Microsoft 검색 결과, 52
Microsoft Windows animated cursors buffer overflow
I. Description A stack buffer overflow exists in the code that Microsoft Windows uses to processes animated cursor files. Specifically, Microsoft Windows fails to properly validate the size of an animated cursor file header supplied in animated cursor files. Animated cursor files can be included with HTML files. For instance, a web site can use an animated cursor file to specify the icon that th..Microsoft Windows Cursor and Icon Format Handling Remote Code Execution Vulnerability
A vulnerability has been identified in Microsoft Windows, which could be exploited by remote attackers to take complete control of an affected system. This issue is due to a memory corruption error when rendering malformed cursors, animated cursors or icons, which could be exploited by remote attackers to execute arbitrary commands by tricking a user into visiting a malicious web page or viewing..Microsoft Windows Web Proxy Automatic Discovery (WPAD) Traffic Routing Vulnerability
A vulnerability has been identified in Microsoft Windows, which could be exploited by malicious users to gain knowledge of sensitive information. This issue is due to a design error where the Web Proxy Autodiscovery Protocol (WPAD) is used (by default) without static WPAD entries, which could be exploited by attackers on a local network segment to force WPAD clients (e.g. Internet Explorer) to r..Microsoft Virtual PC 2007 1.0 (2/19/2007)
Overview Save time and money as Virtual PC allows you to maintain the compatibility of legacy and custom applications during migration to new operating systems and increases the efficiency of support, development, and training staffs. With Microsoft® Virtual PC 2007, you can create and run one or more virtual machines, each with its own operating system, on a single computer. This provides you w..Microsoft Word Document Handling Memory Corruption and Code Execution Vulnerability
A vulnerability has been identified in Microsoft Word, which could be exploited by attackers to take complete control of an affected system. This issue is due to a memory corruption error when handling a malformed document, which could be exploited by attackers to execute arbitrary commands by tricking a user into opening a specially crafted Word document. Affected Products Microsoft Office 2000..Microsoft Internet Explorer Multiple Remote Code Execution Vulnerabilities (MS07-016)
Multiple vulnerabilities have been identified in Microsoft Internet Explorer, which could be exploited by attackers to take complete control of an affected system. The first issue is due to a memory corruption error when instantiating the "Imjpcksid.dll" COM object as an ActiveX control, which could be exploited by remote attackers to execute arbitrary commands by tricking a user into visiting a..