[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26884 Download | Alert*

The host is installed with Microsoft Windows Server 2003, 2003 SP2, 2008, 2008 SP2, 2008 R2, 2008 R2 SP1, 2012 or 2012 R2 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly establish a secure communications channel to a primary domain controller (PDC). Successful exploitation could allow attackers to establish a secure channel to ...

The host is installed with Microsoft Windows Server 2003 SP2, Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, Windows 8.1, Server 2012 or Server 2012 R2 and is prone to an elevation of privilege vulnerability. A flaw is present in the Windows kernel-mode driver, which fails to properly handle objects in memory. Successful exploitation allows remote attackers to install pr ...

The host is installed with Microsoft Windows Server 2003 SP2, Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, Windows 8.1, Server 2012 or Server 2012 R2 and is prone to an information disclosure vulnerability. A flaw is present in the Windows kernel-mode driver, which fails to properly handle certain non-initialized values in memory. Successful exploitation allows remote ...

The host is installed with Microsoft Windows 7 SP1, Server 2008 R2 SP1, Windows 8, Windows 8.1, Server 2012 or Server 2012 R2 and is prone to an elevation of privilege vulnerability. A flaw is present in the Windows kernel-mode driver, which fails to properly handle objects in memory. Successful exploitation allows remote attackers to install programs; view, change, or delete data; or create new a ...

The host is installed with Microsoft Windows Server 2003 SP2, Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8 or Server 2012 and is prone to an elevation of privilege vulnerability. A flaw is present in the Windows kernel-mode driver, which fails to properly handle objects in memory. Successful exploitation allows remote attackers to install programs; view, change, or dele ...

The host is installed with Microsoft XML Core Services 3.0 or Microsoft XML Core Services 6.0 on Microsoft Windows Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, 8.1, Server 2012 or Server 2012 R2 or Microsoft XML Core Services 5.0 on Microsoft Office 2007 SP2, SP3 or Microsoft InfoPath 2007 SP3 and is prone to an information disclosure vulnerability. A flaw is present i ...

The host is installed with OpenAFS 1.6.0 before 1.6.1300 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted commands. Successful exploitation allows local users to read kernel memory.

The host is installed with OpenAFS before 1.6.1300 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle stack data. Successful exploitation allows remote attackers to obtain stack data by sniffing the network.

An information disclosure vulnerability exists in Lync 2013. An attacker who exploited it could read arbitrary files on the victim's machine. To exploit the vulnerability, an attacker needs to instantiate a conference and modify the meeting link with malicious content and send the link to a victim. The update addresses the vulnerability by changing how the URL is being resolved.

Host is installed with Kaspersky Anti-Virus 2019 before Patch F and is prone to an Information exposure vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted webpage. Successful exploitation allows an attacker to potentially disclose unique Product ID.


Pages:      Start    2644    2645    2646    2647    2648    2649    2650    2651    2652    2653    2654    2655    2656    2657    ..   2688

© SecPod Technologies