[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

100123

 
 

909

 
 

80198

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 6930 Download | Alert*

Buffer overflow in Windows Shell (used as the Windows Desktop) allows local and possibly remote attackers to execute arbitrary code via a custom URL handler that has not been removed for an application that has been improperly uninstalled.

The host is installed with Microsoft FrontPage 2003 and is prone to a xml disclosure vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to disclose the contents of a file on a target system.

The host is installed with Microsoft Office 2013 and is prone to a token hijacking vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted response while attempting to open an Office file hosted on the malicious website. Successful exploitation could allow attackers to ascertain access tokens used to authenticate the current user on a targeted ShareP ...

The host is installed with Adobe Presenter 6 or 7 before 7.0.1 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to handle vectors involving viewer.swf and loadflash.js. Successful exploitation allows attackers to inject arbitrary web script or HTML.

The host is installed with Adobe Presenter 6 or 7 before 7.0.1 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to handle vectors involving viewer.swf and loadflash.js. Successful exploitation allows attackers to inject arbitrary web script or HTML.

The host is installed with Microsoft Word 2003 SP3 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle objects in memory while parsing specially crafted Office files. Successful exploitation allows attackers to execute arbitrary code via a crafted document.

The host is installed with Google Chrome Frame plugin before 26.0.1410.28 and is prone to denial of service vulnerability. The flaw is present in the Hook_Terminate function in chrome_frame/protocol_sink_wrap.cc, which does not properly handle attach tab requests. Successful exploitation allows remote attackers to cause a denial of service via an _blank value for the target attribute of an A eleme ...

The host is installed with McAfee Virtual Technician and ePO-MVT and is prone to privelege escalation vulnerability. A flaw is present in the application, which fails to handle arguments to the save method. Successful exploitation allows attackers to execute arbitrary code.

Internet Explorer 5.5 and earlier allows remote attackers to obtain the physical location of cached content and open the content in the Local Computer Zone, then use compiled HTML help (.chm) files to execute arbitrary programs.

The MIDL_user_allocate function in the Microsoft Distributed Transaction Coordinator (MSDTC) proxy (MSDTCPRX.DLL) allocates a 4K page of memory regardless of the required size, which allows attackers to overwrite arbitrary memory locations using an incorrect size value that is provided to the NdrAllocate function, which writes management data to memory outside of the allocated buffer.


Pages:      Start    681    682    683    684    685    686    687    688    689    690    691    692    ..   692

© 2013 SecPod Technologies