[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

111543

 
 

909

 
 

86957

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 15782 Download | Alert*

The host is installed with Microsoft Windows XP and is prone to remote code execution vulnerability. A flaw is present in the Remote Desktop Protocol, which fails to properly process RDP packets in memory. Successful exploitation allows remote attackers to execute arbitrary code and take complete control of an affected system.

The host is installed with Microsoft Office 2007 SP2/SP3 or Office 2010 and is prone to remote code execution vulnerability. A flaw is present in the in Microsoft Office, which fails to handle a specially crafted Computer Graphics Metafile (CGM) graphics file into an Office file. Successful exploitation could allow an attacker to gain the same user rights as the local user and take complete contro ...

The host is installed with Microsoft Windows XP SP2, SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, R2 SP1, Windows 7 Gold or SP1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle objects in memory properly. Successful exploitation could allow attackers to gain privileges.

The host is installed with Javascript and Vbscript 5.8, Internet Explorer 8 or 9 scripting engines and is prone to remote code execution vulnerability. A flaw is present in the application which is caused when the scripting engines attempt to reallocate memory while decoding a script in order to run it. Successful exploitation allows remote attacker to take complete control of an affected system r ...

The host is installed with Internet Explorer 6 through 9 and is prone to an asynchronous null object access remote code execution vulnerability. A flaw is present in the application, which fails to handle deleted objects in memory. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Internet Explorer 6 through 9 and is prone to a virtual function table corruption vulnerability. A flaw is present in the application, which fails to handle deleted objects in memory. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5.1 or 4 and is prone to untrusted search path vulnerability. A flaw is present in the applications, which is caused when Entity Framework, a .NET Framework component, incorrectly restricts the path used for loading external libraries. Successful exploitation allows attackers to run arbitrary code.

The host is installed with Xunlei Thunder before 7.2.6 and is prone to DLL injection vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with 360zip 1.93beta and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows remote attackers to execute arbitrary code via vectors related to file browsing and file extraction.

The host is installed with RealNetworks Helix Server or Helix Server or Helix Mobile Server 14.x before 14.3.x and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a specially crafted DisplayString request to the SNMP master agent process. Successful exploitation allows remote attackers to cause the target service to terminate.


Pages:      Start    1447    1448    1449    1450    1451    1452    1453    1454    1455    1456    1457    1458    1459    1460    ..   1578

© SecPod Technologies