WPS Office versions prior to 2016 suffer from a .ppt handling heap memory corruption vulnerability.
c923f6074303a0b1c0816b423632b29ed089c5110ee83b92336cde422deca0ad
This documented vulnerability allows a remote attacker to execute malicious code or access to a part of the dynamically allocated memory using a user interaction visiting a Web page or open a specially crafted SWF file, an attacker is able to create an "out of bound" memory corruption. A file with an "ActionRecord" structure that contains an invalid value in "ActionGetURL2" could lead to remote code execution in the context of the current user. Proof of concept code included.
a82caebb5c5fc9804ff5b2892d98866fc05cb593b2b4a76497466e64a24e0c5a
Cisco Webex Player version T29.10 suffers from a .wrf use-after-free memory corruption vulnerability.
e0ff7bc989af814b4c67fc1a215c0c9c5b753220fb884757fa81ba1faab1c1c4
Cisco Webex Player version T29.10 suffers from a .arf out-of-bounds memory corruption vulnerability.
a011619db8c6fd4ad93cbef076bea08ee8225e2099c8f79385d859e2926070b0
Adobe Flash Player version 23.0.0.162 suffers from a .swf ConstantPool critical memory corruption vulnerability.
b21e6f4153b4cfbee102aa28f303f491feffd16661307457dbafe88dcf09dcca
Microsoft Office Word 2013 and 2016 suffer from a sprmSdyaTop denial of service vulnerability as described in MS16-099.
1d08affda8ea6047713326103a60d74176d11268a3f9b5d83d8075f46d7fae20
Microsoft Office Word versions 2007, 2010, 2013, and 2016 suffer from an out-of-bounds read that allows for remote code execution. This vulnerability is noted in MS16-099.
5dc639df15fe3dfecdaa122d36769f8e5e3dee79723e21896bf758f96aa8f694
Apple Quicktime versions prior to 7.7.79.80.95 suffer from .fpx and .psd file parsing memory corruption vulnerabilities. Multiple proof of concepts included.
75dc3f56f008a8dff11a4e6782315336b04b08630b92550374fb4ef2d5ccb3a4
Adobe Photoshop CC versions 16.1.1 (2015.1.1) and below and Bridge CC versions 6.1.1 and below suffer from multiple memory corruption vulnerabilities. Proof of concept files included.
c47fea6ad11b93329fb19de9eea9fb407d4dffd7dd33d618f48d7e6208f37393
WPS Office versions prior to 2016 suffer from a .xls heap memory corruption vulnerability.
476cf15eec088f70e8100ad310c3ea2867b0456828496bd8916bb8ae5071d3ea
WPS Office versions prior to 2016 suffer from a .ppt drawingContainer length header handling issue that leads to memory corruption.
a411e27867ca1ba40e37aa3138020d8f7128ac0da4a8986309e91e0f7b740381
WPS Office versions prior to 2016 suffer from a .doc handling heap memory corruption issue when dealing with an invalid value in the OneTableDocumentStream data section.
76a44964834b2694d4565f55fc042db4605bc079d54cd337da01eb554b69d3ea
VLC Media Player version 2.2.1 suffers from a heap memory corruption vulnerability when handling malformed mp4 files.
43dc83338e58a0b5197ace97ec0c305748e3b03d919076f55f3174e828eb1787
A remotely exploitable vulnerability has been discovered that allows attackers who are already authenticated via cosign to assume the identity of an arbitrary user on a cosign-protected service. Organizations that run their own central cosign weblogin server should upgrade their weblogin server to cosign 2.0.2a, cosign 1.9.4b, or back-port the patch available at http://weblogin.org/download.html to the version of cosign they are running.
9d3384ebd5ec682d699cff4c928f3b744c5e0e5409c6ed578391f6575dfe6c90
A remotely exploitable vulnerability has been discovered that allows attackers to bypass cosign weblogin server authentication and assume the identity of an arbitrary user on a cosign-protected service. Organizations that run their own central cosign weblogin server should upgrade their weblogin server to cosign 2.0.2a, cosign 1.9.4b, or back-port the patch available at http://weblogin.org/download.html to the version of cosign they are running.
2a8d0ff9981290825587f63a0115fe1f88cd7ec7295e11fe261a0bc411f517c9