[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26831 Download | Alert*

The host is installed with Microsoft Excel 2003 and is prone to record memory corruption vulnerability. A flaw is present in the application which is caused by a specially crafted Excel file. Successful exploitation allows remote attacker to install programs, view, change, or delete data, or create new accounts with full user rights and could take complete control of an affected system.

The host is installed with Microsoft Publisher 2003 or 2007 and is prone to Function Pointer Overwrite Vulnerability. A flaw is present in the application which is caused by a specially crafted Publisher file. Successful exploitation allows remote attacker to install programs, view, change, or delete data, or create new accounts with full user rights and could take complete control of an affected ...

The host is installed with Microsoft Publisher 2003 or 2007 and is prone to Out-of-bounds Array Index Vulnerability. A flaw is present in the application which is caused by a specially crafted Publisher file. Successful exploitation allows remote attacker to install programs, view, change, or delete data, or create new accounts with full user rights and could take complete control of an affected s ...

The host is installed with Microsoft Publisher 2003 or 2007 and is prone to Memory Corruption Vulnerability. A flaw is present in the application which is caused by a specially crafted Publisher file. Successful exploitation allows remote attacker to install programs, view, change, or delete data, or create new accounts with full user rights and could take complete control of an affected system.

The host is installed with Microsoft Time component and is prone to remote code execution vulnerability. A flaw is present in the application which is caused by a specially crafted Web page. Successful exploitation allows remote attacker gain user rights as the logged-on user.

The host is installed with VMware Workstation 8.x before 8.0.4 or VMware Player 4.x before 4.0.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted traffic from a remote virtual device. Successful exploitation allow remote attackers to cause a denial of service (guest OS crash).

The host is installed with VMware Movie Decoder before 6.5.3 build 185404, VMware Workstation 6.5.x before 6.5.3 build 185404 or VMware Player 2.5.x before 2.5.3 build 185404 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted AVI file that triggers heap memory corruption. Successful exploitation allow remote attackers to ...

The host is installed with VMware Movie Decoder before 6.5.5 build 328052, 7.x before 7.1.2 build 301548, VMware Workstation 6.5.x before 6.5.5 build 328052, 7.x before 7.1.2 build 301548, VMware Player 2.5.x before 2.5.5 build 246459 or 3.x before 3.1.2 build 301548 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted video file. ...

The host is installed with Microsoft SharePoint Server 2010 and is prone to cross-site scripting vulnerability. A flaw is present due to improper handling of URL containing malicious JavaScript elements. Successful exploitation could allow attackers to issue SharePoint commands in the context of the authenticated user on the targeted SharePoint site.

The host is installed with Microsoft SharePoint Server 2010 and SharePoint Foundation 2010 and is prone to cross-site scripting vulnerability. A flaw is present due to improper handling of URL containing malicious JavaScript elements. Successful exploitation could allow attackers to issue SharePoint commands in the context of the authenticated user on the targeted SharePoint site.


Pages:      Start    2648    2649    2650    2651    2652    2653    2654    2655    2656    2657    2658    2659    2660    2661    ..   2683

© SecPod Technologies