[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14858 Download | Alert*

The host is installed with Opera before 11.50 and is prone to cross-site scripting vulnerability. A flaw is present in the application which fails to restrict data: URIs. Successful exploitation allow remote attackers to conduct cross-site scripting.

The host is installed with Opera before 11.60 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle certificate revocation. Successful exploitation could allow attackers to produce unknown impacts.

The host is installed with Opera browser before 11.0 and is prone to a X509 spoofing vulnerability. A flaw is present in the application, which gives improper information of X.509 certificates on https web sites when Opera Turbo is enabled. Successful exploitation could allow a remote attacker to redirect users to malicious web sites.

The host is installed with Microsoft OneNote and is prone to remote code execution vulnerability. A flaw is present in application, which parses specially crafted files. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new accounts with full user rights."

The host is installed with Microsoft Office Compatibility Pack SP3, SharePoint Server 2010, SharePoint Server 2013, Word 2007, Word 2010, Word 2013, Word Viewer, Web Apps 2010 or Web Apps 2013 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle objects in memory. An attacker who successfully exploited these vulnerabilities could run arbitr ...

The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Office Compatibility Pack SP3, SharePoint Server 2007 or SharePoint Server 2010 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle objects in memory. An attacker who successfully exploited these vulnerabilities could run arbitrary code in the context of the current user.

The host is installed with Microsoft Excel 2010 SP2 or Excel Viewer 2007 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle objects in memory. An attacker who successfully exploited these vulnerabilities could run arbitrary code in the context of the current user.

The host is installed with Microsoft Office 2007 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. An attacker who successfully exploited these vulnerabilities could run arbitrary code in the context of the current user.

The host is installed with Microsoft SharePoint Foundation 2013 and is prone to a cross-site-scripting vulnerability. A flaw is present in the application, which does not properly sanitize a specially crafted web request. An attacker who successfully exploited these vulnerabilities could then perform cross-site scripting attacks on affected systems and run script in the security context of the cur ...

The host is installed with Microsoft PowerPoint 2007 or 2010 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly restrict the path used for loading external libraries. Successful exploitation allows attackers to take complete control of an affected system.


Pages:      Start    1356    1357    1358    1359    1360    1361    1362    1363    1364    1365    1366    1367    1368    1369    ..   1485

© SecPod Technologies