[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252588

 
 

909

 
 

196930

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26675 Download | Alert*

The host is installed with Microsoft Windows Server 2003, Server 2008, Server 2008 R2, Server 2012 or Server 2012 R2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle specially crafted username strings. Successful exploitation could allow attackers to send specially crafted username strings to an Internet Authentication Service (IAS) or ...

The host is installed with Microsoft Office 2007 SP3, Excel 2007 SP3, PowerPoint 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Office 2013 Gold or SP1, Word 2013 Gold or SP1, Office 2013 RT Gold or SP1, Word 2013 RT Gold or SP1, Excel Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Excel Services on Sha ...

The host is installed with Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 Gold or SP1, Word 2013 RT Gold or SP1, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 Gold or SP1, Web Applications 2010 SP2 or Web Apps Server 2013 Gold or SP1 and is prone to a remote code execution v ...

The host is installed with Microsoft Excel 2007 SP3, PowerPoint 2007 SP3, Word 2007 SP3, Excel 2010 SP2, PowerPoint 2010 SP2 or Word 2010 SP2 and is prone to a remote code execution vulnerability. A flaw is present in the applications, which fail to handle a crafted file. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Internet Explorer 6, 7, 8, 9 or 10 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly process a webpage. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service via a crafted web site.

The host is installed with XnView 1.98.2 or earlier and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted file containing PSD record types. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with XnView 1.98.2 or earlier and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted file containing PSD record types. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with IBM Tivoli Directory Server (TDS) 6.1 before 6.1.0.47 or 6.2 before 6.2.0.22 or 6.3 before 6.3.0.11 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed LDAP paged search request. Successful exploitation allows remote attackers to cause the application to crash.

The host is installed with xArrow before 3.4.1 and is prone to out-of-bounds read vulnerability. A flaw is present in the application, which reads data from a memory location that is outside the intended boundary of buffer. Successful exploitation allows remote attackers to execute arbitrary code via unspecified vectors.

The host is installed with xArrow before 3.4.1 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to perform proper bounds check. Successful exploitation allows remote attackers to execute arbitrary code via a crafted packet that triggers an out-of-bounds read operation.


Pages:      Start    2612    2613    2614    2615    2616    2617    2618    2619    2620    2621    2622    2623    2624    2625    ..   2667

© SecPod Technologies