[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 7345 Download | Alert*

The host is installed with Microsoft Publisher 2003 or 2007 and is prone to Memory Corruption Vulnerability. A flaw is present in the application which is caused by a specially crafted Publisher file. Successful exploitation allows remote attacker to install programs, view, change, or delete data, or create new accounts with full user rights and could take complete control of an affected system.

The host is installed with VMware Workstation 8.x before 8.0.4 or VMware Player 4.x before 4.0.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted traffic from a remote virtual device. Successful exploitation allow remote attackers to cause a denial of service (guest OS crash).

The host is installed with Blueberry BB FlashBack before 2.0.0.214 and IBM Rational Rhapsody before 7.6.1 and is prone to multiple vulnerabilities. The flaws are present in the applications, which is caused by insecure use of the Start(), PauseAndSave(), InsertMarker() and InsertSoundToFBRAtMarker() methods. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Blueberry BB FlashBack before 2.0.0.214 and IBM Rational Rhapsody before 7.6.1 and is prone to multiple vulnerabilities. The flaws are present in the applications, which is caused by insecure use of the InsertMarker() method. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Blueberry BB FlashBack before 2.0.0.214 and IBM Rational Rhapsody before 7.6.1 and is prone to multiple vulnerabilities. The flaws are present in the applications, which is caused by insecure use of the TestCompatibilityRecordMode() method. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with IBM Rational Asset Manager before 7.5.1 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle malicious input. Successful exploitation could allow attackers to inject arbitrary web script or html files.

The host is installed with Microsoft SharePoint Server 2010 and is prone to cross-site scripting vulnerability. A flaw is present due to improper handling of URL containing malicious JavaScript elements. Successful exploitation could allow attackers to issue SharePoint commands in the context of the authenticated user on the targeted SharePoint site.

The host is installed with Microsoft SharePoint Server 2010 and SharePoint Foundation 2010 and is prone to cross-site scripting vulnerability. A flaw is present due to improper handling of URL containing malicious JavaScript elements. Successful exploitation could allow attackers to issue SharePoint commands in the context of the authenticated user on the targeted SharePoint site.

The host is installed with Microsoft SharePoint Server 2010 and SharePoint Foundation 2010 and is prone to cross-site scripting vulnerability. A flaw is present due to improper handling of URL containing malicious JavaScript elements. Successful exploitation could allow attackers to issue SharePoint commands in the context of the authenticated user on the targeted SharePoint site.

The host is installed with Microsoft Visio Viewer 2010 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly handle specially crafted Visio files. Successful exploitation allows attackers to take complete control of an affected system.


Pages:      Start    695    696    697    698    699    700    701    702    703    704    705    706    707    708    ..   734

© SecPod Technologies