[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31177 Download | Alert*

Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2; Microsoft Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Word Viewer; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 do not properly handle unspecified properties in rich text data, which allows remote attackers to execute arbitrary code or cause a denial of service (memory co ...

Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2; Microsoft Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Word Viewer; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; and Works 9 do not properly handle malformed records in a Word file, which allows remote attackers to execute arbitrary code or cause a denial of service (memory c ...

Buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2; Microsoft Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Word Viewer; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code via unspecified properties in the data in a crafted RTF document, AKA "Word RTF Parsing Buf ...

The host is installed with IBM Lotus Notes and is prone to heap-based buffer vulnerability. A flaw is present in autonomy KeyView which fails to parse a BIFF record by KeyView XLS file viewer (xlssr.dll). Successful exploitation could allow remote attacker to overflow buffer and execute arbitrary code on the system or cause the application to crash.

The host is installed with IBM Lotus Notes and is prone to buffer overflow vulnerability. A flaw is present in autonomy KeyView which fails to parse a Lotus Notes .zip by kvarcve.dll. Successful exploitation could allow remote attacker to overflow buffer and execute arbitrary code on the system or cause the application to crash.

The host is installed with IBM Lotus Notes 8.5.x before 8.5.32.12184 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to include the HTTPOnly flag in a Set-Cookie header for a web-application cookie. Successful exploitation allows remote attackers to obtain potentially sensitive information via script access to this cookie.

The host is installed with IBM Lotus Notes 7.0 or 8.0 before 8.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which stores administrative credentials in cleartext. Successful exploitation could allow attackers to gain sensitive information.

The host is installed with IBM Lotus Notes 8.x before 8.5.3 FP2 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly validate user supplied input. Successful exploitation allows attackers to execute arbitrary code via a crafted notes:// URL.

The host is installed with Adobe Reader 10.x before 10.1.1 or 9.x before 9.4.6 or 8.x before 8.3.1 or Adobe Acrobat 10.x before 10.1.1 or 9.x before 9.4.6 or 8.x before 8.3.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to gain privileges.

The host is installed with Adobe Flash Player, Adobe Reader or Adobe Acrobat and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the Adobe Flash Player application before 10.3.181.22, Adobe Reader 9.x through 9.4.4 or 10.x through 10.0.3 or Adobe Acrobat 9.x through 9.4.4 or 10.x through 10.0.3, which is caused by improper validation of user-supplied input. Successful ex ...


Pages:      Start    2072    2073    2074    2075    2076    2077    2078    2079    2080    2081    2082    2083    2084    2085    ..   3117

© SecPod Technologies