[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96125

 
 

909

 
 

78020

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11397 Download | Alert*

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the JBIG2 filter, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 9.x before 9.1, 8.x before 8.1.4 or 7.x before 7.1.1 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the JBIG2 symbol dictionary segment, which fails to handle PDF file with a malformed JBIG2 symbol dictionary segment. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Lync Server 2010 or 2013 and is prone to a content sanitization vulnerability. A flaw is present in the application, which fails to fails to properly sanitize specially crafted content. Successful exploitation could allow attackers to potentially execute scripts in the users browser to obtain information from web sessions.

The host is installed with Microsoft FrontPage 2003 and is prone to a xml disclosure vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to disclose the contents of a file on a target system.

The host is installed with Microsoft Office 2013 and is prone to a microsoft office chinese grammar checking vulnerability. A flaw is present in the application, which does not properly validate the path used for loading external libraries. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Office 2013 and is prone to a token reuse vulnerability. A flaw is present in the application, which does not properly validate the path used for loading external libraries. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Office 2013 and is prone to a token hijacking vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted response while attempting to open an Office file hosted on the malicious website. Successful exploitation could allow attackers to ascertain access tokens used to authenticate the current user on a targeted ShareP ...

The host is installed with LibreOffice 4.1.4 before 4.2.5 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted Microsoft documents. Successful exploitation could allow attackers to unconditionally execute certain VBA macros.

The host is installed with Microsoft Excel Viewer and Excel 2007 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to handle a crafted spreadsheet file. Successful exploitation could allow attackers to cause a denial of service (read access violation and application crash).

The host is installed with ActiveScriptRuby (ASR) before 1.8.7 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly restrict interaction with an Internet Explorer ActiveX environment. Successful exploitation could allow remote attackers to execute arbitrary Ruby code.


Pages:      Start    1125    1126    1127    1128    1129    1130    1131    1132    1133    1134    1135    1136    1137    1138    ..   1139

© 2013 SecPod Technologies