[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Google Chrome before 45.0.2454.85 and is prone to a same-origin-policy bypass vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows remote attackers to bypass the Same Origin Policy.

The host is installed with Google Chrome before 45.0.2454.85 and is prone to a same-origin-policy bypass vulnerability. A flaw is present in the application, which fails to properly access a Service Worker. Successful exploitation allows remote attackers to bypass the Same Origin Policy.

The host is installed with Google Chrome before 45.0.2454.85 and is prone to a same-origin-policy bypass vulnerability. A flaw is present in the application, which fails to properly check whether a node is expected. Successful exploitation allows remote attackers to bypass the Same Origin Policy or cause a denial of service.

The host is installed with Adobe Reader and Acrobat and is prone to library-loading vulnerability. A flaw is present in the applications, which fail to directly specify a fully qualified path to a dynamic-linked library (DLL). Successful exploitation allows attackers to execute arbitrary code on the system using a specially-crafted library.

The host is installed with Internet Explorer 8 and is prone to a scripting engine remote memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to execute arbitrary code in the context of the current user.

The host is installed with Internet Explorer 7 or 8 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly access objects in memory. Successful exploitation could allow attackers to execute arbitrary code in the context of the currently logged-in user.

The host is installed with Internet Explorer 9 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly access objects in memory. Successful exploitation could allow attackers to execute arbitrary code in the context of the currently logged-in user.

The host is installed with Windows Media Center on Microsoft Windows Vista, 7, 8 or 8.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted Media Center link (.mcl) file that references malicious code. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user.

The host is installed with Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, Windows 8.1 or Windows Server 2012 R2 and is prone to a task file deletion elevation of privilege vulnerability. A flaw is present in the application, which fails to properly verify certain file system interactions. Successful exploitation could allow attackers ...

The host is installed with Microsoft Excel 2007, 2010, Excel Viewer 2007 or Office Compatibility Pack and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fails to properly handle a specially crafted file. Successful exploitation could allow attackers to execute arbitrary code in the context of the current user.


Pages:      Start    1220    1221    1222    1223    1224    1225    1226    1227    1228    1229    1230    1231    1232    1233    ..   1516

© SecPod Technologies