Yahoo Player contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in Yahoo Player when handling .YPL files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .YPL file.
This module exploits a Use-After-Free vulnerability on Internet Explorer 6 and 7.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs
or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs
or have limited functionality and may not have complete or accurate documentation.
This module exploits a buffer overflow in Windows Movie Maker by sending a specially crafted .MSWMM file.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
The vulnerability is caused due to a boundary error in the processing of .WJR files. This can be exploited to cause a stack-based buffer overflow by tricking the user into opening a .WJR file containing an overly long "Save To" field.
Array index error in Microsoft Powerpoint, allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka "PowerPoint OEPlaceholderAtom" 'placementId' Invalid Array Indexing Vulnerability.
This update improves memory management.
This update improves memory management.
Orbital Viewer is prone to a stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer.
This update adds support for several additional ActiveX exploits.
This module exploits a buffer overflow vulnerability in Adobe Reader products when a malformed .TIFF file is parsed.
This update add support for Windows Vista and Windows 7 trying to bypass DEP and ASRL protections.
This update add support for Windows Vista and Windows 7 trying to bypass DEP and ASRL protections.
Array index error in Microsoft Powerpoint, allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka "PowerPoint OEPlaceholderAtom" 'placementId' Invalid Array Indexing Vulnerability.
WARNING: This is an early release module.
This is not the final version of this module.
It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations.
Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module.
This is not the final version of this module.
It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations.
Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
This module exploits a stack-based buffer overflow in Microsoft PowerPoint Viewer 2003 by sending a specially crafted .PPT file with a malformed TextBytesAtom (0xF0A8) record.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
Pagination
- Previous page
- Page 70
- Next page