![]() ![]() wps file with crafted section length headers, aka "Microsoft Works File Converter Input Validation Vulnerability." Wkcvqd01.dll in Microsoft Works 6 File Converter, as used in Office 2003 SP2, Works 8.0, and Works Suite 2005, allows remote attackers to execute arbitrary code via a. Microsoft Exchange Server 2000 SP3, 2003 SP1 and SP2, and 2007 does not properly decode certain MIME encoded e-mails, which allows remote attackers to execute arbitrary code via a crafted base64-encoded MIME e-mail message. Microsoft Word in Office 2000 SP3, XP SP3, Office 2003 SP2, Works Suite 2004 to 2006, and Office 2004 for Mac does not correctly check the properties of certain documents and warn the user of macro content, which allows user-assisted remote attackers to execute arbitrary code. A Remote Code Execution Vulnerability exists in Joomla! vBizz which allows an attacker to execute code remotely. Joomla! vBizz Remote Code Execution Vulnerability. An attacker can redirect a user to a malicious website and launch further attacks. ![]() Joomla is prone to a Host Header Injection Vulnerability. Joomla Host Header Injection Vulnerability. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |