Search
Keyword: rtf stack buffer overflow vulnerability cve-2010-3333
CVE-2008-5036 Stack-based buffer overflow in VideoLAN VLC media player 0.9.x before 0.9.6 might allow user-assisted attackers to execute arbitrary code via an an invalid RealText (rt) subtitle file,
CVE-2005-1983 cve: Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Windows 2000 and Windows XP Service Pack 1 allows remote attackers to execute arbitrary code via a
Microsoft Windows Runtime Elevation Of Privilege Vulnerability (CVE-2019-0570) 1009296 - Oracle Java Runtime Environment 'JPEGImageEncoderImpl' Remote Heap Buffer Overflow Vulnerability (CVE-2010-0846)
CVE-2008-0638 Heap-based buffer overflow in the Veritas Enterprise Administrator (VEA) service (aka vxsvc.exe) in Symantec Veritas Storage Foundation 5.0 allows remote attackers to execute arbitrary
NOTE: as of 20071108, Oracle has not disputed reliable researcher claims that DB25 is for a buffer overflow in the DBLINK_INFO procedure in the DBMS_AQADM_SYS package. Oracle Oracle Database
CVE-2009-3033 Buffer overflow in the RunCmd method in the Altiris eXpress NS Console Utilities ActiveX control in AeXNSConsoleUtilities.dll in the web console in Symantec Altiris Deployment Solution
CVE-2005-1015 Buffer overflow in MailEnable Imapd (MEIMAP.exe) allows remote attackers to execute arbitrary code via a long LOGIN command. MailEnable Imapd Trend Micro Deep Security shields networks
CVE-2006-4868,MS06-055 Stack-based buffer overflow in the Vector Graphics Rendering engine (vgx.dll), as used in Microsoft Outlook and Internet Explorer 6.0 on Windows XP SP2, and possibly other
memory allocation and a heap-based buffer overflow during conversion to a floating-point number. FreeBSD FreeBSD 6.4,FreeBSD FreeBSD 7.2,K-Meleon Project K-Meleon 1.5.3,Mozilla Firefox 3.0.1,Mozilla
Mozilla Firefox Remote Heap Buffer Overflow Vulnerability
following vulnerability: Adobe Flash Player Buffer Overflow Vulnerability (CVE-2014-0515) NOTES: Once a compromised website is visited, the user's browser with a vulnerable version of Adobe Flash loads a
..................................................................................php?a=84435-81782ff9e4e204717db82d2e43a76f2d It takes advantage of the following software vulnerabilities to download possibly malicious files: Office Buffer Overflow Vulnerability (CVE-2013-1331) As of
2013-0604,MS13-111 Heap-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified
An Office RTF remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle RTF files. An attacker who successfully exploited the
CVE-2008-4193 Stack-based buffer overflow in SecurityGateway.dll in Alt-N Technologies SecurityGateway 1.0.1 allows remote attackers to execute arbitrary code via a long username parameter. Alt-N
CVE-2008-0623,CVE-2008-0624,CVE-2008-0625 Multiple buffer overflow vulnerabilities exist in Yahoo! Music Jukebox. These vulnerabilities are caused due to boundary errors within the Yahoo! Music
CVE-2004-1520 Stack-based buffer overflow in IPSwitch IMail 8.13 allows remote authenticated users to execute arbitrary code via a long IMAP DELETE command. Ipswitch IMail 8.13 Trend Micro Deep
CVE-2008-4449 Stack-based buffer overflow in mIRC 6.34 allows remote attackers to execute arbitrary code via a long hostname in a PRIVMSG message. mirc mirc 6.34 Trend Micro Deep Security shields
CVE-2005-1323 cve: Buffer overflow in NetFtpd for NetTerm 5.1.1 and earlier allows remote attackers to execute arbitrary code via a long USER command. InterSoft NetTerm 4.2.2 Trend Micro Deep
5.5.5,php php 5.5.6,php php 5.5.7,php php 5.5.8 Apply associated Trend Micro DPI Rules. 1005931| 1005931 - PHP "imagecrop()" Buffer Overflow Vulnerabilities