[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with Microsoft Office 2007 SP3, Excel 2007 SP3, PowerPoint 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Office 2013 Gold or SP1, Word 2013 Gold or SP1, Office 2013 RT Gold or SP1, Word 2013 RT Gold or SP1, Excel Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Excel Services on Sha ...

The host is installed with Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 Gold or SP1, Word 2013 RT Gold or SP1, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 Gold or SP1, Web Applications 2010 SP2 or Web Apps Server 2013 Gold or SP1 and is prone to a remote code execution v ...

The host is installed with Microsoft Excel 2007 SP3, PowerPoint 2007 SP3, Word 2007 SP3, Excel 2010 SP2, PowerPoint 2010 SP2 or Word 2010 SP2 and is prone to a remote code execution vulnerability. A flaw is present in the applications, which fail to handle a crafted file. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Internet Explorer 6, 7, 8, 9 or 10 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly process a webpage. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service via a crafted web site.

The host is installed with IBM Lotus Domino 8.5.x through 8.5.3 and is prone to open redirect vulnerability. A flaw is present in the application, which fails to properly handle the Web server component. Successful exploitation allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

The host is installed with VMware Workstation 6.0.x before 6.0.3 or VMware Player 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted VMCI calls that trigger memory. Successful exploitation allows attackers to cause a denial of service (host OS crash).

The host is installed with VMware Workstation 5.5.x before 5.5.6 or VMware Player 1.0.x before 1.0.6 and is prone to a denial of service vulnerability. A flaw is present in the DHCP service, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to cause denial of service.

The host is installed with VMware Workstation 6.x before 6.0.6, 5.x before 5.5.9, VMware Player 2.0.x through 2.0.5 or 1.0.x through 1.0.8 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle a virtual hardware request that triggers an arbitrary physical-memory write operation. Successful exploitation allows guest OS users to an arbitrary physic ...

The host is installed with VMware Workstation 10.x before 10.0.6, 11.x before 11.1.1, VMware Player 6.x before 6.0.6 or 7.x before 7.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors, Successful exploitation allows guest OS users to execute arbitrary code on the host OS.

The host is installed with VMware Workstation 10.x before 10.0.6, 11.x before 11.1.1, VMware Player 6.x before 6.0.6 or 7.x before 7.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows guest OS users to execute arbitrary code on the host OS.


Pages:      Start    1372    1373    1374    1375    1376    1377    1378    1379    1380    1381    1382    1383    1384    1385    ..   1429

© SecPod Technologies