[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97147

 
 

909

 
 

78764

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11938 Download | Alert*

Firefox before 1.0.5, Thunderbird before 1.0.5, Mozilla before 1.7.9, Netscape 8.0.2, and K-Meleon 0.9 runs XBL scripts even when Javascript has been disabled, which makes it easier for remote attackers to bypass such protection.

The host is installed with Apache OpenOffice.org before 4 and is prone to memory corruption vulnerability. The flaw is present in the application, which fails to properly handle invalid PLCF data in a DOC document file. Successful exploitation allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact.

The host is installed with Apache OpenOffice.org before 4 and is prone to memory corruption vulnerability. The flaw is present in the application, which fails to properly handle a crafted element in an OOXML document file. Successful exploitation allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact.

The host is installed with OpenOffice.org before 3.1.1 and is prone to integer underflow vulnerability. A flaw is present in the application, which fails to properly handle crafted records. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with OpenOffice.org before 3.1.1 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unspecified records. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with OpenOffice.org before 3.2 and is prone to integer overflow vulnerability. A flaw is present in XPMReader::ReadXPM function in filter.vcl/ixpm/svt_xpmread.cxx, which fails to properly handle a crafted XPM file. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with OpenOffice.org before 3.2 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the GIFLZWDecompressor::GIFLZWDecompressor function in filter.vcl/lgif/decode.cxx, which fails to properly handle a crafted GIF file. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with OpenOffice.org before 3.2 and is prone to integer underflow vulnerability. A flaw is present in filter/ww8/ww8par2.cxx, which fails to properly handle a crafted sprmTDefTable table property modifier in a Word document. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with OpenOffice.org before 3.2 and is prone to boundary error vulnerability. A flaw is present in filter/ww8/ww8par2.cxx, which fails to properly handle a crafted sprmTDefTable table property modifier in a Word document. Successful exploitation allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code.

The host is installed with OpenOffice.org 2.x before 2.4.2 and is prone to heap-based buffer overflow vulnerability. A flaw is present in application, which fails to properly handle a crafted WMF file. Successful exploitation allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1193

© 2013 SecPod Technologies