The host is installed with OpenAFS 1.5.7500 through 1.5.7800, 1.6.x before 1.6.1500 or 1.7.x before 1.7.3300 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to handle the acknowledgement packet. Successful exploitation allow remote attackers to obtain sensitive information.
The host is installed with OpenAFS before 1.6.1500 and 1.7.x before 1.7.3300 and is prone to an information disclosure vulnerability. The flaw is present in the application, which fails to handle the acknowledgement packet of data structure. Successful exploitation allow remote attackers to obtain sensitive information.
The host is installed with Windows Media Center on Microsoft Windows Vista, 7, 8 or 8.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a specially crafted Media Center link (.mcl) file that references malicious code. An attacker who successfully exploited this vulnerability could disclose local file system information.
The host is installed with Windows Media Center on Microsoft Windows Vista, 7, 8 or 8.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a specially crafted Media Center link (.mcl) file that references malicious code. An attacker who successfully exploited this vulnerability could take complete control of the affected system.
The host is installed with Microsoft Vista SP2, Server 2008 SP2, Windows 7 SP1 or Server 2008 R2 SP1and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly validate input before loading libraries. Successful exploitation could allow attackers to take complete control of the affected system.
The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Office Compatibility Pack SP3 or Excel Viewer and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted Microsoft Office file. Successful exploitation could allow attackers to run arbitrary code in the context of the current user.
The host is installed with Microsoft Office 2007 SP3 or Office 2010 SP2 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted Microsoft Office file. Successful exploitation could allow attackers to run arbitrary code in the context of the current user.
The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Office Compatibility Pack SP3 or Excel Viewer and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted Microsoft Office file. Successful exploitation could allow attackers to run arbitrary code in the context of the current user.
The host is installed with Microsoft Word 2007 SP3, Word 2010 SP2, Word 2013 SP1 or Office Compatibility Pack SP3 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted Microsoft Office file. Successful exploitation could allow attackers to run arbitrary code in the context of the current user.
The host is installed with Microsoft Excel 2007 SP3, Office Compatibility Pack SP3 or Excel Viewer and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted Microsoft Office file. Successful exploitation could allow attackers to run arbitrary code in the context of the current user.