Page 4 of 24 results (0.004 seconds)

CVSS: 10.0EPSS: 42%CPEs: 1EXPL: 3

Stack-based buffer overflow in wpsio.dll in Kingsoft WPS Office 2012 possibly 8.1.0.3238 allows remote attackers to execute arbitrary code via a long BSTR string. Desbordamiento de buffer basado en pila en wpsio.dll en Kingsoft WPS Office 2012 posiblemente 8.1.0.3238 permite a atacantes remotos ejecutar código arbitrario a través de una cadena BSTR larga. • https://www.exploit-db.com/exploits/25140 http://osvdb.org/92847 http://packetstormsecurity.com/files/121431/WPS-Office-Stack-Buffer-Overflow.html http://seclists.org/fulldisclosure/2013/Apr/247 http://www.exploit-db.com/exploits/25140 http://www.securityfocus.com/bid/59529 https://exchange.xforce.ibmcloud.com/vulnerabilities/83862 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 5%CPEs: 2EXPL: 0

Buffer overflow in Kingsoft Writer 2007 and 2010 before 2724 allows remote attackers to execute arbitrary code via a crafted RTF document. Desbordamiento de búfer basado en pila en Kingsoft Writer 2007 y 2010 anterior a 2724, permite a atacantes remotos ejecutar código de su elección a través de un documento RTF malintencionado. • http://jvn.jp/en/jp/JVN55924624/22479/index.html http://jvn.jp/en/jp/JVN55924624/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2013-000016 http://www.kingsoft.jp/support/office/support_news/writer2010_2723 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.2EPSS: 0%CPEs: 2EXPL: 0

Race condition in KingSoft Personal Firewall 9 Plus 2009.05.07.70 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute ** EN DISPUTA** Condición de carrera en Kingsoft Personal Firewall 9 Plus v2009.05.07.70 en Windows XP permite a usuarios locales eludir los manejadores de ganchos (hook handlers) de modo kernel, y ejecutar código peligroso que de otra forma sería bloqueado por un manejador y no por la detección de la firma de malware. Esto se consigue a través de ciertos cambios en la memoria de espacio de usuario durante la ejecución del manejador de gancho, también conocido como ataque argument-switch o ataque KHOBE. NOTA: este problema es discutido por algunos, ya que es un defecto en un mecanismo de protección para situaciones en las que un programa hecho a mano ya ha comenzado a ejecutarse. • http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php http://www.f-secure.com/weblog/archives/00001949.html http://www.osvdb.org/67660 http://www.securit • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in the device driver in Kingsoft Internet Security 2011 allows local users to cause a denial of service via a crafted application. Vulnerabilidad sin especificar en el controlador Kingsoft Internet Security 2011 permite a atacantes remotos provocar una denegación de servicio a través de una aplicación modificada. • http://jvn.jp/en/jp/JVN31517714/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2012-000019 http://www.kingsoft.jp/support/security/support_news/supportnews_20120229 •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 3

KisKrnl.sys 2011.1.13.89 and earlier in Kingsoft AntiVirus 2011 SP5.2 allows local users to cause a denial of service (crash) via a crafted request that is not properly handled by the KiFastCallEntry hook. KisKrnl.sys v2011.1.13.89 y anteriores en Kingsoft AntiVirus 2011 SP5.2 permite a usuarios locales provocar una denegación de servicio (caída) a través de una petición modificada que no es manejada adecuadamente por el hook (enganche) KiFastCallEntry. • https://www.exploit-db.com/exploits/15998 http://secunia.com/advisories/42937 http://www.exploit-db.com/exploits/15998 http://www.securityfocus.com/archive/1/515767/100/0/threaded http://www.securityfocus.com/bid/45821 https://exchange.xforce.ibmcloud.com/vulnerabilities/64723 •