Microsoft Office HtmlDlgHelper Class Memory Corruption
Exploit for windows platform in category dos /...
7AI Score
0.5AI Score
0.961EPSS
Microsoft Office HtmlDlgHelper class memory corruption
Core Security - CoreLabs Microsoft Office HtmlDlgHelper class memory corruption 1. Advisory Information Title: Microsoft Office HtmlDlgHelper class memory corruption Advisory Id: CORE-2010-0517 Advisory URL: http://www.coresecurity.com/content/MS-Office-HtmlDlgHelper-memory-corruption Date...
7.6AI Score
Microsoft Office Excel PivotTable Cache Data Record Buffer Overflow
Core Security - CoreLabs Microsoft Office Excel PivotTable Cache Data Record Buffer Overflow 1. Advisory Information Title: Microsoft Office Excel PivotTable Cache Data Record Buffer Overflow Advisory Id: CORE-2010-0407 Advisory URL:...
8.4AI Score
Microsoft Excel EntExU2记录内存破坏漏洞(MS10-017)
BUGTRAQ ID: 38547 CVE ID: CVE-2010-0257 Excel是微软Office套件中的电子表格工具。 Excel处理特制Excel文件中畸形EntExU2记录的方式存在内存破坏漏洞。攻击者可以通过诱骗用户打开特制的XLS文件来利用这个漏洞,成功利用此漏洞可以导致完全控制受影响的系统。 Microsoft Excel 2002 SP3 临时解决方法: 不要打开从不可信任来源接收到货从可信任来源意外接收到的Excel文件。 厂商补丁: Microsoft Microsoft已经为此发布了一个安全公告(MS10-017)以及相应补丁:...
6.8AI Score
0.884EPSS
SQL injection vulnerability in the K2 (com_k2) component 1.0.1 Beta and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the category parameter in an itemlist action to...
8.4AI Score
0.001EPSS
SQL injection vulnerability in the K2 (com_k2) component 1.0.1 Beta and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the category parameter in an itemlist action to...
8.9AI Score
0.001EPSS
SQL injection vulnerability in the K2 (com_k2) component 1.0.1 Beta and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the category parameter in an itemlist action to...
8.2AI Score
0.001EPSS
SQL injection vulnerability in the K2 (com_k2) component 1.0.1 Beta and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the category parameter in an itemlist action to...
8.2AI Score
0.001EPSS
7.4AI Score
EPSS
0.7AI Score
7.4AI Score
Elgg (XSS/CSRF/Change Password) Multiple Remote Vulnerabilities
Exploit for unknown platform in category web...
7.1AI Score
7.1AI Score
elgg - Cross-Site Scripting Cross-Site Request Forgery Change Password
elgg - Cross-Site Scripting Cross-Site Request Forgery Change...
0.7AI Score
Mini-stream CastRipper Stack Overflow Vulnerability
This host is installed with Mini-Stream CastRipper and is prone to Stack Overflow...
1AI Score
0.041EPSS
Mini-stream CastRipper Stack Overflow Vulnerability
Mini-Stream CastRipper is prone to Stack Overflow...
6.6AI Score
0.041EPSS
Stack-based buffer overflow in Mini-stream CastRipper 2.50.70 allows remote attackers to execute arbitrary code via a long entry in a .m3u file, a different vector than...
8.1AI Score
0.041EPSS
Stack-based buffer overflow in Mini-stream CastRipper 2.50.70 allows remote attackers to execute arbitrary code via a long entry in a .m3u file, a different vector than...
8.4AI Score
0.041EPSS
Stack-based buffer overflow in Mini-stream CastRipper 2.50.70 allows remote attackers to execute arbitrary code via a long entry in a .m3u file, a different vector than...
7.9AI Score
0.041EPSS
Stack-based buffer overflow in Mini-stream CastRipper 2.50.70 allows remote attackers to execute arbitrary code via a long entry in a .m3u file, a different vector than...
7.9AI Score
0.041EPSS
1AI Score
7.1AI Score
1.1AI Score
7.1AI Score
CastRipper 2.50.70 - .m3u Universal Stack Overflow (Python)
CastRipper 2.50.70 - .m3u Universal Stack Overflow...
0.9AI Score
CastRipper 2.50.70 - .m3u Universal Stack Overflow
CastRipper 2.50.70 - .m3u Universal Stack...
1.1AI Score
7.4AI Score
EPSS
7.4AI Score
EPSS
7.4AI Score
EPSS
Asus SmartLogon 1.0.0005 allows physically proximate attackers to bypass "security functions" by presenting an image with a modified viewpoint that matches the posture of a stored image of the authorized notebook...
6.5AI Score
0.001EPSS
Asus SmartLogon 1.0.0005 allows physically proximate attackers to bypass "security functions" by presenting an image with a modified viewpoint that matches the posture of a stored image of the authorized notebook...
6.3AI Score
0.001EPSS
Asus SmartLogon 1.0.0005 allows physically proximate attackers to bypass "security functions" by presenting an image with a modified viewpoint that matches the posture of a stored image of the authorized notebook...
6.8AI Score
0.001EPSS
Toshiba Face Recognition 2.0.2.32 allows physically proximate attackers to obtain notebook access by presenting a large number of images for which the viewpoint and lighting have been modified to match a stored image of the authorized notebook...
6.6AI Score
0.002EPSS
Toshiba Face Recognition 2.0.2.32 allows physically proximate attackers to obtain notebook access by presenting a large number of images for which the viewpoint and lighting have been modified to match a stored image of the authorized notebook...
6.9AI Score
0.002EPSS
Toshiba Face Recognition 2.0.2.32 allows physically proximate attackers to obtain notebook access by presenting a large number of images for which the viewpoint and lighting have been modified to match a stored image of the authorized notebook...
6.4AI Score
0.002EPSS
Asus SmartLogon 1.0.0005 allows physically proximate attackers to bypass "security functions" by presenting an image with a modified viewpoint that matches the posture of a stored image of the authorized notebook...
6.3AI Score
0.001EPSS
Toshiba Face Recognition 2.0.2.32 allows physically proximate attackers to obtain notebook access by presenting a large number of images for which the viewpoint and lighting have been modified to match a stored image of the authorized notebook...
6.4AI Score
0.002EPSS
7.1AI Score
7.1AI Score
2.7AI Score
0.004EPSS
Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc. Power Phlogger: crossite scripting, information...
2.4AI Score
Multiple stack-based buffer overflows in the AxMetaStream ActiveX control in AxMetaStream.dll 3.3.2.26 in Viewpoint Media Player 3.2 allow remote attackers to execute arbitrary code via a long string argument to the (1) BroadcastKey, (2) BroadcastKeyFileURL, (3) Component, (4) ComponentClassID,...
7.8AI Score
0.163EPSS
Multiple stack-based buffer overflows in the AxMetaStream ActiveX control in AxMetaStream.dll 3.3.2.26 in Viewpoint Media Player 3.2 allow remote attackers to execute arbitrary code via a long string argument to the (1) BroadcastKey, (2) BroadcastKeyFileURL, (3) Component, (4) ComponentClassID,...
8.4AI Score
0.163EPSS
Multiple stack-based buffer overflows in the AxMetaStream ActiveX control in AxMetaStream.dll 3.3.2.26 in Viewpoint Media Player 3.2 allow remote attackers to execute arbitrary code via a long string argument to the (1) BroadcastKey, (2) BroadcastKeyFileURL, (3) Component, (4) ComponentClassID,...
7.8AI Score
0.163EPSS
Multiple stack-based buffer overflows in the AxMetaStream ActiveX control in AxMetaStream.dll 3.3.2.26 in Viewpoint Media Player 3.2 allow remote attackers to execute arbitrary code via a long string argument to the (1) BroadcastKey, (2) BroadcastKeyFileURL, (3) Component, (4) ComponentClassID,...
7.8AI Score
0.163EPSS
7.1AI Score
-0.3AI Score
7.4AI Score
EPSS
Viewpoint Media Player for IE 3.2 Remote Stack Overflow PoC
Exploit for unknown platform in category dos /...
7AI Score