[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14850 Download | Alert*

The host is installed with Microsoft Groove 2007 Service Pack 2 and is prone to remote code execution vulnerability. A flaw is present in the application, which incorrectly restricts the path used for loading external libraries. Successful exploitation allow remote attackers to run arbitrary code as logged-on user.

The host is installed with Microsoft Visio 2007 or 2010 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft SharePoint Server 2010, 2013, Foundation 2013, Office Web Apps 2010 or Web Apps Server 2013 and is prone to a XSS spoofing vulnerability. A flaw is present in the applications, which fail to properly sanitize a specially crafted request. Successful exploitation could allow attackers to update is required to fix multiple remote code execution vulnerabilities. Th ...

The host is installed with Sharepoint Server 2013 or Sharepoint Foundation 2013 and is prone to a security feature bypass vulnerability. A flaw is present in the applications, which fail to properly enforce the appropriate permission level for an application or user. Successful exploitation could allow attackers to perform persistent cross-site scripting attacks and run script.

The host is installed with Microsoft SharePoint Server 2007 or 2010 and is prone to an information disclosure vulnerability. A flaw present in the applications, which fail to properly parse the Document Type Definition (DTD) of an XML file. Successful exploitation could allow attackers to browse the contents of arbitrary files on a SharePoint server.

The host is installed with Internet Explorer 10 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly access objects in memory. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user.

The host is installed with OpenSSH 6.6 and earlier and is prone to a security bypass vulnerability. A flaw is present in key_certify function which, fails to properly handle an unacceptable HostCertificate. Successful exploitation allows remote servers to trigger the skipping of SSHFP DNS RR checking.

The host is installed with Python 2.x before 2.7.9 and 3.x before 3.4.3 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to handle an arbitrary valid certificate. Successful exploitation could allow attackers to spoof SSL servers.

The host is installed with Google Chrome before 46.0.2490.71 and is prone to a Same Origin Policy bypass vulnerability. A flaw is present in the application, which fails to handle crafted JavaScript code. Successful exploitation could allow attackers to bypass same origin policy.

The host is installed with Google Chrome before 46.0.2490.71 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a focused annotation in a PDF document. Successful exploitation could allow attackers to crash the service.


Pages:      Start    1221    1222    1223    1224    1225    1226    1227    1228    1229    1230    1231    1232    1233    1234    ..   1484

© SecPod Technologies