[Forgot Password]
Login  Register Subscribe

24002

 
 

127027

 
 

102010

 
 

909

 
 

81380

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 11694 Download | Alert*

The host is installed with Lync Server 2010 or 2013 and is prone to a content sanitization vulnerability. A flaw is present in the application, which fails to fails to properly sanitize specially crafted content. Successful exploitation could allow attackers to potentially execute scripts in the users browser to obtain information from web sessions.

The host is installed with Microsoft FrontPage 2003 and is prone to a xml disclosure vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to disclose the contents of a file on a target system.

The host is installed with Microsoft Office 2013 and is prone to a microsoft office chinese grammar checking vulnerability. A flaw is present in the application, which does not properly validate the path used for loading external libraries. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Office 2013 and is prone to a token reuse vulnerability. A flaw is present in the application, which does not properly validate the path used for loading external libraries. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Office 2013 and is prone to a token hijacking vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted response while attempting to open an Office file hosted on the malicious website. Successful exploitation could allow attackers to ascertain access tokens used to authenticate the current user on a targeted ShareP ...

The host is installed with LibreOffice 4.1.4 before 4.2.5 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted Microsoft documents. Successful exploitation could allow attackers to unconditionally execute certain VBA macros.

The host is installed with Adobe Presenter 6 or 7 before 7.0.1 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to handle vectors involving viewer.swf and loadflash.js. Successful exploitation allows attackers to inject arbitrary web script or HTML.

The host is installed with Adobe Presenter 6 or 7 before 7.0.1 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to handle vectors involving viewer.swf and loadflash.js. Successful exploitation allows attackers to inject arbitrary web script or HTML.

The host is installed with VideoLAN VLC media player 0.5.0 before 1.0.6 and is prone to multiple heap-based buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a crafted byte stream to the (1) A/52, (2) DTS, or (3) MPEG Audio decoder. Successful exploitation could allow attackers to crash the service or execute arbitrary code or crash the service.

The host is installed with VideoLAN VLC media player 0.5.0 before 1.0.6 and is prone to an invalid memory access and application crash vulnerability. A flaw is present in the application, which fails to handle a crafted byte stream to the (1) AVI, (2) ASF, or (3) Matroska (aka MKV) demuxer. Successful exploitation could allow attackers to crash the service or execute arbitrary code or crash the se ...


Pages:      Start    1155    1156    1157    1158    1159    1160    1161    1162    1163    1164    1165    1166    1167    1168    ..   1169

© 2013 SecPod Technologies