|Paid content will be excluded from the download.
| Matches : 6919
|The host is installed with Adobe Presenter 6 or 7 before 7.0.1 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to handle vectors involving viewer.swf and loadflash.js. Successful exploitation allows attackers to inject arbitrary web script or HTML.
The host is installed with Microsoft Word 2003 SP3 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle objects in memory while parsing specially crafted Office files. Successful exploitation allows attackers to execute arbitrary code via a crafted document.
The host is installed with Google Chrome Frame plugin before 26.0.1410.28 and is prone to denial of service vulnerability. The flaw is present in the Hook_Terminate function in chrome_frame/protocol_sink_wrap.cc, which does not properly handle attach tab requests. Successful exploitation allows remote attackers to cause a denial of service via an _blank value for the target attribute of an A eleme ...
The host is installed with McAfee Virtual Technician and ePO-MVT and is prone to privelege escalation vulnerability. A flaw is present in the application, which fails to handle arguments to the save method. Successful exploitation allows attackers to execute arbitrary code.
Internet Explorer 5.5 and earlier allows remote attackers to obtain the physical location of cached content and open the content in the Local Computer Zone, then use compiled HTML help (.chm) files to execute arbitrary programs.
Vulnerabilities in RPC servers in (1) Microsoft Exchange Server 2000 and earlier, (2) Microsoft SQL Server 2000 and earlier, (3) Windows NT 4.0, and (4) Windows 2000 allow remote attackers to cause a denial of service via malformed inputs.
The MIDL_user_allocate function in the Microsoft Distributed Transaction Coordinator (MSDTC) proxy (MSDTCPRX.DLL) allocates a 4K page of memory regardless of the required size, which allows attackers to overwrite arbitrary memory locations using an incorrect size value that is provided to the NdrAllocate function, which writes management data to memory outside of the allocated buffer.
IIS 4.0 and 5.0 allows remote attackers to read documents outside of the web root, and possibly execute arbitrary commands, via malformed URLs that contain UNICODE encoded characters, aka the "Web Server Folder Traversal" vulnerability.
Vulnerabilities in the SNMPv1 request handling of a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via (1) GetRequest, (2) GetNextRequest, and (3) SetRequest messages, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. T ...
'As Service Packs released by Microsft mature, earlier versions and releases become unspported. This equates to a cessation in software and security patches for that baseline. Using an unsupported version of Windows represents a severe security risk.'
Pages:      Start    680    681    682    683    684    685    686    687    688    689    690    691    ..   691
© 2013 SecPod Technologies