[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Microsoft Windows Server 2003 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which is caused when the message queuing service improperly handles objects in memory by inadvertently allowing overwrite. Successful exploitation could allow an attacker to install programs; view, change, or delete data; or create new accounts wit ...

The host is installed with .NET Framework 1.1 SP1, 2.0 SP2, 3.5.1, 4.0, 4.5 or 4.5.1 and is prone to elevation of privilege vulnerability. A flaw is present in the application, which fails to handle TypeFilterLevel checks for some malformed objects. Successful exploitation allows attacker to execute arbitrary code.

The host is installed with Microsoft Sharepoint Server 2007, 2010, Sharepoint Foundation 2010 or 2013 and is prone to a remote code execution vulnerability. A flaw is present in the applications, which fail to handle specially crafted page content. Successful exploitation could allow attackers to execute arbitrary code in the security context of the W3WP service account.

The host is installed with Microsoft Server 2003, Server 2008, Server 2008 R2, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8 or Windows 8.1 and is prone to an OLE elevation of privilege vulnerability. A flaw is present in the application, which fails to properly validate user input. An attacker who successfully exploited the vulnerabilities could allow a user with limited privil ...

The host is installed with Microsoft Server 2003, Server 2008, Server 2008 R2, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8 or Windows 8.1 and is prone to an OLE elevation of privilege vulnerability. A flaw is present in the application, which fails to properly validate user input. An attacker who successfully exploited the vulnerabilities could allow a user with limited privil ...

The host is installed with Microsoft Office 2007 SP3 or 2010 SP2, Live Meeting 2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1 or Lync Basic 2013 SP1 and is prone to a remote code execution vulnerability. A flaw is present in the applications, which fail to handle Office Graphics Library (OGL) fonts. Successful exploitation could allow attackers to take complete control of the affected ...

The host is installed with OpenAFS before 1.6.0700 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle an invalid packet. Successful exploitation allows remote attackers to cause a denial of service (performance degradation).

The host is installed with OpenAFS 1.4.1400, 1.4.1200 or 1.4.0700 and is prone to a double free vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows remote attackers to cause a denial of service and execute arbitrary code.

The host is installed with VMware Workstation 6.5.1 and earlier or VMware Player 2.5.1 and earlier and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted IOCTL request. Successful exploitation allows local users to cause a denial of service.

The host is installed with VMware Workstation 7.x before 7.1.6 and 8.x before 8.0.4 or VMware Player 3.x before 3.1.6 and 4.x before 4.0.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted Checkpoint file. Successful exploitation allow user-assisted remote attackers to execute arbitrary code on the host OS or cause a denial of ...


Pages:      Start    1400    1401    1402    1403    1404    1405    1406    1407    1408    1409    1410    1411    1412    1413    ..   1502

© SecPod Technologies