[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14857 Download | Alert*

The host is installed with Google Chrome before 45.0.2454.85 and is prone to a same-origin-policy bypass vulnerability. A flaw is present in the application, which fails to properly check whether a node is expected. Successful exploitation allows remote attackers to bypass the Same Origin Policy or cause a denial of service.

The host is installed with Adobe Reader and Acrobat and is prone to library-loading vulnerability. A flaw is present in the applications, which fail to directly specify a fully qualified path to a dynamic-linked library (DLL). Successful exploitation allows attackers to execute arbitrary code on the system using a specially-crafted library.

The host is installed with Windows Media Center on Microsoft Windows Vista, 7, 8 or 8.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted Media Center link (.mcl) file that references malicious code. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user.

The host is installed with Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, Windows 8.1 or Windows Server 2012 R2 and is prone to a task file deletion elevation of privilege vulnerability. A flaw is present in the application, which fails to properly verify certain file system interactions. Successful exploitation could allow attackers ...

The host is installed with Microsoft Excel 2007, 2010, Excel Viewer 2007 or Office Compatibility Pack and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fails to properly handle a specially crafted file. Successful exploitation could allow attackers to execute arbitrary code in the context of the current user.

The host is installed with Microsoft Excel 2007, 2010, Excel Viewer 2007 or Office Compatibility Pack and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fails to properly handle a specially crafted file. Successful exploitation could allow attackers to execute arbitrary code in the context of the current user.

The host is installed with Microsoft Excel 2007, 2010, 2013, Excel Viewer 2007 or Office Compatibility Pack and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fails to properly handle a specially crafted file. Successful exploitation could allow attackers to execute arbitrary code in the context of the current user.

The host is installed with Microsoft Office 2007, 2010 or 2013 and is prone to a malformed EPS file vulnerability. A flaw is present in the applications, which fails to properly handle a specially crafted EPS file. An attacker who successfully exploited this vulnerability could take control of the affected system.

The host is installed with Microsoft SharePoint Foundation 2013 and is prone to a XSS spoofing vulnerability. A flaw is present in the application, which fails to properly sanitize user-supplied web requests. An attacker who successfully exploited this vulnerability could perform persistent cross-site scripting attacks and run script (in the security context of the logged-on user) with malicious c ...

The host is installed with Lync Server 2013 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly sanitize specially crafted content. An attacker who successfully exploited this vulnerability could potentially execute scripts in the users browser to obtain information from web sessions.


Pages:      Start    1211    1212    1213    1214    1215    1216    1217    1218    1219    1220    1221    1222    1223    1224    ..   1485

© SecPod Technologies