An integer overflow occurs when Adobe Reader parses some crafted ICC chunks.
This module sends HTTP requests with specially crafted data making the
PHP interpreter to consume lot of resources. This attack prevents the
victim server from processing requests from legitimate clients and
probably will make the server non-operational.
This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
PHP interpreter to consume lot of resources. This attack prevents the
victim server from processing requests from legitimate clients and
probably will make the server non-operational.
This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
The flaw exists in the Remote Agent (CEServer.exe) that listens by default on TCP port 4322, the process can not perform any authentication and copy the packages designed to a fixed size buffer.
Incomplete blacklist vulnerability in the Windows Packager configuration allows remote attackers to execute arbitrary code via a crafted ClickOnce application in a Microsoft Office document.
warning: "This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation."
warning: "This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation."
This module exploits a Windows kernel heap overflow vulnerability when a crafted TTF file is processed by Windows kernel.
This module sends HTTP requests with specially crafted data making the ASP.NET subsystem consume lot of resources. This attack prevents the victim server from processing requests from legitimate clients and probably will make the server non-operational.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
Avid Media Composer is prone to a remote stack-based buffer-overflow vulnerability within the Phonetic Indexer (AvidPhoneticIndexer.exe) because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer.
This update adds support to Microsoft Windows Vista, Microsoft Windows 2008 and Microsoft Windows 7.
When a crafted TTF file is processed by Windows kernel it produces a stack exhaustion finishing it in a BSoD.
When a crafted TTF file is processed by Windows kernel it produces a stack exhaustion finishing it in a BSoD.
This module exploits a path traversal vulnerability in Novell ZENworks Asset Management.
The flaw exists within the rtrlet component. This process listens on TCP port 8080. When handling an unauthenticated file upload the process does not properly sanitize the path. Directory traversal can be used to drop a file in an arbitrary location and a null byte inserted into the filename to provide arbitrary extension.
The flaw exists within the rtrlet component. This process listens on TCP port 8080. When handling an unauthenticated file upload the process does not properly sanitize the path. Directory traversal can be used to drop a file in an arbitrary location and a null byte inserted into the filename to provide arbitrary extension.
This module exploits a remote buffer overflow in the streamprocess.exe service included in the Citrix Provisioning Services application by sending a malformed packet to the 6905/UDP port.
Pagination
- Previous page
- Page 116
- Next page