The vulnerabilities are caused due to boundary errors within the "pdf_loadtype4shade()", "pdf_loadtype5shade()", "pdf_loadtype6shade()", and "pdf_loadtype7shade()" functions. This can be exploited to cause stack-based buffer overflows.
The vulnerability is caused due to a boundary error when processing certain overly long entries within slideshow project files (.PSH).
The vulnerability is caused due to a boundary error in the processing of POP3 responses. This can be exploited to cause a stack-based buffer overflow via an overly long error response.
This module abuses the scripting functionality in DAZ Studio to trigger remote code execution via a DAZ Script file.
A code execution vulnerability exists in the way that Microsoft Office Excel handles specially crafted Excel files that include a malformed record object. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
This version add support for Microsoft Office 2007 SP2.
This version add support for Microsoft Office 2007 SP2.
QuikSoft EasyMail is prone to a buffer overflow.
The vulnerability affects the 'AddAttachment()' method of the 'emsmtp.dll'.
The issue occurs when the method handles user-input buffer with overly long size.
The vulnerability affects the 'AddAttachment()' method of the 'emsmtp.dll'.
The issue occurs when the method handles user-input buffer with overly long size.
The vulnerability is caused due to a boundary error when processing
certain sections of .SPD (policy) files. Passing an overly long
string to either "TREENAME" or "GROUPNAME"
certain sections of .SPD (policy) files. Passing an overly long
string to either "TREENAME" or "GROUPNAME"
A vulnerability exists in Microsoft Office Word when handling a specially crafted Word file that includes a malformed File Information Block (FIB).
WARNING: This is an early release module. This is not the final version of this module.
It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module.
It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
This module exploits a vulnerability in Microsoft Internet Explorer when handling a specially crafted STYLE HTML tag when accessed via the
document.getElementsByTagName JavaScript function.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
document.getElementsByTagName JavaScript function.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
This module exploits a vulnerability on telnet.exe using the SMB relay attack.
This update adds support for client-side mode.
This update adds support for client-side mode.
Pagination
- Previous page
- Page 73
- Next page