The vulnerability exists in Microsoft Office when the software fails to properly handle objects in memory.
The specific flaw exists within the processing of ARF files. While opening an ARF file, WebEx Network Recording Player loads a DLL from an unqualified path. An attacker can leverage this vulnerability to execute code under the context of the current process.
Multiple stack-based buffer overflow vulnerabilities have been identified in which the application does not verify string size before copying to memory, the attacker may then be able to crash the application or run arbitrary code.
This update adds support for the new software version and a new CVE.
This update adds support for the new software version and a new CVE.
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory.
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory.
Multiple stack-based buffer overflow vulnerabilities have been identified in which the application does not verify string size before copying to memory, the attacker may then be able to crash the application or run arbitrary code.
A vulnerability exists in Microsoft .NET.
A specially crafted RTF document or application can trigger an input validation flaw and execute arbitrary code on the target user's system.
A specially crafted RTF document or application can trigger an input validation flaw and execute arbitrary code on the target user's system.
The specific flaw exists within the processing of DVP files. The process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer.
The specific flaw exists within parsing of a V8 project file. The issue lies in the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer.
The specific flaw exists within processing of EPC files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer.
Pagination
- Previous page
- Page 8
- Next page