[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Microsoft Groove 2007 Service Pack 2 and is prone to remote code execution vulnerability. A flaw is present in the application, which incorrectly restricts the path used for loading external libraries. Successful exploitation allow remote attackers to run arbitrary code as logged-on user.

The host is installed with PlotSoft PDFill PDF Editor 8.0 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to prevent local users from gaining privileges. Successful exploitation could allow attackers to gain privileges.

The host is installed with Microsoft Visio 2007 or 2010 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft SharePoint Server 2010, 2013, Foundation 2013, Office Web Apps 2010 or Web Apps Server 2013 and is prone to a XSS spoofing vulnerability. A flaw is present in the applications, which fail to properly sanitize a specially crafted request. Successful exploitation could allow attackers to update is required to fix multiple remote code execution vulnerabilities. Th ...

The host is installed with Microsoft SharePoint Server 2007 or 2010 and is prone to an information disclosure vulnerability. A flaw present in the applications, which fail to properly parse the Document Type Definition (DTD) of an XML file. Successful exploitation could allow attackers to browse the contents of arbitrary files on a SharePoint server.

The host is installed with OpenSSH 6.6 and earlier and is prone to a security bypass vulnerability. A flaw is present in key_certify function which, fails to properly handle an unacceptable HostCertificate. Successful exploitation allows remote servers to trigger the skipping of SSHFP DNS RR checking.

The host is installed with Python 2.x before 2.7.9 and 3.x before 3.4.3 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to handle an arbitrary valid certificate. Successful exploitation could allow attackers to spoof SSL servers.

The host is installed with Google Chrome before 46.0.2490.71 and is prone to a Same Origin Policy bypass vulnerability. A flaw is present in the application, which fails to handle crafted JavaScript code. Successful exploitation could allow attackers to bypass same origin policy.

The host is installed with Google Chrome before 46.0.2490.71 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a focused annotation in a PDF document. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 46.0.2490.71 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle an object destruction in a callback. Successful exploitation could allow attackers to crash the service.


Pages:      Start    1187    1188    1189    1190    1191    1192    1193    1194    1195    1196    1197    1198    1199    1200    ..   1502

© SecPod Technologies