exploit the possibilities
Showing 1 - 1 of 1 RSS Feed

Files

Zero Day Initiative Advisory 10-103
Posted Jun 9, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-103 - This particular vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Excel. User interaction is required in that a target must visit a malicious page or open a malicious file. The specific flaw exists in the parsing of DBQueryExt records in an Excel spreadsheet. Due to the lack of checking when parsing particular fields within the structure, it is possible to get a user-controlled pointer to be called. Successful exploitation can lead to remote code execution under the credentials of the currently logged in user.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2010-1253
MD5 | 519a1db26fddcc60c0d4bec856b1352d
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Skylight Cyber Bypasses Cylance AI
Posted Jul 18, 2019

tags | headline, hacker, flaw
No, You Don't Need A Burner Phone At A Hacking Conference
Posted Jul 18, 2019

tags | headline, hacker, privacy, phone, conference
US Senator Asks FBI To Investigate FaceApp
Posted Jul 18, 2019

tags | headline, government, privacy, usa, russia, cyberwar
Microsoft Warns 10,000 Customers They're Targeted By Nation States
Posted Jul 18, 2019

tags | headline, hacker, government, microsoft, cyberwar
Slack Resets Passwords For 1% Of Its Users Because Of 2015 Hack
Posted Jul 18, 2019

tags | headline, hacker, data loss, password
Unofficial Telegram App Secretly Loads Malicious Sites
Posted Jul 17, 2019

tags | headline, malware, phone
Bluetooth Exploit Can Track And Identify Mobile Device Users
Posted Jul 17, 2019

tags | headline, privacy, wireless, spyware
Elon Musk Reveals Brain Hacking Plans
Posted Jul 17, 2019

tags | headline, hacker, science
JetBlue Bomb Scare Set Off With Apple AirDrop
Posted Jul 17, 2019

tags | headline, apple, terror
MyDashWallet Compromised For Two Months, Wallet Keys Taken
Posted Jul 16, 2019

tags | headline, cybercrime, data loss, fraud, cryptography
View More News →
packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close