[Forgot Password]
Login  Register Subscribe

24437

 
 

131815

 
 

116564

 
 

909

 
 

91325

 
 

141

 
 
Paid content will be excluded from the download.

Filter
Matches : 13166 Download | Alert*

A remote code execution vulnerability exists in Microsoft Outlook software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the curren ...

An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted authentication request to an affected SharePoint server. An attacker who successfully exploited this vulnerability could execute malicious code on a vulnerable server in the context of the SharePoint application pool account. To exploit this vulnerability, an authenticated ...

A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could the ...

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scrip ...

The host is installed with Windows Azure Pack and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly sanitize user-provided input. Successful exploitation could allow attackers to perform cross-site scripting attacks on affected systems and run script in the security context of the current user.

The host is installed with Microsoft Exchange Server 2016 and is prone to a tampering vulnerability. A flaw is present in the application, which fails to properly handle profile data. Successful exploitation could allow attackers to modify a targeted user's profile data.

A remote code execution vulnerability exists in the Yammer desktop application due to the loading of arbitrary content. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; ...

The host is installed with Apple iCloud before 7.4 or Apple iTunes before 12.7.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly perform size validation. Successful exploitation could allow attackers to elevate privileges.

The host is installed with Apple iCloud before 7.4 or Apple iTunes before 12.7.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple iCloud before 7.4 or Apple iTunes before 12.7.4 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1316

© SecPod Technologies