[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14850 Download | Alert*

Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2004 for Mac, and v.X for Mac allows remote attackers to execute arbitrary code via malformed IMDATA records that trigger memory corruption.

Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2004 for Mac, and v.X for Mac allows user-assisted remote attackers to execute arbitrary code via an Excel file with an out-of-range Column field in certain BIFF8 record types, which references arbitrary memory.

Heap-based buffer overflow in Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2004 for Mac, and v.X for Mac allows user-assisted remote attackers to execute arbitrary code via a BIFF8 spreadsheet with a PALETTE record that contains a large number of entries.

The host is installed with Symantec AntiVirus 10.0.x before 10.1 MR9 or Symantec Client Security 3.0.x before 3.1 MR9 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to handle "specific events" that prevent the user from having read access to unspecified resources. Successful exploitation could allow attackers to crash the service.

The host is installed with 7-Technologies (7T) Interactive Graphical SCADA System (IGSS) before 9.0.0.11291 and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle a Trojan horse DLL. Successful exploitation allows local users to gain privileges.

The host is installed with ImgBurn through 2.5.4.0 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle an issue in ImgBurn.exe. Successful exploitation could allow remote attackers to to execute arbitrary code and conduct DLL hijacking attacks.

A denial of service vulnerability exists when ASP.NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against an ASP.NET Core web application. The vulnerability can be exploited remotely, without authentication.

The host is installed with Microsoft Windows 8 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle a crafted TrueType Font file. Sucessful exploitation could allow attackers to crash the service.

The host is installed with Internet Explorer 10 installed on Windows 8 and is prone to security bypass vulnerability. A flaw is present in the application, which fail to handle a crafted request. Successful exploitation could allow attackers to bypass the sandbox protection mechanism by leveraging access to a medium integrity process.

The host is installed with Sleipnir 4.0.0.4000 or earlier and is prone to spoofing vulnerability. A flaw is present in the application, which has an issue in displaying colors and the padlock icon on the address bar. Successful exploitation allows attackers to spoof the address bar.


Pages:      Start    1434    1435    1436    1437    1438    1439    1440    1441    1442    1443    1444    1445    1446    1447    ..   1484

© SecPod Technologies