Page 5 of 35 results (0.005 seconds)

CVSS: 9.3EPSS: 96%CPEs: 10EXPL: 2

Heap-based buffer overflow in mscomct2.ocx (aka Windows Common ActiveX control or Microsoft Animation ActiveX control) in Microsoft Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2, and Office Project 2003 SP3 and 2007 Gold and SP1 allows remote attackers to execute arbitrary code via an AVI file with a crafted stream length, which triggers an "allocation error" and memory corruption, aka "Windows Common AVI Parsing Overflow Vulnerability." Un desbordamiento de búfer en la región heap de la memoria en el archivo mscomct2.ocx (también se conoce como control ActiveX de Windows Common o control ActiveX de Microsoft Animation) en Visual Basic versión 6.0, Visual Studio .NET 2002 SP1 y 2003 SP1, Visual FoxPro versiones 8.0 SP1 y 9.0 SP1 y SP2, y Office Project 2003 SP3 y 2007 Gold y SP1, de Microsoft, permite a atacantes remotos ejecutar código arbitrario por medio de un archivo AVI con una longitud de secuencia diseñada, lo que desencadena un "allocation error" y corrupción de memoria, también se conoce como "Windows Common AVI Parsing Overflow Vulnerability." This vulnerability allows remote attackers to execute arbitrary code through vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists within the Microsoft Animation ActiveX control MSCOMCT2.OCX. When parsing a malformed AVI file through this control an exploitable heap corruption can occur. • https://www.exploit-db.com/exploits/7431 http://downloads.securityfocus.com/vulnerabilities/exploits/32613.pl http://support.avaya.com/elmodocs2/security/ASA-2008-473.htm http://www.securityfocus.com/archive/1/499061/100/0/threaded http://www.securityfocus.com/bid/32613 http://www.securitytracker.com/id?1021369 http://www.us-cert.gov/cas/techalerts/TA08-344A.html http://www.vupen.com/english/advisories/2008/3382 http://www.zerodayinitiative.com/advisories/ZDI-08-083 https:// • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 4%CPEs: 23EXPL: 0

Microsoft Crypto API 5.131.2600.2180 through 6.0, as used in Outlook, Windows Live Mail, and Office 2007, performs Certificate Revocation List (CRL) checks by using an arbitrary URL from a certificate embedded in a (1) S/MIME e-mail message or (2) signed document, which allows remote attackers to obtain reading times and IP addresses of recipients, and port-scan results, via a crafted certificate with an Authority Information Access (AIA) extension. Microsoft Crypto API 5.131.2600.2180 hasta la 6.0, como las usadas en Outlook, Windows Live Mail, y Office 2007, realiza una lista de revocación de certificado (CRL) utilizando una URL arbitraria de un certificado incluido en (1) mensaje de correo electrónico S/MIME o (2) documento firmado, lo que permite a atacantes remotos conseguir tiempos de lectura y direcciones IP de recipientes, y resultados de escaneo de puerto, a través de un certificado manipulado con una extensión de de una Authority Information Access (AIA). • http://securityreason.com/securityalert/3978 http://www.securityfocus.com/archive/1/493947/100/0/threaded http://www.securityfocus.com/archive/1/494101/100/0/threaded http://www.securityfocus.com/bid/28548 http://www.securitytracker.com/id?1019736 http://www.securitytracker.com/id?1019737 http://www.securitytracker.com/id?1019738 https://www.cynops.de/advisories/AKLINK-SA-2008-002.txt https://www.cynops.de/advisories/AKLINK-SA-2008-003.txt https://www.cynops.de/advisories/AK •

CVSS: 9.3EPSS: 94%CPEs: 36EXPL: 0

Unspecified vulnerability in Microsoft Excel 2000, XP, 2003, and 2004 for Mac, and possibly other Office products, allows remote user-assisted attackers to execute arbitrary code via unknown attack vectors, as demonstrated by Exploit-MSExcel.h in targeted zero-day attacks. Una vulnerabilidad no especificada en Microsoft Excel 2000, XP, 2003 y 2004 para Mac, y posiblemente otros productos de Office, permite a atacantes asistidos por el usuario ejecutar código arbitrario por medio de vectores de ataque desconocidos, como es demostrado por el archivo Exploit-MSExcel.h en ataques de día cero dirigidos. • http://osvdb.org/31901 http://secunia.com/advisories/24008 http://securitytracker.com/id?1017584 http://vil.nai.com/vil/content/v_141393.htm http://www.avertlabs.com/research/blog/?p=191 http://www.kb.cert.org/vuls/id/613740 http://www.microsoft.com/technet/security/advisory/932553.mspx http://www.securityfocus.com/bid/22383 http://www.us-cert.gov/cas/techalerts/TA07-044A.html http://www.vupen.com/english/advisories/2007/0463 https://docs.microsoft.com •

CVSS: 9.3EPSS: 10%CPEs: 5EXPL: 0

Unspecified vulnerability in the Brazilian Portuguese Grammar Checker in Microsoft Office 2003 and the Multilingual Interface for Office 2003, Project 2003, and Visio 2003 allows user-assisted remote attackers to execute arbitrary code via crafted text that is not properly parsed. Vulnerabilidad no especificada en Brazilian Portuguese Grammar Checker en Microsoft Office 2003 y el Multilingual Interface para Office 2003, Project 2003, y Visio 2003 permite a un atacante remoto con la intervención de un usuario ejecutar código de su elección analizando sintacticamente texto manipulado. • http://secunia.com/advisories/23671 http://securitytracker.com/id?1017486 http://www.osvdb.org/31251 http://www.securityfocus.com/archive/1/457274/100/0/threaded http://www.securityfocus.com/bid/21942 http://www.vupen.com/english/advisories/2007/0102 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-001 •

CVSS: 9.3EPSS: 83%CPEs: 9EXPL: 0

Unspecified vulnerability in mso.dll in Microsoft Office 2000, XP, and 2003, and Microsoft PowerPoint 2000, XP, and 2003, allows remote user-assisted attackers to execute arbitrary code via a malformed record in a (1) .DOC, (2) .PPT, or (3) .XLS file that triggers memory corruption, related to an "array boundary condition" (possibly an array index overflow), a different vulnerability than CVE-2006-3434, CVE-2006-3650, and CVE-2006-3868. Vulnerabilidad no especificada en el mso.dll de Microsoft Office 2000, XP y 2003 y para el Microsoft PowerPoint 2000, XP y 2003, permite a atacantes remotos con la complicidad del usuario ejecutar código de su elección mediante un registro mal formado en ficheros (1) .DOC, (2) .PPT o (3) .XLS lo que dispara una corrupción de memoria relacionado con "la condición de límite del array" (posiblemente un desbordamiento del índice del array), una vulnerabilidad diferente que CVE-2006-3434, CVE-2006-3650, y CVE-2006-3868. • http://secunia.com/advisories/22339 http://securitytracker.com/id?1017034 http://secway.org/advisory/AD20061010.txt http://support.microsoft.com/kb/922581 http://www.kb.cert.org/vuls/id/176556 http://www.osvdb.org/29429 http://www.securityfocus.com/archive/1/448268/100/0/threaded http://www.securityfocus.com/archive/1/449179/100/0/threaded http://www.securityfocus.com/bid/20384 http://www.vupen.com/english/advisories/2006/3981 https://docs.microsoft.com/en-us& • CWE-94: Improper Control of Generation of Code ('Code Injection') •