[Forgot Password]
Login  Register Subscribe

24003

 
 

131486

 
 

106342

 
 

909

 
 

84584

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 12609 Download | Alert*

The host is installed with Adobe Flash Player 11.1.102.55 or before and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle a crafted SWF file. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Flash Player 11.1.102.55 or before and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle a crafted SWF file. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Google Chrome before 15.0.874.102 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted javascript code. Successful exploitation could allow attackers to crash the service or cause other unknown impacts

The host is installed with Microsoft Excel 2003 and is prone to record memory corruption vulnerability. A flaw is present in the application which is caused by a specially crafted Excel file. Successful exploitation allows remote attacker to install programs, view, change, or delete data, or create new accounts with full user rights and could take complete control of an affected system.

The host is installed with Microsoft PowerPoint 2007 or 2010 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly restrict the path used for loading external libraries. Successful exploitation allows attackers to take complete control of an affected system.

The host is installed with Oracle VM VirtualBox 3.0, 3.1, 3.2 or 4.0 through 4.0.8 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Guest Additions for Windows. Successful exploitation could allows local users to affect confidentiality, integrity and availability.

The host is installed with Internet Explorer 9 and is prone to remote code execution vulnerability. A flaw is present in thr application, which fails to properly restrict the path used for loading external libraries. Successful exploitation allows attackers to run arbitrary code.

The host is installed with Microsoft Internet Explorer 9 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly access a dereference memory address. Successful exploitation could allow an attacker to execute arbitrary code.

The host is installed with Internet Explorer 8 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to access a dereference memory address. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Internet Explorer 9 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle XSS Filter. Successful exploitation allows attackers to view content from another domain or Internet Explorer zone.


Pages:      Start    1202    1203    1204    1205    1206    1207    1208    1209    1210    1211    1212    1213    1214    1215    ..   1260

© 2013 SecPod Technologies