Total
11 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-2795 | 1 Marklogic | 1 Marklogic | 2024-02-04 | 6.8 MEDIUM | 8.6 HIGH |
An exploitable heap corruption vulnerability exists in the Txo functionality of Antenna House DMC HTMLFilter as used by MarkLogic 8.0-6. A specially crafted xls file can cause a heap corruption resulting in arbitrary code execution. An attacker can send/provide malicious XLS file to trigger this vulnerability. | |||||
CVE-2017-2792 | 1 Marklogic | 1 Marklogic | 2024-02-04 | 6.8 MEDIUM | 9.6 CRITICAL |
An exploitable heap corruption vulnerability exists in the iBldDirInfo functionality of Antenna House DMC HTMLFilter used by MarkLogic 8.0-6. A specially crafted xls file can cause a heap corruption resulting in arbitrary code execution. An attacker can provide a malicious xls file to trigger this vulnerability. | |||||
CVE-2016-8384 | 1 Marklogic | 1 Marklogic | 2024-02-04 | 6.8 MEDIUM | 8.8 HIGH |
An exploitable heap corruption vulnerability exists in the DHFSummary functionality of AntennaHouse DMC HTMLFilter. | |||||
CVE-2016-8382 | 1 Marklogic | 1 Marklogic | 2024-02-04 | 6.8 MEDIUM | 8.8 HIGH |
An exploitable heap corruption vulnerability exists in the Doc_SetSummary functionality of AntennaHouse DMC HTMLFilter. A specially crafted doc file can cause a heap corruption resulting in arbitrary code execution. An attacker can send a malicious doc file to trigger this vulnerability. | |||||
CVE-2016-8383 | 1 Marklogic | 1 Marklogic | 2024-02-04 | 6.8 MEDIUM | 8.8 HIGH |
An exploitable heap corruption vulnerability exists in the Doc_GetFontTable functionality of AntennaHouse DMC HTMLFilter. A specially crafted doc file can cause a heap corruption resulting in arbitrary code execution. An attacker can send/provide malicious doc file to trigger this vulnerability. | |||||
CVE-2017-2794 | 1 Marklogic | 1 Marklogic | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable stack-based buffer overflow vulnerability exists in the DHFSummary functionality of AntennaHouse DMC HTMLFilter as used by MarkLogic 8.0-6. A specially crafted PPT file can cause a stack corruption resulting in arbitrary code execution. An attacker can send/provide malicious PPT file to trigger this vulnerability. | |||||
CVE-2017-2797 | 1 Marklogic | 1 Marklogic | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable heap overflow vulnerability exists in the ParseEnvironment functionality of AntennaHouse DMC HTMLFilter as used by MarkLogic 8.0-6. | |||||
CVE-2017-2799 | 1 Marklogic | 1 Marklogic | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable heap corruption vulnerability exists in the AddSst functionality of Antenna House DMC HTMLFilter as used by MarkLogic 8.0-6. A specially crafted XLS file can cause a heap corruption resulting in arbitrary code execution. An attacker can send or provide a malicious XLS file to trigger this vulnerability. | |||||
CVE-2017-2793 | 1 Marklogic | 1 Marklogic | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable heap corruption vulnerability exists in the UnCompressUnicode functionality of Antenna House DMC HTMLFilter used by MarkLogic 8.0-6. A specially crafted xls file can cause a heap corruption resulting in arbitrary code execution. An attacker can send/provide malicious XLS file to trigger this vulnerability. | |||||
CVE-2017-2798 | 1 Marklogic | 1 Marklogic | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable heap corruption vulnerability exists in the GetIndexArray functionality of Antenna House DMC HTMLFilter as used by MarkLogic 8.0-6. A specially crafted XLS file can cause a heap corruption resulting in arbitrary code execution. An attacker can send or provide a malicious XLS file to trigger this vulnerability. | |||||
CVE-2017-2783 | 1 Marklogic | 1 Marklogic | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable heap corruption vulnerability exists in the FillRowFormat functionality of Antenna House DMC HTMLFilter that is shipped with MarkLogic 8.0-6. A specially crafted xls file can cause a heap corruption resulting in arbitrary code execution. An attacker can send/provide malicious xls file to trigger this vulnerability. |