[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14857 Download | Alert*

The host is installed with Microsoft Server 2003, Server 2008, Server 2008 R2, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8 or Windows 8.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle a crafted application. Successful exploitation could allow attackers to run arbitrary code in kernel mode.

The host is installed with Microsoft Server 2003, Server 2008, Server 2008 R2, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8 or Windows 8.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle a crafted application. Successful exploitation could allow attackers to run processes in an elevated context.

The host is installed with Microsoft Server 2003, Server 2008, Server 2008 R2, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8 or Windows 8.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which improperly handles the repair of a previously installed application. Successful exploitation could allow attackers to install programs; view ...

The host is installed with Microsoft SharePoint Foundation 2013 or Microsoft SharePoint Server 2013 and is prone to a elevation of privilege vulnerability. The flaw is present in the application, which fails to handle a specially crafted app that uses the SharePoint extensibility model to execute arbitrary JavaScript on behalf of the user. Successful exploitation allows attackers to execute arbitr ...

The host is installed with .Net framework 2.0, 3.0 or 3.5.1 and is prone to an security feature bypass vulnerability. A flaw is present in the application, which fails to handle a crafted web site. Successful exploitation could allow an attacker to bypass the Address Space Layout Randomization (ASLR) security feature.

The host is installed with Microsoft Windows 8, 8.1, Server 2012 or 2012 R2 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, due to which it improperly conducts integrity checks on tasks. Successful exploitation could allow attackers to run arbitrary code in the security context of the local system.

The host is installed with Microsoft Windows Server 2003, Server 2008, Server 2008 R2, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8 or Windows 8.1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to take complete control of the affected s ...

The host is installed with .Net framework 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1 or 4.5.2 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which inadvertently processes data prior to verification. Successful exploitation allows attacker to take complete control of the affected system and could then install programs; view, change, or delete data; or create ...

The host is installed with .Net framework 2.0 SP2 or 3.5.1 and is prone to a ASLR execution vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted content. Successful exploitation allows attacker to bypass the ASLR security feature.

The host is installed with Microsoft Internet information services 8.0 or 8.5 and is prone to security feature bypass vulnerability. A flaw is present in the application, which improperly compare incoming web requests against the "IP and domain restriction" filtering list. Successful exploitation could allow attackers to access a website that an IIS administrator believed was restricted.


Pages:      Start    1413    1414    1415    1416    1417    1418    1419    1420    1421    1422    1423    1424    1425    1426    ..   1485

© SecPod Technologies