[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Microsoft Word 2007 SP3, Word 2010 SP2 or Word 2013 SP1 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted office files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, or Office Compatibility Pack SP3 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted office files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Microsoft PowerPoint 2007 SP3, Word 2007 SP3, PowerPoint 2010 SP2, Word 2010 SP2, PowerPoint 2013 SP1, Word 2013 SP1 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted office files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Microsoft Excel 2010 SP2, Excel 2013 SP1, Excel Services on SharePoint Server 2010 SP2, or Excel Services on SharePoint Server 2013 SP1 and is prone to a Microsoft Excel ASLR bypass vulnerability. A flaw is present in the applications, which fail to handle a crafted spreadsheet. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel Viewer 2007 SP3 or Office Compatibility Pack SP3 and is prone to an untrusted search path vulnerability. A flaw is present in the applications, which fail to handle a Trojan horse DLL in the current working directory. Successful exploitation could allow attackers to gain privileges.

The host is installed with Microsoft Office 2007, Word 2007, 2010, Office Compatibility Pack, Sharepoint Server 2010 or Office Web Apps 2010 and is prone to a remote code execution vulnerability. A flaw is present in the applications, which fail to handle a crafted word file. Successful exploitation could allow an attacker to take complete control of the affected system.

The host is installed with Microsoft Word 2007, 2010, 2013, Office Compatibility Pack 2007, Sharepoint Server 2010, 2013, Office Web Apps 2010 or 2013 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle rich text format files. Successful exploitation could allow attackers to use a specially crafted file to perform actions in the security c ...

The host is installed with Microsoft Word 2007, 2010, Word Viewer, Office Compatibility Pack 2007, Sharepoint Server 2010 or Office Web Apps 2010 and is prone to an use after free vulnerability. A flaw is present in the applications, which fail to handle crafted office files. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Word 2007, 2010, 2013, Office Compatibility Pack 2007, Sharepoint Server 2010, 2013, Office Web Apps 2010, 2013 or Word Viewer and is prone to an use after free vulnerability. A flaw is present in the applications, which fail to handle crafted office files. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Word 2007, Office Compatibility Pack 2007 or Word Viewer and is prone to an use after free vulnerability. A flaw is present in the applications, which fail to handle crafted office files. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1336    1337    1338    1339    1340    1341    1342    1343    1344    1345    1346    1347    1348    1349    ..   1502

© SecPod Technologies