[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254202

 
 

909

 
 

198060

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31515 Download | Alert*

The host is installed with Microsoft SharePoint Server 2010 or SharePoint Foundation 2010 and is prone to elevation of privilege vulnerability. A flaw is present in the applications, which fail to properly handle malicious JavaScript elements contained within a specially crafted URL. Successful exploitation allows attackers to potentially issue SharePoint commands in the context of an authenticate ...

The host is installed with Microsoft SharePoint Server 2007 or 2010 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly validate search scope permissions. Successful exploitation allows attackers to view or tamper with other users' search scopes.

The host is installed with Microsoft SharePoint Server 2010 or SharePoint Foundation 2010 and is prone to cross-site scripting vulnerability. A flaw is present in the applications, which fail to properly handle malicious JavaScript elements contained within a specially crafted URL. Successful exploitation allows attackers to potentially issue SharePoint commands in the context of an authenticated ...

The host is installed with Microsoft SharePoint Server 2007 and is prone to spoofing vulnerability. A flaw is present in the application, which fails to properly validate specially crafted URLs. Successful exploitation allows attackers to redirect a user to an external URL.

The host is installed with Microsoft SharePoint Server 2007 or SharePoint Services 3.0 or SharePoint Foundation 2010 and is prone to cross-site scripting vulnerability. A flaw is present in the applications, which fail to properly handle malicious JavaScript elements contained within a specially crafted URL. Successful exploitation allows attackers to potentially issue SharePoint commands in the ...

The host is installed with Microsoft Windows XP and is prone to elevation of privilege vulnerability. A flaw is present in the application, which is caused by a race condition when specific types of threads are created. Successful exploitation allows attackers to execute remote code.

The host is installed with Microsoft Windows XP or Windows Server 2003 or Windows Vista or Windows Server 2008 or R2 or Windows 7 and is prone to elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle TrueType font loading. Successful exploitation allows attackers to execute remote code.

The host is installed with Microsoft Windows XP or Windows Server 2003 or Windows Vista or Windows Server 2008 or R2 or Windows 7 and is prone to elevation of privilege vulnerability. A flaw is present in the application, which fails to properly validate input passed from user mode. Successful exploitation allows attackers to execute remote code.

The host is installed with Microsoft Windows XP or Windows Server 2003 or Windows Vista or Windows Server 2008 or R2 or Windows 7 and is prone to elevation of privilege vulnerability. A flaw is present in the application, which fails to properly validate input passed from user mode. Successful exploitation allows attackers to execute remote code.

The host is installed with Internet Explorer 6 through 9 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle an object that has been deleted. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1512    1513    1514    1515    1516    1517    1518    1519    1520    1521    1522    1523    1524    1525    ..   3151

© SecPod Technologies