Computer Security
[EN] securityvulns.ru no-pyccku


See also
  QUEST : vWorkspace 7.5
  MICROSOFT : Works 9
  SYMANTEC : Norton SystemWorks 2008
  SYMANTEC : Norton SystemWorks 2007
  CISCO : CiscoWorks Common Services 3.2
  CISCO : CiscoWorks Common Services 3.1
  CISCO : CiscoWorks Common Services 3.0
  BREAKPOINT : Hex Workshop 6.0
  BREAKPOINT : Hex Workshop 5.1
  KASPERSKY : Kaspersky Antivirus for Workstations 6.0
  AVAST : Avast for Workstations 1.0
  CAPILANO : DesignWorks Professional 4.3
  SYMANTEC : Norton SystemWorks 2006
  MICROSOFT : Microsoft Help Workshop 4.03
  EIQNETWORKS : eIQnetworks Enterprise Security Analyzer 2.5
Name:MICROSOFT : Works 2002

9!Microsoft Word memory corruption
updated since 20.05.2006
document Malform—É–≤ object pointer memory corruption is used in-the-wild for malware distribution.
6!Microsoft Word Perfect convertor buffer overflow
updated since 04.09.2003
document Buffer overflow during Word Perfect document convertion.
8!Microsoft Visual Basic for Applications buffer overflow
updated since 04.09.2003
document Buffer overflow on opening macro document.
7!Microsoft Word macro protection bypass
   
                    

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod