[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26684 Download | Alert*

Unspecified vulnerability in PowerPoint in Microsoft Office 2000, Office 2002, Office 2003, Office 2004 for Mac, and Office v.X for Mac allows user-assisted attackers to execute arbitrary code via a crafted Data record in a PPT file, a different vulnerability than CVE-2006-3435 and CVE-2006-4694.

PowerPoint in Microsoft Office 2000, XP, 2003, 2004 for Mac, and v.X for Mac does not properly parse the slide notes field in a document, which allows remote user-assisted attackers to execute arbitrary code via crafted data in this field, which triggers an erroneous object pointer calculation that uses data from within the document. NOTE: this issue is different than other PowerPoint vulnerabilit ...

Buffer overflow in Microsoft Excel 2000 through 2003 allows user-assisted attackers to execute arbitrary code via a .xls file with a crafted COLINFO record, which triggers the overflow during a "data filling operation."

Microsoft Excel 2000 through 2004 allows user-assisted attackers to execute arbitrary code via a .xls file with a crafted SELECTION record that triggers memory corruption, a different vulnerability than CVE-2006-1302.

Microsoft Excel 2000 through 2004 allows user-assisted attackers to execute arbitrary code via a .xls file with a crafted LABEL record that triggers memory corruption.

Microsoft Excel 2000 through 2004 allows user-assisted attackers to execute arbitrary code via a .xls file with a crafted BIFF record with an attacker-controlled array index that is used for a function pointer, aka "Malformed OBJECT record Vulnerability."

The host is installed with IBM Tivoli Endpoint Manager (TEM) 8.0 before 8.2.1372 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly sanitize user-supplied input. Successful exploitation allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

The host is installed with Microsoft Infopath 2010, SharePoint Server 2010, SharePoint Foundation 2010, Office Web Apps 2010 or Groove Server 2010 and is prone to elevation of privilege vulnerability. A flaw is present in the applications, which is caused by the way that HTML strings are sanitized. Successful exploitation allows attackers to perform cross-site scripting attacks on affected systems ...

The host is installed with AWStats and is prone to remote command execution vulnerability. A flaw is present in the application, which fails to properly handle "\\" when specifying a configuration file directory. Successful exploitation could allow an attacker to specify an arbitrary configuration file located on an SMB share.

The host is installed with AWStats and is prone to remote command execution vulnerability. A flaw is present in the application, which fails to avoid accepting a configdir parameter in the URL. Successful exploitation could allow remote attackers to execute arbitrary commands.


Pages:      Start    2629    2630    2631    2632    2633    2634    2635    2636    2637    2638    2639    2640    2641    2642    ..   2668

© SecPod Technologies