[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Microsoft Visual Studio 2005 or Microsoft Report Viewer 2005 Service Pack 1 Redistributable Package and is prone to information disclosure vulnerability. A flaw is present in Microsoft Report Viewer, which can not handle specially crafted web pages. Successful exploitation could allow an attacker to gain sensitive information.

The host is installed with Microsoft Visio 2010 or Microsoft Visio 2003 or Microsoft Visio 2007 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to parse certain structures when handling specially crafted Visio files. Successful exploitation will allow attackers to take complete control of the affected system.

The host is missing an important security update according to Microsoft security bulletin, MS11-060. The update is required to fix a remote code execution vulnerability. The flaw is present in the application, which fails to parse certain structures when handling specially crafted Visio files. Successful exploitation will allow attackers to take complete control of the affected system.

The host is installed with Microsoft Office 2007 SP2/SP3 or Office 2010 and is prone to remote code execution vulnerability. A flaw is present in the in Microsoft Office, which fails to handle a specially crafted Computer Graphics Metafile (CGM) graphics file into an Office file. Successful exploitation could allow an attacker to gain the same user rights as the local user and take complete contro ...

The host is installed with Microsoft visio 2010 SP1 or Visio viewer 2010 SP1 and is prone to remote code execution vulnerability. A flaw is present in the in Microsoft Office, which fails to handle a specially crafted Visio file. Successful exploitation could allow an attacker to gain the same user rights as the local user and take complete control of an affected system.

The host is installed with Javascript and Vbscript 5.8, Internet Explorer 8 or 9 scripting engines and is prone to remote code execution vulnerability. A flaw is present in the application which is caused when the scripting engines attempt to reallocate memory while decoding a script in order to run it. Successful exploitation allows remote attacker to take complete control of an affected system r ...

The host is installed with Microsoft Visual Studio Team Foundation Server 2010 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle an unspecified parameter. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

The host is installed with Microsoft Systems Management Server 2003 SP3 or Microsoft System Center Configuration Manager 2007 SP2 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the applications, which fail to handle a specially crafted URL. Successful exploitation allows attackers to force users to visit attacker's website by getting them to click a link in an email ...

The host is installed with Microsoft Internet Explorer 6 through 9 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted web site. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Internet Explorer 8 or 9 and is prone to an onmove use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted web site that triggers access to an object that was not properly initialized or is deleted. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1345    1346    1347    1348    1349    1350    1351    1352    1353    1354    1355    1356    1357    1358    ..   1516

© SecPod Technologies