[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

251139

 
 

909

 
 

196159

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31404 Download | Alert*

The host is installed with Microsoft Excel 2007, 2010, 2013, 2016, Office Compatibility pack, Excel Viewer 2007, Sharepoint Server 2007, 2010 or 2013 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle objects in memory. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2016, Office Compatibility Pack SP3, Excel Viewer or Excel Services on SharePoint Server 2007 SP3, 2010 SP2 or 2013 SP1 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle specially crafted Microsoft Office file. Successful exploitation could allow a ...

The host is installed with Microsoft Excel 2010 SP2, Excel 2013 SP1, Excel 2016 or Excel Services on SharePoint Server 2013 SP1 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle specially crafted Microsoft Office file. Successful exploitation could allow attackers to run arbitrary code in the context of the current user.

The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2016, Office Compatibility Pack SP3, Excel Viewer 2007, SharePoint Server 2007, SharePoint Server 2010, SharePoint Server 2013 or Web Apps 2010 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle objects in memory. An attacker who successfully exploi ...

The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2016, Office Compatibility Pack SP3 or Excel Viewer 2007 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle objects in memory. An attacker who successfully exploited these vulnerabilities could run arbitrary code in the context of the current user.

The host is installed with Microsoft Internet Explorer 6/7/8 and is prone to remote code execution vulnerability. A flaw is present in VML implementation which fails to open a specially crafted web page. Successful exploitation allows remote attackers to gain the same user rights as the logged-on user.

The host is installed with Dell EMC OpenManage Server Administrator before 9.3.0 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to properly handle the sanitization of input parameters. Successful exploitation could allow an attacker to exploit this vulnerability to gain unauthorized access to the file system.

The host is installed with Dell EMC OpenManage Server Administrator before 9.3.0 and is prone to an improper range header processing vulnerability. A flaw is present in the application, which fails to properly handle the crafted requests with overlapping ranges. Successful exploitation could allow an attacker to exploit this vulnerability to result in a crash due to excessive memory consumption an ...

The host is installed with Dell EMC OpenManage Server Administrator before 9.1.0.3 or 9.2.x before 9.2.0.4 and is prone to an XML external entity (XXE) injection vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted document type definitions (DTDs) in an XML request. Successful exploitation could allow an attacker to exploit this vulnerability to r ...

The host is installed with Dell EMC OpenManage Server Administrator before 9.1.0.3 or 9.2.x before 9.2.0.4 and is prone to a web parameter tampering vulnerability. A flaw is present in the application, which fails to properly validate parameters of web requests to OMSA. Successful exploitation could allow an attacker to exploit this vulnerability to create arbitrary files with empty content or del ...


Pages:      Start    2084    2085    2086    2087    2088    2089    2090    2091    2092    2093    2094    2095    2096    2097    ..   3140

© SecPod Technologies