[Forgot Password]
Login  Register Subscribe

24436

 
 

131815

 
 

115532

 
 

909

 
 

90034

 
 

140

 
 
Paid content will be excluded from the download.

Filter
Matches : 13222 Download | Alert*

The host is installed with Microsoft Windows Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, Server 2012, Windows 8.1, Server 2012 R2, .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, Office 2007 SP3 or 2010 SP2, Live Meeting 2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, Lync Basic 2013 SP1, Silverlight 5 or Silverlight 5 Developer Runtime and ...

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to more reliably predict pointer values and degrade the efficacy of the Address Space Layout Randomization (ASLR) security feature.

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to more reliably predict pointer values and degrade the efficacy of the Address Space Layout Randomization (ASLR) security feature.

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle certain open and close requests. Successful exploitation could allow attackers to obtain the same permissions as the currently logged-on user.

The host is installed with Microsoft Lync 2010, Microsoft Skype For business 2016, Microsoft Skype For Business Basic 2016, Microsoft Lync Basic 2013, Microsoft Lync 2010 Attendee, Microsoft live meeting 2007, Microsoft Live Meeting 2007 Add-In, Microsoft Office 2007, Microsoft Office 2010, .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6 or Word Viewer and is prone to a graphics memo ...

The host is installed with Mozilla Firefox or Thunderbird or SeaMonkey and is prone to denial of service vulnerability. A flaw is present in the applications, which fails to handle images with multipart/x-mixed-replace content type. Successful exploitation could allow remote attackers to execute arbitrary code and cause denial of service.

The host is installed with Mozilla Firefox or Thunderbird or SeaMonkey and is prone to remote code execution vulnerability. A flaw is present in the applications, which fails to handle malicious web pages. Successful exploitation could allow remote attackers to execute arbitrary code and cause denial of service.

The host is installed with Mozilla Firefox or Thunderbird or SeaMonkey and is prone to remote code execution vulnerability. A flaw is present in the JavaScript engine, which fails to handle malicious web pages. Successful exploitation could allow remote attackers to execute arbitrary code and cause denial of service.

The host is installed with Mozilla Firefox or Thunderbird or SeaMonkey and is prone to integer overflow vulnerability. A flaw is present in the XSLT node sorting routine, which fails to handle nodes containing an overly large text value. Successful exploitation could allow remote attackers to execute arbitrary code and cause denial of service.

The host is installed with Mozilla Firefox or Thunderbird or SeaMonkey and is prone to use-after-free vulnerability. A flaw is present in the applications, which fails to handle multiple plugin instances which share references. Successful exploitation could allow remote attackers to execute arbitrary code and cause denial of service.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1322

© SecPod Technologies