[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 7345 Download | Alert*

The host is installed with Sun JDK or JRE 6 Update 10 or earlier, 5.0 Update 16 or earlier or 1.4.2_18 or earlier and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allows attackers to cause local files to be displayed in the browser of the user of the untrusted application.

The host is installed with Sun JDK or JRE 6 Update 10 or earlier, 5.0 Update 16 or earlier or 1.4.2_18 or earlier and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation could allows attackers to make unauthorized network connections and hijack HTTP sessions.

The host is installed with Sun JDK or JRE 6 Update 10 or earlier, 5.0 Update 16 or earlier or 1.4.2_18 or earlier and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allows attackers to read arbitrary files and make unauthorized network connections.

The host is installed with Microsoft Office Compatibility Pack Service Pack 3, Office Word 2007 SP3 or Microsoft Office Word Viewer and is prone to a remote code execution vulnerability. A flaw is present in the applications, which fail to properly handle objects in memory while parsing specially crafted Office files. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Office Compatibility Pack Service Pack 3, Office Word 2007 SP3 or Microsoft Office Word Viewer and is prone to a remote code execution vulnerability. A flaw is present in the applications, which fail to properly handle objects in memory while parsing specially crafted Office files. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Office Compatibility Pack Service Pack 3, Office Word 2007 SP3 or Microsoft Office Word Viewer and is prone to a remote code execution vulnerability. A flaw is present in the applications, which fail to properly handle objects in memory while parsing specially crafted Office files. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with IBM HTTP Server 2.0.47 or lower and is prone to multiple cross site scripting vulnerabilities. The flaws are present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to inject arbitrary code.

The host is installed with IBM OpenAdmin Tool (OAT) before 2.72 for Informix and is prone to multiple cross site scripting vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to inject arbitrary code.

The host is installed with Microsoft Excel 2003 and is prone to record memory corruption vulnerability. A flaw is present in the application which is caused by a specially crafted Excel file. Successful exploitation allows remote attacker to install programs, view, change, or delete data, or create new accounts with full user rights and could take complete control of an affected system.

The host is installed with Microsoft Publisher 2003 and is prone to Invalid Pointer Vulnerability. A flaw is present in the application which is caused by a specially crafted Publisher file. Successful exploitation allows remote attacker to install programs, view, change, or delete data, or create new accounts with full user rights and could take complete control of an affected system.


Pages:      Start    694    695    696    697    698    699    700    701    702    703    704    705    706    707    ..   734

© SecPod Technologies