[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31422 Download | Alert*

Windows Terminal Remote Code Execution Vulnerability. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

The host is installed with HP Managed Printing Administration before 2.6.4 and is prone to a directory traversal vulnerability. The flaw is present in the application, which fails to handle MPAUploader.Uploader.1.UploadFiles function. Successful exploitation allows attackers to create arbitrary files.

The host is installed with HP Managed Printing Administration before 2.6.4 and is prone to a stack-based buffer overflow vulnerability. The flaw is present in the application, which fails to handle long filename parameter in an uploadfile action to Default.aspDefault.asp. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with HP Managed Printing Administration before 2.6.4 and is prone to a directory traversal vulnerability. The flaw is present in the application, which fails to handle crafted form data in hpmpa/jobDelivery/Default.asp files. Successful exploitation allows remote attackers to create arbitrary files.

The host is installed with HP Managed Printing Administration before 2.6.4 and is prone to a unspecified vulnerability. The flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to obtain sensitive information, modify data, or cause a denial of service.

The host is installed with Microsoft Windows Server 2008, Server 2008 R2 or Server 2012 and is prone to information disclosure vulnerability. A flaw is present in the application, which is caused when an Active Directory Federation Services instance exposes account information through an open endpoint. Successful exploitation allows attackers to reveal information pertaining to the service account ...

The host is installed with Windows Defender for Microsoft Windows 8 and is prone to elevation of privilege vulnerability. A flaw is present in the application, which is caused when improper pathnames are used by the Microsoft Antimalware Client. Successful exploitation allows attackers to execute arbitrary code in the security context of the LocalSystem account and take complete control of the sys ...

Stack-based buffer overflow in nsum.exe in the Windows Media Unicast Service in Media Services for Microsoft Windows 2000 Server SP4 allows remote attackers to execute arbitrary code via crafted packets associated with transport information, aka "Media Services Stack-based Buffer Overflow Vulnerability."

mso.dll, as used by Microsoft PowerPoint 2000 through 2003, allows user-assisted attackers to execute arbitrary commands via a malformed shape container in a PPT file that leads to memory corruption, as exploited by Trojan.PPDropper.B, a different issue than CVE-2006-1540 and CVE-2006-3493.

Unspecified vulnerability in Microsoft PowerPoint 2000 through 2003, possibly a buffer overflow, allows user-assisted remote attackers to execute arbitrary commands via a malformed record in the BIFF file format used in a PPT file, a different issue than CVE-2006-1540, aka "Microsoft PowerPoint Malformed Record Vulnerability."


Pages:      Start    1735    1736    1737    1738    1739    1740    1741    1742    1743    1744    1745    1746    1747    1748    ..   3142

© SecPod Technologies