[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Microsoft OneNote and is prone to remote code execution vulnerability. A flaw is present in application, which parses specially crafted files. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new accounts with full user rights."

The host is installed with Microsoft Office Compatibility Pack SP3, SharePoint Server 2010, SharePoint Server 2013, Word 2007, Word 2010, Word 2013, Word Viewer, Web Apps 2010 or Web Apps 2013 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle objects in memory. An attacker who successfully exploited these vulnerabilities could run arbitr ...

The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Office Compatibility Pack SP3, SharePoint Server 2007 or SharePoint Server 2010 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle objects in memory. An attacker who successfully exploited these vulnerabilities could run arbitrary code in the context of the current user.

The host is installed with Microsoft Excel 2010 SP2 or Excel Viewer 2007 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle objects in memory. An attacker who successfully exploited these vulnerabilities could run arbitrary code in the context of the current user.

The host is installed with Microsoft Office 2007 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. An attacker who successfully exploited these vulnerabilities could run arbitrary code in the context of the current user.

The host is installed with Microsoft PowerPoint 2007 or 2010 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly restrict the path used for loading external libraries. Successful exploitation allows attackers to take complete control of an affected system.

The host is installed with Microsoft Word 2007, 2010 or Office Compatibility pack and is prone to an invalid index remote code execution vulnerability. A flaw is present in the applications, which fail to handle specially crafted Office files. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Word 2013, Office Web Apps 2010, Server 2013, Word Viewer, Sharepoint Server 2010 or 2013 and is prone to an use after free vulnerability. A flaw is present in the applications, which fail to handle a specially crafted Microsoft Word file. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel Viewer 2007 SP3, Office Compatibility Pack SP3, Excel Services on SharePoint Server 2007 SP3, Excel Services on SharePoint Server 2010 SP2, and Excel Services on SharePoint Server 2013 SP1 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted o ...

The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, or Office Compatibility Pack SP3 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted office files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    1372    1373    1374    1375    1376    1377    1378    1379    1380    1381    1382    1383    1384    1385    ..   1516

© SecPod Technologies