[Forgot Password]
Login  Register Subscribe

24547

 
 

132805

 
 

131423

 
 

909

 
 

108504

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 10572 Download | Alert*

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then ins ...

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then ins ...

The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a URL processing issue in Install Helper. Successful exploitation could allow attackers to track user logins.

The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which does not properly handle call gates. Successful exploitation could allow attackers to gain privileges.

The host is installed with PHP 5.3.4 and is prone to a null byte injection vulnerability. A flaw is present in the application, which accepts the \0 character in a pathname. Successful exploitation could allow attackers to bypass intended access restrictions.

The host is installed with PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted ZIP archive. Successful exploitation could allow attackers to crash the service.

The host is installed with PHP before 5.3.4 and is prone to multiple vulnerabilities. The flaws are present the application, which fails to properly handle non-shortest form UTF-8 encoding and ill-formed subsequences in UTF-8 data. Successful exploitation could allow attackers to bypass cross-site scripting (XSS) and SQL injection protection mechanisms.

The host is installed with Adobe Reader 8.x before 8.3.1, 9.x before 9.4.6, Adobe Reader or Acrobat 10.x before 10.1.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle logic error. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to validate DNSSEC (1) NSEC and (2) NSEC3 records. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X 10.6.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to determine the security status of an NS RRset during a DNSKEY algorithm rollover. Successful exploitation could allow attackers to crash the service.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1057

© SecPod Technologies