Maya Studio EO-Video is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input when handling playlist files.
This module exploits a buffer overflow vulnerability in Foxit Reader. If an Open/Execute a file action is defined in the PDF file with an overly long file name argument, when the trigger condition is satisfied it will cause a stack-based buffer overflow, because the application tries to copy the file name argument to a fixed-size buffer in the stack without properly checking that the buffer is large enough to hold the file name string.
This update adds support for Windows Vista and Windows Server 2003.
This update adds support for Windows Vista and Windows Server 2003.
The POP Peeper client is vulnerable to a remote buffer overflow vulnerability. This vulnerability is exploitable as a client side attack. A vulnerable POP Peeper user must connect to a server created by IMPACT Pro and attempt to retrieve mail in order for IMPACT Pro to exploit the vulnerable agent and deploy and agent on the users machine.
This module exploits a stack based buffer overflow vulnerability in Adobe Reader when handling a specially crafted PDF file.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
The application is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied
data. Specifically, this issue occurs when the application creates a
'Connecting' log message. An attacker can exploit this issue by enticing
a vulnerable user into connecting to a malicious HTTP server or opening a
specially crafted URI that contains an excessively long hostname.
data. Specifically, this issue occurs when the application creates a
'Connecting' log message. An attacker can exploit this issue by enticing
a vulnerable user into connecting to a malicious HTTP server or opening a
specially crafted URI that contains an excessively long hostname.
This module exploits a memory corruption vulnerability when Internet Explorer attempts to access an object that has been deleted.
This update adds support for Windows Vista SP0 and SP1.
This update adds support for Windows Vista SP0 and SP1.
This update changes the way email webbug module registers its prefix with the webserver module.
This module exploits a buffer overflow vulnerability in Foxit Reader. If an Open/Execute a file action is defined in the PDF file with an overly long file name argument, when the trigger condition is satisfied it will cause a stack-based buffer overflow, because the application tries to copy the file name argument to a fixed-size buffer in the stack without properly checking that the buffer is large enough to hold the file name string.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
Euphonics Audio Player contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error when handling .PLS files.
This module exploits an arbitrary file download and execute vulnerability in the LaunchObj ActiveX Control included in Symantec AppStream Client.
Pagination
- Previous page
- Page 83
- Next page