[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Microsoft Internet Explorer 9 or 10 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to crash the service.

The host is installed with Microsoft Excel SP3, Office 2007 SP3, Office 2010 SP1/SP2, Office 2013, Excel Viewer 2007, Office Compatibility Pack SP3, Office Web Apps 2010,SharePoint Server 2007 SP3, SharePoint Server 2010 SP1/SP2, SharePoint Server 2013 and is prone to remote code execution vulnerability. The flaw is present in the applications, which fail to handle certain objects in memory while ...

The host is installed with Microsoft Excel 2007 SP3, Excel Viewer 2007 or Office Compatibility Pack SP3 and is prone to remote code execution vulnerability. The flaw is present in the applications, which fail to handle certain objects in memory while parsing specially crafted Office files. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with .Net framework 3.0, 3.5.1, 4.0 or 4.5 and is prone to an openType font parsing vulnerability. A flaw is present in the application, which fails to handle a crafted OTF file. Successful exploitation could allow attackers to take complete control of an affected system.

The host is installed with .Net framework 2.0, 3.5.1, 4.0 or 4.5 and is prone to an entity expansion vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to crash the service.

The host is installed with .Net framework 2.0, 3.5.1, 4.0 or 4.5 and is prone to a JSON parsing vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to crash the service.

The host is installed with Microsoft SharePoint Server 2007 SP3 or before, SharePoint Foundation 2010 or Microsoft SharePoint Services 3.0 and is prone to remote code execution vulnerability. The flaw is present in the applications, which fail to properly properly handle objects in memory while parsing specially crafted Office files. Successful exploitation allows attackers to execute arbitrary co ...

The host is installed with Microsoft Windows SharePoint Services 2.0, 3.0 SP3, SharePoint Server 2007 SP3, SharePoint Foundation 2010 SP1, SP2, SharePoint Server 2010 SP1, SP2, SharePoint Foundation 2013, SharePoint Server 2013 and is prone to denial of service vulnerability. A flaw is present in the applications, which fail to properly handle starting an unassigned workflow. Successful exploitati ...

The host is installed with Microsoft Office Web Apps 2010 SP1 or SharePoint Server 2010 SP1 and is prone to remote code execution vulnerability. A flaw is present in the applications, which fail to properly properly handle objects in memory while parsing specially crafted Office files. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Microsoft Office Web Apps 2010 SP1, SP2 or SharePoint Server 2010 SP1 or SP2 and is prone to remote code execution vulnerability. A flaw is present in the applications, which fail to properly properly handle objects in memory while parsing specially crafted Office files. Successful exploitation allows attackers to execute arbitrary code.


Pages:      Start    1172    1173    1174    1175    1176    1177    1178    1179    1180    1181    1182    1183    1184    1185    ..   1516

© SecPod Technologies