This documented vulnerability allows a remote attacker to execute malicious code or access to a part of the dynamically allocated memory using a user interaction visiting a Web page or open a specially crafted SWF file, an attacker is able to create an "out of bound" memory corruption. A file with an "ActionRecord" structure that contains an invalid value in "ActionGetURL2" could lead to remote code execution in the context of the current user. Proof of concept code included.
a82caebb5c5fc9804ff5b2892d98866fc05cb593b2b4a76497466e64a24e0c5a
Cisco Webex Player version T29.10 suffers from a .wrf use-after-free memory corruption vulnerability.
e0ff7bc989af814b4c67fc1a215c0c9c5b753220fb884757fa81ba1faab1c1c4
Cisco Webex Player version T29.10 suffers from a .arf out-of-bounds memory corruption vulnerability.
a011619db8c6fd4ad93cbef076bea08ee8225e2099c8f79385d859e2926070b0
Adobe Flash Player version 23.0.0.162 suffers from a .swf ConstantPool critical memory corruption vulnerability.
b21e6f4153b4cfbee102aa28f303f491feffd16661307457dbafe88dcf09dcca
Microsoft Office Word 2013 and 2016 suffer from a sprmSdyaTop denial of service vulnerability as described in MS16-099.
1d08affda8ea6047713326103a60d74176d11268a3f9b5d83d8075f46d7fae20
Apple Quicktime versions prior to 7.7.79.80.95 suffer from .fpx and .psd file parsing memory corruption vulnerabilities. Multiple proof of concepts included.
75dc3f56f008a8dff11a4e6782315336b04b08630b92550374fb4ef2d5ccb3a4
Adobe Photoshop CC versions 16.1.1 (2015.1.1) and below and Bridge CC versions 6.1.1 and below suffer from multiple memory corruption vulnerabilities. Proof of concept files included.
c47fea6ad11b93329fb19de9eea9fb407d4dffd7dd33d618f48d7e6208f37393
WPS Office versions prior to 2016 suffer from a .xls heap memory corruption vulnerability.
476cf15eec088f70e8100ad310c3ea2867b0456828496bd8916bb8ae5071d3ea
WPS Office versions prior to 2016 suffer from a .ppt drawingContainer length header handling issue that leads to memory corruption.
a411e27867ca1ba40e37aa3138020d8f7128ac0da4a8986309e91e0f7b740381
WPS Office versions prior to 2016 suffer from a .doc handling heap memory corruption issue when dealing with an invalid value in the OneTableDocumentStream data section.
76a44964834b2694d4565f55fc042db4605bc079d54cd337da01eb554b69d3ea
WPS Office versions prior to 2016 suffer from a .ppt handling heap memory corruption vulnerability.
c923f6074303a0b1c0816b423632b29ed089c5110ee83b92336cde422deca0ad
VLC Media Player version 2.2.1 suffers from a heap memory corruption vulnerability when handling malformed mp4 files.
43dc83338e58a0b5197ace97ec0c305748e3b03d919076f55f3174e828eb1787
Foxit Reader versions 7.1.3.320 and below suffer from a pdf parsing memory corruption vulnerability.
bd04944c6132e51165de2cd47879e4605bc439659bd47936955cab36552e79aa
An error when handling LZWMinimumCodeSize can be exploited to cause memory corruption via a specially crafted GIF file in Foxit products.
f0c85a37d1c0b5a864932883f936775184d1bcb3b408cff939fbe3ce6e6c3926
An error when handling the Size member of a GIF DataSubBlock data structure can be exploited to cause memory corruption via a specially crafted GIF file in Foxit products.
2facc4e061e1780dcb0bd1fda6ce9fa298d7501977716091944f0a23ec52e6d6
Microsoft Windows suffers from a text services related memory corruption vulnerability as outlined in MS-15-020.
0ecbc49866334b3e8e307ae1fa0c605feb34a13137c5fbe89d520c89305150fc
Oracle Outside-In suffers from a memory corruption vulnerability when parsing docx files.
79fc87eb887121eb743d08718db0785e9a718662ed4993f3ba621df1404086ad
This Metasploit module exploits a stack buffer overflow in Cool PDF Reader prior to version 3.0.2.256. The vulnerability is triggered when opening a malformed PDF file that contains a specially crafted image stream. This Metasploit module has been tested successfully on Cool PDF 3.0.2.256 over Windows XP SP3 and Windows 7 SP1.
b2cb27956204683b3f3b2b5177e1be282a14b7dbbf83dcb82f490a969c5a32f1
An overflow error occurs in GroupWise Internet Agent (gwia.exe) when the LDAP service process receives an overly long BIND Request. Successful exploitation may allow execution of arbitrary code. Versions 8.0.2 HP3 and 2012 are affected. Proof of concept code included.
98eedb4ebf1ead9211c4ee8e6803edef89885b9d7e3884dac106b273c25e0aa7
IrfanView version 4.33 suffers from a RLE image decompression buffer overflow vulnerability. Proof of concept included.
c7280f0bbcb5f8e1f959afbe12d0a3869c8de4db879212848a1273b635432924
IrfanView version 4.33 suffers from a TIF image decompression buffer overflow vulnerability. Proof of concept included.
72b8882cb0faee2b7373d6e6e4b71c5ed206922b7475df22542144a2d004de0d
Cyme ChartFX client server suffers from a vulnerability that is caused due to an indexing error in the "ShowPropertiesDialog()" method (ChartFX.ClientServer.Core.dll) of the ChartFX ActiveX Control. This can be exploited to write a single byte value to an arbitrary memory location via the "pageNumber" parameter. Successful exploitation may allow execution of arbitrary code.
5710bd2cdef00b1beebd3eb5db71e3e75a63f51295473d4c9d8eb9549ef60db6
Novell Groupwise versions 8.0.2 HP3 and 2012 suffers from an integer overflow vulnerability.
f82e2a8cfbd871bf746381353b9d597a48d059ad35b2d45116b4b230fc917e0f
Adobe Photoshop CS6 version 13.x suffers from a PNG parsing heap overflow vulnerability. Proof of concept PNG file include.
80a53ff72f5790f602424285c5a3993b1990d8e6e206c276ea6e96b7e79484e5
Oracle Outside-In FPX file parsing suffers from a heap overflow vulnerability. Proof of concept included.
3ffbb6827d9d2382b9a76b9305e37a7d6d37e039b353eabc680e393957f21ada