[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87888

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 13419 Download | Alert*

The host is installed with Microsoft .NET Framework 2.0 SP2, 3.0, 3.5.1, 4 or 4.5 and is prone to S.DS.P buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle System.DirectoryServices.Protocols (S.DS.P) namespace method. Successful exploitation allows remote attackers to install programs, view, change or delete data or create new accounts with full use ...

The host is installed with Microsoft .NET Framework 1.1 SP1 or 2.0 SP2 or 3.0 or 4 and is prone to system drawing information disclosure vulnerability. A flaw is present in the application, which fails to properly handle pointers to unmanaged memory locations. Successful exploitation allows remote attackers to install programs, view, change or delete data or create new accounts with full user righ ...

The host is installed with Microsoft .NET Framework 1.1 SP1 or 2.0 SP2 or 3.5.1 or 4 or 4.5 and is prone to WinForms buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a Windows Forms method. Successful exploitation allows remote attackers to install programs, view, change or delete data or create new accounts with full user rights.

The host is installed with System Center Operations Manager 2007 or 2007 R2 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle a specially crafted script code. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with System Center Operations Manager 2007 or 2007 R2 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle a specially crafted script code. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Exchange Server 2007 or Exchange Server 2010 and is prone to remote code execution vulnerabilities. The flaws are present in the Microsoft Exchange Server, which fails to properly handle WebReady Document Viewing feature. Successful exploitation could allow to run code on the affected server.

The host is installed with FAST Search Server 2010 for SharePoint and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Exchange Server 2007 or Exchange Server 2010 and is prone to remote code execution vulnerabilities. The flaws are present in the Microsoft Exchange Server, which fails to properly handle WebReady Document Viewing feature. Successful exploitation could allow to run code on the affected server.

The host is installed with FAST Search Server 2010 for SharePoint and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft .NET Framework 4 or 4.5 and is prone to WPF reflection optimization vulnerability. A flaw is present in the applications, which fails to properly validate permissions of objects involved with reflection. Successful exploitation allows attackers to take complete control of the affected system.


Pages:      Start    1326    1327    1328    1329    1330    1331    1332    1333    1334    1335    1336    1337    1338    1339    ..   1341

© SecPod Technologies