[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Subversion 1.0.0 before 1.5.7 or 1.6.x before 1.6.4 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle an svndiff stream with large windows. Successful exploitation could allow attackers to execute arbitrary commands.

The host is installed with vlc media player before 0.9.0 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle via a crafted set of 16-bit length values. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with vlc media player before 0.9.0 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle an invalid "number of axes" field in a Printer Font Binary (PFB) file. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with .Net framework 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1 or 4.5.2 and is prone to denial of service vulnerability. A flaw are present in the applications, which does not properly use a hash table for request data. Successful exploitation allows for an unauthenticated attacker to degrade the performance of a .NET-enabled website, creating a denial of service co ...

The host is installed with Microsoft Windows Server 2003, Vista or Server 2008 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which is caused when the FASTFAT driver executes a function that results in a buffer under-allocation issue. Successful exploitation could install programs; view, change, or delete data; or create new accounts with full user r ...

The host is installed with .Net framework 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1 or 4.5.2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly parse specially crafted internationalized resource identifiers resulting in memory corruption. Successful exploitation allows attacker to execute the arbitrary code.

The host is installed with Internet Explorer 6, 7, 8, 9 or 10 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted website. Successful exploitation could allow attackers to gain the same user rights as the current user.

The host is installed with Microsoft Windows Server 2003, Server 2008, Server 2008 R2, Server 2012 or Server 2012 R2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle specially crafted username strings. Successful exploitation could allow attackers to send specially crafted username strings to an Internet Authentication Service (IAS) or ...

The host is installed with Microsoft Office 2007 SP3, Excel 2007 SP3, PowerPoint 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Office 2013 Gold or SP1, Word 2013 Gold or SP1, Office 2013 RT Gold or SP1, Word 2013 RT Gold or SP1, Excel Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Excel Services on Sha ...

The host is installed with Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 Gold or SP1, Word 2013 RT Gold or SP1, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 Gold or SP1, Web Applications 2010 SP2 or Web Apps Server 2013 Gold or SP1 and is prone to a remote code execution v ...


Pages:      Start    1445    1446    1447    1448    1449    1450    1451    1452    1453    1454    1455    1456    1457    1458    ..   1502

© SecPod Technologies