The specific flaw exists within the Borland Silk Central TeeChart ActiveX control. The control suffers from an untrusted pointer dereference vulnerability because it blindly calls an attacker-supplied memory address. An attacker can exploit this condition to achieve code execution under the context of the browser process.
AT and T Connect Participant Application is prone to a Buffer-Overflow when handling specially crafted SVT files.
This module exploits an integer underflow vulnerability in Adobe Flash Player. This vulnerability was exploited in 0day attacks in February 2014.
This update adds support for Windows 7 x64, Windows Server 2008 x64 and Windows Server 2008 R2 x64.
This update adds support for Windows 7 x64, Windows Server 2008 x64 and Windows Server 2008 R2 x64.
Removes instantiating a java class, avoiding the popup stating Java is required to complete further operations.
HP LoadRunner lrFileIOService has a vulnerability in the WriteFileString method, which allow the user to write arbitrary and load abitrary modules.
The file names showed in WinRAR when opening a ZIP file come from the central directory, but the file names used to extract and open contents come from the Local File Header. This allows to spoof file names when opening ZIP files
and can be abused to execute arbitrary code.
and can be abused to execute arbitrary code.
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014.
Quick View Plus contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in Quick View Plus when handling .MDB files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .MDB file.
This module runs a malicious web server on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to it by opening the crafted MDB file with Quick View Plus.
This module runs a malicious web server on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to it by opening the crafted MDB file with Quick View Plus.
An error within the MPEG file parser can be exploited to cause a buffer overflow via a specially crafted packet trace file.
When a crafted configuration file is parsed by the client, it may cause a buffer overflow allowing the configuration file execute code on the target PC.
Pagination
- Previous page
- Page 19
- Next page