This module exploits a stack-based buffer overflow in the ienipp.ocx ActiveX component of Novell iPrint Client by passing an overly long value to the 'call-back-url' parameter.
The vulnerability is caused due to a boundary error in MUSE when handling .PLS files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .PLS file.
A stack buffer overflow exists in QuickTime's error logging. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution.
This update embed the .MOV file in Internet Explorer 6 or 7, in other browsers it can be downloaded for use and exploitation in QuickTime. It also add support for Windows Vista.
This update embed the .MOV file in Internet Explorer 6 or 7, in other browsers it can be downloaded for use and exploitation in QuickTime. It also add support for Windows Vista.
The Common Language Runtime (CLR) in Microsoft .NET Framework does not properly handle interfaces and delegations to virtual methods. This module exploits the vulnerability through Microsoft Internet Explorer.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
A-PDF WAV to MP3 Converter contains a buffer prone to exploitation via an crafted WAV file.
Microsoft Windows Movie Maker is prone to a remote buffer-overflow vulnerability. The vulnerability is caused due to boundary errors when parsing strings in imported project files (.MSWMM).
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
The vulnerability is caused due to a boundary error in QuickTimeStreaming.qtx when constructing a string to write to a debug log file. This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into viewing a specially crafted web page that references a SMIL file containing an overly long URL.
This module exploits a stack-based buffer overflow in Microsoft Office Excel by sending a malformed .XLS file with a crafted PivotTable Cache Data Record.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs
or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs
or have limited functionality and may not have complete or accurate documentation.
Stack-based buffer overflow in EffectMatrix (E.M.) Magic Morph 1.95b allows remote attackers to execute arbitrary code via a long string in a .MOR file.
This module exploits a vulnerability in Microsoft Office Outlook when verifying attachments that are attached using the ATTACH_BY_REFERENCE value of the PR_ATTACH_METHOD property in a specially crafted e-mail message.
This update uses WebDav.
This update uses WebDav.
Pagination
- Previous page
- Page 63
- Next page