[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195521

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14857 Download | Alert*

The host is installed with Microsoft Excel 2003 ,Microsoft Excel 2007 ,Microsoft Office 2007 , Microsoft Excel 2010, Microsoft Excel Viewer , Microsoft Office Compatibility Pack, Excel Services installed on Microsoft Office SharePoint Server 2007, Excel Services installed on Microsoft Office SharePoint Server 2010 or Microsoft Excel Web App 2010 and is prone to a conditional expression parsing vul ...

The host is installed with Microsoft Excel 2003 ,Microsoft Excel 2007 ,Microsoft Office 2007 , Microsoft Excel 2010,Microsoft Excel Viewer, Microsoft Office Compatibility Pack , Excel Services installed on Microsoft Office SharePoint Server 2007 , Excel Services installed on Microsoft Office SharePoint Server 2010 or Microsoft Excel Web App 2010 and is prone to an out of bounds array indexing vuln ...

The host is installed with Adobe Flash Player before 10.2.152.26 and is prone to denial of service (memory corruption) vulnerability. A flaw is present in the application, which fails to avoid memory corruptions. Successful exploitation allows remote attackers to corrupt memory to execute arbitrary code on the system.

The host is installed with Microsoft Windows SharePoint Services 3.0 Service Pack 2 or SharePoint Foundation 2010 or SP1 and is prone to cross-site scripting vulnerability. A flaw is present in the applications which fails to properly validate user input. Successful exploitation allows remote attackers to gain privilege or disclose information.

The host is installed with Microsoft Office Web Apps 2010 or SP1 or Microsoft SharePoint Foundation 2010 or Microsoft Windows SharePoint Services 3.0 Service Pack 2 or Microsoft Groove Server 2010 or SP1 or Microsoft Office SharePoint Server 2010 or SP1 or Microsoft Office SharePoint Server 2007 SP2 or Microsoft Office Forms Server 2007 SP2 or Microsoft SharePoint Workspace 2010 or SP1 or Micros ...

The host is installed with Adobe Flash Player before 10.2.152.26 and is prone to denial of service (memory corruption) vulnerability. A flaw is present in the application, which fails to avoid memory corruptions. Successful exploitation allows remote attackers to corrupt memory to execute arbitrary code on the system.

The host is installed with Adobe Flash Player before 10.2.152.26 and is prone to denial of service (memory corruption) vulnerability. A flaw is present in the application, which fails to avoid memory corruptions. Successful exploitation allows remote attackers to corrupt memory to execute arbitrary code on the system.

The host is installed with Adobe Flash Player before 10.2.152.26 and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to load the libraries securely. Successful exploitation allows remote attackers to corrupt memory to execute arbitrary code on the system using a Trojan horse DLL in the current working directory.

The host is installed with Adobe Flash Player before 10.2.152.26 and is prone to denial of service (memory corruption) vulnerability. A flaw is present in the application, which fails to avoid memory corruptions. Successful exploitation allows remote attackers to corrupt memory to execute arbitrary code on the system.

The host is installed with Apple QuickTime before 7.7 and is prone to memory corruption vulnerability. A flaw is present in the application which is caused by improper bounds checking when handling mp4v codec information. Successful exploitation allows remote attackers to execute arbitrary code on the system or cause the application to crash.


Pages:      Start    1202    1203    1204    1205    1206    1207    1208    1209    1210    1211    1212    1213    1214    1215    ..   1485

© SecPod Technologies