Microsoft Word Bulleted List Handling Remote Memory Corruption Vulnerability

The following proof-of-concept exploits are available:


 

Privacy Statement
Copyright 2010, SecurityFocus