[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80130

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8352 Download | Alert*

A spoofing vulnerability exists when Microsoft Outlook for MAC does not properly handle the encoding and display of email addresses. This improper handling and display may cause antivirus or antispam scanning to not work as intended. To exploit the vulnerability, an attacker could send a specially crafted email attachment to a user in an attempt to launch a social engineering attack, such as phish ...

An Office RTF remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle RTF files. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker co ...

A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then in ...

A remote code execution vulnerability exists in the way that Microsoft Outlook parses specially crafted email messages. An attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Exploitation of this vulnerability requires that a user open a s ...

A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then in ...

The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate. Successful exploitation allows man-in-the-middle attackers to spoof arbitrary SSL servers.

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.2 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted interval specification. Successful exploitation allows remote attackers to crash the service.

The host is installed with Adobe Flash Player before 11.7.700.257 or 11.8.x before 11.9.900.170 or Adobe AIR before 3.9.0.1380 and is prone to type confusion vulnerability. A flaw is present in the applications, which fail to handle crafted .swf content. Successful exploitation allows attackers to execute remote code.

The host is installed with Adobe Flash Player before 11.7.700.257 or 11.8.x before 11.9.900.170 or Adobe AIR before 3.9.0.1380 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to handle memory. Successful exploitation allows attackers to execute remote code.

The host is installed with Apple Mac OS X or Server 10.7.5, OS X 10.8.5 or OS X 10.9.2 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the conversion of a string to a floating point value. Successful exploitation allows attackers to cause an unexpected application termination or arbitrary code execution.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   835

© 2013 SecPod Technologies