The host is installed with Microsoft Windows and is prone privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Windows kernel-mode driver. Successful exploitation could allow remote attackers to install programs, view, change, or delete data or create new accounts with full user rights.
The host is installed with Microsoft Windows XP or Windows Server 2003 or Windows Vista or Windows Server 2008 or R2 or Windows 7 and is prone to remote code execution vulnerability. A flaw is present in the Remote Desktop Protocol, which fails to properly process RDP packets in memory. Successful exploitation allows remote attackers to execute arbitrary code and take complete control of an affect ...
The host is installed with Microsoft .Net framework 2.0 Sp2 or 3.5.1 or 4.0 or 4.5 Beta and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly execute a function pointer. Successful exploitation allows attackers to take complete control of an affected system.
The host is installed with Microsoft Windows XP or Windows Server 2003 or Windows Vista or Windows Server 2008 or R2 or Windows 7 and is prone to elevation of privilege vulnerability. A flaw is present in the application, which fails to properly validate input passed from user mode. Successful exploitation allows attackers to execute remote code.
The host is installed with Internet Explorer 8 and 9 or Microsoft Communicator 2007 R2 or Lync 2010 or Lync 2010 Attendee Microsoft InfoPath 2007 or 2010, Microsoft SharePoint Server 2007 or 2010, Microsoft SharePoint Foundation 2010, Microsoft SharePoint Services 3.0 or Microsoft Groove Server 2010 and is prone to an information disclosure vulnerability. A flaw is present in the application, whic ...
The host is installed with Microsoft Lync 2010 or Lync 2010 Attendee and is prone to remote code execution vulnerability. A flaw is present in applications, which fail to handle shared content that contains specially crafted TrueType fonts. Successful exploitation allows remote attackers to install programs or view or change or delete data or create new accounts with full user rights.
The host is installed with Microsoft Lync 2010 or Lync 2010 Attendee or Lync 2010 Attendant and is prone to insecure library loading vulnerability. A flaw is present in application, which fails to properly handle the loading of DLL files. Successful exploitation allows remote attackers to install programs or view or change or delete data or create new accounts with full user rights.
The host is installed with Microsoft SharePoint Server 2010 or SharePoint Foundation 2010 and is prone to elevation of privilege vulnerability. A flaw is present in the applications, which fail to properly handle malicious JavaScript elements contained within a specially crafted URL. Successful exploitation allows attackers to potentially issue SharePoint commands in the context of an authenticate ...
The host is installed with Microsoft SharePoint Server 2007 or 2010 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly validate search scope permissions. Successful exploitation allows attackers to view or tamper with other users' search scopes.
The host is installed with Microsoft SharePoint Server 2010 or SharePoint Foundation 2010 and is prone to cross-site scripting vulnerability. A flaw is present in the applications, which fail to properly handle malicious JavaScript elements contained within a specially crafted URL. Successful exploitation allows attackers to potentially issue SharePoint commands in the context of an authenticated ...