[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 7346 Download | Alert*

Buffer overflow in a component of Microsoft Data Access Components (MDAC) 2.5 through 2.8 allows remote attackers to execute arbitrary code via a malformed UDP response to a broadcast request.

Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code by using JavaScript to cause certain errors simultaneously, which results in the access of previously freed memory, aka "Script Error Handling Memory Corruption Vulnerability."

Stack-based buffer overflow in Microsoft Excel 2000, 2002, and 2003, in Microsoft Office 2000 SP3 and other packages, allows user-assisted attackers to execute arbitrary code via an Excel file with a malformed record with a modified length value, which leads to memory corruption.

Buffer overflow in a component of Microsoft Data Access Components (MDAC) 2.5 through 2.8 allows remote attackers to execute arbitrary code via a malformed UDP response to a broadcast request.

Buffer overflow in URLMON.DLL in Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via a crafted URL with an International Domain Name (IDN) using double-byte character sets (DBCS), aka the "Double Byte Character Parsing Memory Corruption Vulnerability."

The logging capability for unicast and multicast transmissions in the ISAPI extension for Microsoft Windows Media Services in Microsoft Windows NT 4.0 and 2000, nsiislog.dll, allows remote attackers to cause a denial of service in Internet Information Server (IIS) and execute arbitrary code via a certain network request.

The host is installed with Schneider Electric Interactive Graphical SCADA System (IGSS) 10 or earlier and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle data that does not comply with a protocol. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Audition and is prone to multiple buffer overflow vulnerabilities. Flaws are present in the application, which fails to parse several fields inside the TRKM chunk on malicious session (.ses) files. Successful exploitation allows attacker to execute arbitrary code.

The host is installed with Adobe Audition and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to sanitize the user input resulting in a memory corruption. Successful exploitation allows attacker to execute arbitrary code or cause denial of service.

The host is installed with Novell GroupWise Messenger 2.04 and earlier or Novell Messenger 2.1 or earlier or 2.2.x before 2.2.2 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle an import command containing a long string in the filename parameter. Successful exploitation allows attackers to execute arbitrary code.


Pages:      Start    702    703    704    705    706    707    708    709    710    711    712    713    714    715    ..   734

© SecPod Technologies