[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11480 Download | Alert*

The host is installed with Adobe reader or Acrobat 10.x before 10.1.13 or 11.x before 11.0.10 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe reader or Acrobat 10.x before 10.1.13 or 11.x before 11.0.10 and is prone to an use-after-free vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Microsoft SharePoint Foundation 2010 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly sanitize page content in SharePoint lists. Successful exploitation could allow attackers to run arbitrary code in the security context of the logged-on user.

The host is installed with Microsoft Web Applications 2010 SP1 or SP2 and is prone to remote code execution vulnerability. A flaw is present in the application, which fail to properly sanitize the page content. Successful exploitation allows attackers to run arbitrary code in the security context of the W3WP service account.

The host is installed with Microsoft Word 2003 SP3 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle objects in memory while parsing specially crafted Office files. Successful exploitation allows attackers to execute arbitrary code via a crafted document.

The host is installed with Google Chrome Frame plugin before 26.0.1410.28 and is prone to denial of service vulnerability. The flaw is present in the Hook_Terminate function in chrome_frame/protocol_sink_wrap.cc, which does not properly handle attach tab requests. Successful exploitation allows remote attackers to cause a denial of service via an _blank value for the target attribute of an A eleme ...

The host is installed with McAfee Virtual Technician and ePO-MVT and is prone to privelege escalation vulnerability. A flaw is present in the application, which fails to handle arguments to the save method. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Microsoft Internet Explorer and is prone to a cookiejacking vulnerability. A flaw is present in the application, which allows remote attackers to read cookie files via vectors involving an IFRAME element. Successful exploitation could allow an attacker to disclose sensitive information like cookie values of a user.

The host is installed with Microsoft Internet Explorer 6 or 7 or 8 or 9 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not prevent capture of data about the times of Same Origin Policy violations during IFRAME loading attempts. Successful exploitation allows remote attackers to determine whether a document exists in the browser cache via craf ...

The host is installed with Internet Explorer 6 through 9, or 10 Consumer Preview and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle vectors related to browser's protected mode. Successful exploitation could allow remote attackers to execute arbitrary code.


Pages:      Start    1137    1138    1139    1140    1141    1142    1143    1144    1145    1146    1147    ..   1147

© 2013 SecPod Technologies