[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253219

 
 

909

 
 

197188

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26369 Download | Alert*

Multiple unspecified vulnerabilities in Microsoft Visio 2002 allow remote user-assisted attackers to execute arbitrary code via a Visio (.VSD, VSS, .VST) file with a crafted packed object that triggers memory corruption, aka "Visio Document Packaging Vulnerability."

Unspecified vulnerability in Microsoft Visio 2002 allows remote user-assisted attackers to execute arbitrary code via a Visio (.VSD, VSS, .VST) file with a crafted version number that triggers memory corruption.

Stack-based buffer overflow in Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, and 2003 Viewer allows user-assisted remote attackers to execute arbitrary code via a .XLS BIFF file with a malformed Named Graph record, which results in memory corruption.

Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2004 for Mac, and v.X for Mac allows user-assisted remote attackers to execute arbitrary code via a malformed string, aka "Excel Malformed String Vulnerability."

Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2004 for Mac, and v.X for Mac allows remote attackers to execute arbitrary code via malformed IMDATA records that trigger memory corruption.

Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2004 for Mac, and v.X for Mac allows user-assisted remote attackers to execute arbitrary code via an Excel file with an out-of-range Column field in certain BIFF8 record types, which references arbitrary memory.

Heap-based buffer overflow in Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2004 for Mac, and v.X for Mac allows user-assisted remote attackers to execute arbitrary code via a BIFF8 spreadsheet with a PALETTE record that contains a large number of entries.

The host is installed with Adobe flash player 6 and is prone to remote code execution vulnerability. A flaw is present in application, which fails to handle specially crafted Flash content or web page. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with Symantec AntiVirus 10.0.x before 10.1 MR9 or Symantec Client Security 3.0.x before 3.1 MR9 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to handle "specific events" that prevent the user from having read access to unspecified resources. Successful exploitation could allow attackers to crash the service.

The host is installed with 7-Technologies (7T) Interactive Graphical SCADA System (IGSS) before 9.0.0.11291 and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle a Trojan horse DLL. Successful exploitation allows local users to gain privileges.


Pages:      Start    2577    2578    2579    2580    2581    2582    2583    2584    2585    2586    2587    2588    2589    2590    ..   2636

© SecPod Technologies