reported prone to a remote buffer overflow vulnerability. This issue may allow a remote attacker to execute arbitrary code on a vulnerable computer to gain unauthorized access. This vulnerability arises when the application handles malformed ZIP files. A successful attack may facilitate unauthorized access to the affected computer. Search and Replace 5.0 and prior versions are reported vulnerable to this issue.