[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252416

 
 

909

 
 

196839

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26665 Download | Alert*

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.1, 8.x before 8.1.4 or 9.x before 9.1 and is prone to an unspecified vulnerability. The flaw is present in the JBIG2, which fails to handle PDF file with a malformed JBIG2 symbol dictionary segment. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader and Acrobat 9.x before 9.1, 8.x before 8.1.4 or 7.x before 7.1.1 and is prone to an unspecified vulnerability. The flaw is present in the JBIG2, which fails to handle unknown attack vectors related to JBIG2. Successful exploitation allows remote attackers to trigger memory corruption and possibly execute arbitrary code.

The host is installed with 7-zip before 18.0 and is prone to multiple memory corruption vulnerabilities. A flaw is present in the application, which fails to handle a crafted RAR archive. Successful exploitation could allow remote attackers to crash the service.

The host is installed with RSA SecurID Software Token 4.1 before 4.1.1 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle a Trojan horse DLL in the current working directory. Successful could allow the local users to gain privileges.

The host is installed with Microsoft Office 2007 SP3, Office 2010 SP2 or Office 2013 SP1 and is prone to a security feature bypass vulnerability. The flaw is present in the applications, which fails to handle a specially crafted file. Successful exploitation allows attackers to bypass security feature.

A remote code execution vulnerability exists in Microsoft InfoPath when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install p ...

Buffer overflow in Microsoft Office XP allows remote attackers to execute arbitrary code via a link with a URL file location containing long inputs after (1) "\\\%00 (null byte) in .doc filenames or (2) "\\\%0a" (carriage return) in .rtf filenames.

Unknown vulnerability in Microsoft Excel 2000, 2002, 2001 for Mac, and v.X for Mac allows remote attackers to execute arbitrary code via a malicious file containing certain parameters that are not properly validated.

Unknown vulnerability in Microsoft Excel 2000, 2002, 2001 for Mac, and v.X for Mac allows remote attackers to execute arbitrary code via a malicious file containing certain parameters that are not properly validated.

The host is installed with Qbik WinGate 6.1.2.1094 or 6.1.3.1096 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle a issue in the IMAP service. Successful exploitation could allow remote attackers to read email of other users, or perform unauthorized operations on directories, via the (1) CREATE, (2) SELECT, (3) DELETE, (4) RENAME, (5) ...


Pages:      Start    2591    2592    2593    2594    2595    2596    2597    2598    2599    2600    2601    2602    2603    2604    ..   2666

© SecPod Technologies