CVE-2004-0549 | IE 6 | MS IE _ MSHTML IE6 | |
CVE-2005-0055 | IE 5, 6 | MS IE _ IE 5.01, 5.5, and 6 DHTML Method Heap Memory Corruption Vulnerability | |
CVE-2006-0003 | mdac | IE 6 | MS IE _MS06-014 for lE6/Microsoft Data Access Components (MDAC) Remote Code Execution |
CVE-2007-5659 /2008-0655 | collab, collectEmaillnfo | PDF < 8.1.1 | ADOBE PDF _Exploit -collab, collectEmaillnfo |
CVE-2008-2463 | m_Cor_n / MS Off Snapshot IE snapshot/ activexbundle | IE- MSAccess | MS OFFICE _M508-041 - MS Access Snapshot Viewer |
CVE-2009-2477 | Mozilla FF 3.5 / font tags | FF escape retval | FF < 3.5.1 | FIREFOX - Font tags | Firefox 3.5 escape() Return Value Memory Corruption |
CVE-2008-2992 | util.printf | PDF < 8.1.2 | ADOBE PDF _Exploit• util.printf |
CVE-2008-5353 | Java JRE/Javad0/Javado/Java Calendar/javaold/JavaSr0 | Java < 6u10 | JAVA _Javad0—JRECalendar Java Deserialize |
CVE-2009-0075/0076 | IE7 MEMCOR MS09-002 | IE 7 | MS IE _ MS09-002 - lE7 Memory Corruption |
CVE-2009-0927 | PDF collab.getIcon / pdf-gi | PDF < 9.1 | ADOBE PDF _ Exploit- collab.getlcon |
CVE-2009-1136 | spreadsheet | IE - MSOffice | MS OFFICE _ MSO9-043 - lE OWC Spreadsheet ActiveX control Memory Corruption |
CVE-2009-3867 | JAVA GSB | Java < 6u17 | JAVA _Runtime Env. getSoundBank Stack BOF |
CVE-2009-4324 | PDF mediaNewPlayer / pdf-mp | PDF < 9.3 | ADOBE PDF Exploit - docmedianewPlayer |
CVE-2010-0188 | PDF Libtiff / Lib | PDF < 9.3.1 | ADOBE PDF Exploit - LibTiff Integer Overflow |
CVE-2010-0094 | javarmi | Java < 6u18 | JAVA _ Runtime Environment component in Oracle Java SE |
CVE-2010-0806 | IEPeers msiemc | IE 7 | MS IE _ IEPeers Remote Code Execution IE7 Unitialized Memory Corruption |
CVE-2010-0840 | JAVA TC (?) javagetval OBE Java invoke / Java Trust | Java < 6u18 | JAVA _ Trusted Method Chaining - Java getValue Remote Code Execution |
CVE-2010-0842 | JAVA MIDI Java OBE | Java < 6u18 | JAVA 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 -via MIDI file with a crafted MixerSequencer object |
Wednesday, March 5, 2014
ExploitPackTable_2014
Subscribe to:
Post Comments (Atom)
How Malware Uses GetThreadContext() to Detect Debuggers – And How to Bypass It?
Introduction In the world of malware reverse engineering , understanding how malware detects debuggers is crucial. One of the most common ...

-
Introduction In the world of malware reverse engineering , understanding how malware detects debuggers is crucial. One of the most common ...
-
Discover the Best Papers on Reverse Engineering Reverse engineering has always been a fascinating and vital aspect of cybersecurity. Wheth...
No comments:
Post a Comment