An integer overflow occurs when Adobe Reader parses some crafted ICC chunks.
Incomplete blacklist vulnerability in the Windows Packager configuration allows remote attackers to execute arbitrary code via a crafted ClickOnce application in a Microsoft Office document.
warning: "This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation."
warning: "This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation."
CyberLink Power2Go is prone to a vulnerability that may allow the execution of any library file named dwmapi.dll, if this dll is located in the same folder than a .P2G file.
A policy issue existed in Apple Safari before 5.1 when handling of file:// URLs.
When a crafted TTF file is processed by Windows kernel it produces a stack exhaustion finishing it in a BSoD.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
The vulnerability exists on ImageViewer2.OCX by passing a overly long argument to an insecure Image2PDF() method.
The vulnerability exists on ImageViewer2.OCX by passing a overly long argument to an insecure TifMergeMultiFiles() method.
The flaw exists within the nipplib.dll component. When handling the exposed method GetDriverSettings the application assembles a string for logging consisting of the hostname/port provided as a parameter. When building this message the process will blindly copy user supplied data into a fixed-length buffer on the stack.
The vulnerability is due to an memory corruption when the vulnerable software handles a crafted Excel file with a corrupted LEL record.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
VMware Workstation and VMware Player are prone to a stack overflow when parsing a specially crafted ISO file.
Pagination
- Previous page
- Page 41
- Next page