[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the ...

The host is installed with Microsoft Windows Server 2003, 2008, 2008 R2, 2012, 2012 R2, Windows Vista, 7, 8, 8.1 and is prone to a WTS remote code execution vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4.0, 4.5 or 4.5.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which improperly handles certain requests on systems that have custom error messages disabled. Successful exploitation allows attackers to view parts of a web configuration file, which could expose sensitive informa ...

The host is installed with Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2 and is prone to an opentype font parsing vulnerability. A flaw is present in the applications, which fail to handle a crafted OpenType font. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Office Compatibility Pack SP3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Office Compatibility Pack 2007, 2007 SP3, Office 2010 or SP2, Office 2013 or SP1 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Office Office 2013 or SP1 and is prone to an uninitialized memory use vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Cisco WebEx extensions for Google Chrome before before 1.0.7, Mozilla Firefox before 106 or Internet Explorer before 2.1.0.10 and is prone to a Cisco WebEx browser extension remote code execution vulnerability. A flaw is present in the application, which fails to handle an application programing interface (API) response parser within the plugin. Successful exploitation a ...

The host is installed with Bamboo CI server before 6.10.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a missing authorization check. Successful exploitation could allow attackers to initiate periodic log scans and send the results to a user-specified email address.

The host is installed with Firebird 2.5.x before 2.5.7 or 3.x before 3.0.2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle insufficient checks in the UDF subsystem. Successful exploitation could allow remote authenticated users to execute code.


Pages:      Start    1403    1404    1405    1406    1407    1408    1409    1410    1411    1412    1413    1414    1415    1416    ..   1502

© SecPod Technologies