[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Microsoft Powerpoint 2002 or 2003 or 2007 or powerpoint viewer 2007 or Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats and is prone to remote code execution vulnerability. A flaw is present in the application which is caused when PowerPoint reads an invalid record in a specially crafted PowerPoint file, causing an error that could corrupt memo ...

The host is installed with Opera before 11.01 and is prone to an unspecified vulnerability. A flaw is present in Opera, which fails to properly restrict unknown content on a web page. Successful exploitation allows remote attackers to crash the application.

The host is installed with Windows XP, Windows Vista, Windows Server 2008, Windows Server 2003 and Windows 7 and is prone to null pointer de-reference vulnerability. A flaw is present in windows Kernel-mode drivers which does not properly manage kernel-mode driver objects. Successful exploitation allows attackers to run arbitrary code in kernel mode like install programs, view, change, or delete d ...

The host is installed with ASUS Net4Switch 1.0.0020 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long string passed to the Alert() method. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with CyberLink Power2Go 8.0.0.2023 or earlier and is prone to multiple stack-based buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle the src and name parameters in a p2g project file. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Internet Explorer and is prone to information disclosure vulnerability. A flaw is present in the browser, which fails to handle malicious data in frame tags. Successful exploitation could allow remote attackers to obtain sensitive information.

The host is installed with IBM Rational ClearQuest 7.1.x through 7.1.2.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted request. Successful exploitation could allow attackers to obtain system paths, product versions, and other sensitive information.

The host is installed with IBM Rational ClearQuest 7.1.x through 7.1.2.7 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly validate user credentials. Successful exploitation could allow attackers to gain access to the Site Administration menu to obtain sensitive information or modify server settings.

The host is installed with Pale Moon 28.8.x before 28.8.4 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to handle the segmentation fault issue related to module scripting. Successful exploitation allows attackers to affect the control flow or data flow of a program.

The host is installed with IBM Rational ClearQuest 7.1.x through 7.1.2.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a crafted user query. Successful exploitation could allow attackers to remote authenticated users to read password hashes.


Pages:      Start    1201    1202    1203    1204    1205    1206    1207    1208    1209    1210    1211    1212    1213    1214    ..   1502

© SecPod Technologies