[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with Microsoft Word 2003 SP3, 2007 SP3, Word Viewer or Office Compatibility Pack SP3 and is prone to remote code execution vulnerability. A flaw is present in the applications, which fail to properly handle objects in memory while parsing specially crafted Office files. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Microsoft Word 2003 SP3 or Word Viewer and is prone to remote code execution vulnerability. A flaw is present in the applications, which fail to properly handle objects in memory while parsing specially crafted Office files. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1, SP2, Word Viewer or Office Compatibility Pack SP3 and is prone to remote code execution vulnerability. A flaw is present in the applications, which fail to properly handle objects in memory while parsing specially crafted Office files. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Microsoft Excel 2003 SP3 or 2007 SP3 and is prone to remote code execution vulnerability. A flaw are present in the applications, which fail to handle certain objects in memory while parsing specially crafted Office files. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Microsoft Excel 2003 SP3, 2007 SP3, 2010 SP1, SP2, Excel Viewer 2007 or Office Compatibility Pack SP3 and is prone to information disclosure vulnerability. A flaw are present in the applications, which fail to handle XML external entities that are resolved within other XML external entity declarations. Successful exploitation allows attackers to read data from files on t ...

The host is installed with Internet Explorer 6, 7, 8, 9, or 10 and is prone to remote code execution vulnerability. The flaw is present in the application, which fails to properly handle an object in memory that has been deleted or has not been properly allocated. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Shockwave Player before 12.0.4.144 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to cause denial of service.

The host is installed with Adobe Shockwave Player before 12.0.4.144 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to cause denial of service.

The host is installed with Adobe Reader or Acrobat before 11.0.04 or before 10.1.8 and is prone to stack overflow vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat before 11.0.04 or before 10.1.8 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.


Pages:      Start    1085    1086    1087    1088    1089    1090    1091    1092    1093    1094    1095    1096    1097    1098    ..   1429

© SecPod Technologies