[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255861

 
 

909

 
 

199025

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 27022 Download | Alert*

The host is installed with System Center Operations Manager 2012 or 2012 R2 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which does improper validation of input. An attacker who successfully exploited this vulnerability could inject a client-side script into the user's browser. The script could spoof content, disclose information, or take any action t ...

The host is installed with Microsoft Excel 2003 and is prone to record memory corruption vulnerability. A flaw is present in the application which is caused by a specially crafted Excel file. Successful exploitation allows remote attacker to install programs, view, change, or delete data, or create new accounts with full user rights and could take complete control of an affected system.

The host is installed with Microsoft Publisher 2003 or 2007 and is prone to Function Pointer Overwrite Vulnerability. A flaw is present in the application which is caused by a specially crafted Publisher file. Successful exploitation allows remote attacker to install programs, view, change, or delete data, or create new accounts with full user rights and could take complete control of an affected ...

The host is installed with Microsoft Publisher 2003 or 2007 and is prone to Out-of-bounds Array Index Vulnerability. A flaw is present in the application which is caused by a specially crafted Publisher file. Successful exploitation allows remote attacker to install programs, view, change, or delete data, or create new accounts with full user rights and could take complete control of an affected s ...

The host is installed with Microsoft Publisher 2003 or 2007 and is prone to Memory Corruption Vulnerability. A flaw is present in the application which is caused by a specially crafted Publisher file. Successful exploitation allows remote attacker to install programs, view, change, or delete data, or create new accounts with full user rights and could take complete control of an affected system.

The host is installed with Microsoft Time component and is prone to remote code execution vulnerability. A flaw is present in the application which is caused by a specially crafted Web page. Successful exploitation allows remote attacker gain user rights as the logged-on user.

The host is installed with VMware Workstation 8.x before 8.0.4 or VMware Player 4.x before 4.0.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted traffic from a remote virtual device. Successful exploitation allow remote attackers to cause a denial of service (guest OS crash).

The host is installed with VMware Movie Decoder before 6.5.3 build 185404, VMware Workstation 6.5.x before 6.5.3 build 185404 or VMware Player 2.5.x before 2.5.3 build 185404 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted AVI file that triggers heap memory corruption. Successful exploitation allow remote attackers to ...

The host is installed with VMware Movie Decoder before 6.5.5 build 328052, 7.x before 7.1.2 build 301548, VMware Workstation 6.5.x before 6.5.5 build 328052, 7.x before 7.1.2 build 301548, VMware Player 2.5.x before 2.5.5 build 246459 or 3.x before 3.1.2 build 301548 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted video file. ...

The host is installed with Microsoft SharePoint Server 2010 and is prone to cross-site scripting vulnerability. A flaw is present due to improper handling of URL containing malicious JavaScript elements. Successful exploitation could allow attackers to issue SharePoint commands in the context of the authenticated user on the targeted SharePoint site.


Pages:      Start    2667    2668    2669    2670    2671    2672    2673    2674    2675    2676    2677    2678    2679    2680    ..   2702

© SecPod Technologies