[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14865 Download | Alert*

The host is installed with Firebird 2.5.0 or 2.5.1 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an empty dynamic SQL query. Successful exploitation could allow remote authenticated users to cause a denial of service.

The host is installed with GoodTech SSH Server 6.4 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in the SFTP subsystem. Successful exploitation could allow remote authenticated users to execute arbitrary code.

The host is installed with Qbik WinGate through 6.2.2.1137 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a issue in the IMAP service. Successful exploitation could allow remote attackers to cause a denial of service (resource exhaustion) or possibly execute arbitrary code via a long argument to the LIST command.

Stack-based buffer overflow in Microsoft Excel 2000, 2002, and 2003, in Microsoft Office 2000 SP3 and other packages, allows user-assisted attackers to execute arbitrary code via an Excel file with a malformed record with a modified length value, which leads to memory corruption.

Stack-based buffer overflow in Microsoft Excel 2000, 2002, and 2003, in Microsoft Office 2000 SP3 and other packages, allows user-assisted attackers to execute arbitrary code via an Excel file with a malformed record with a modified length value, which leads to memory corruption.

Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2003 Viewer, and 2004 for Mac allows user-assisted remote attackers to execute arbitrary code via a crafted AutoFilter filter record in an Excel BIFF8 format XLS file, which triggers memory corruption.

Buffer overflow in GIFIMP32.FLT, as used in Microsoft Office 2003 SP1 and SP2, Office XP SP3, Office 2000 SP3, and other products, allows user-assisted attackers to execute arbitrary code via a crafted GIF image that triggers memory corruption when it is parsed.

Buffer overflow in Microsoft Excel 2000 through 2003 allows user-assisted attackers to execute arbitrary code via a .xls file with certain crafted fields in a SELECTION record, which triggers memory corruption, aka "Malformed SELECTION record Vulnerability."

Stack-based buffer overflow in Microsoft Excel 2000, 2002, and 2003, in Microsoft Office 2000 SP3 and other packages, allows user-assisted attackers to execute arbitrary code via an Excel file with a malformed record with a modified length value, which leads to memory corruption.

The host is installed with Schneider Electric Interactive Graphical SCADA System (IGSS) 10 or earlier and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle data that does not comply with a protocol. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1466    1467    1468    1469    1470    1471    1472    1473    1474    1475    1476    1477    1478    1479    ..   1486

© SecPod Technologies