[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26631 Download | Alert*

Buffer overflow in Microsoft Excel 2000 through 2003 allows user-assisted attackers to execute arbitrary code via a .xls file with certain crafted fields in a SELECTION record, which triggers memory corruption, aka "Malformed SELECTION record Vulnerability."

Stack-based buffer overflow in UltraPlayer Media Player 2.112 allows remote attackers to execute arbitrary code via a long string in a .usk file.

Stack-based buffer overflow in Microsoft Excel 2000, 2002, and 2003, in Microsoft Office 2000 SP3 and other packages, allows user-assisted attackers to execute arbitrary code via an Excel file with a malformed record with a modified length value, which leads to memory corruption.

The host is installed with Schneider Electric Interactive Graphical SCADA System (IGSS) 10 or earlier and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle data that does not comply with a protocol. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Audition and is prone to multiple buffer overflow vulnerabilities. Flaws are present in the application, which fails to parse several fields inside the TRKM chunk on malicious session (.ses) files. Successful exploitation allows attacker to execute arbitrary code.

The host is installed with Adobe Audition and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to sanitize the user input resulting in a memory corruption. Successful exploitation allows attacker to execute arbitrary code or cause denial of service.

The host is installed with Novell GroupWise Messenger 2.04 and earlier or Novell Messenger 2.1 or earlier or 2.2.x before 2.2.2 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle an import command containing a long string in the filename parameter. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Groovy Media Player 3.2.0 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long string in a .m3u file. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Novell iPrint Client before 5.90 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle specially crafted data. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with EMC AlphaStor 4.0 build 116 before build 910 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle certain crafted commands. Successful exploitation allows attackers to execute arbitrary code.


Pages:      Start    2633    2634    2635    2636    2637    2638    2639    2640    2641    2642    2643    2644    2645    2646    ..   2663

© SecPod Technologies