[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

126348

 
 

909

 
 

102767

 
 

150

 
 
Paid content will be excluded from the download.

Filter
Matches : 10073 Download | Alert*

The host is installed with VideoLAN VLC media player through 3.0.7 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle an issue in modules/demux/mkv/util.cpp file. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Oracle Weblogic Server 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unauthenticated network access. Successful exploitation results in takeover of Oracle WebLogic Server.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.4 and is prone to a denial of service vulnerability. A flaw is present in the OpenSSL, which mishandles errors caused by malformed X509_ATTRIBUTE data. Successful exploitation could allow remote attackers to cause a denial of service or may cause memory leak.

The host is installed with Oracle Java SE through 7u211, 8u202, 11.0.2 or 12 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to RMI. Successful exploitation allows attackers to affect integrity.

The host is installed with Oracle Java SE through 7u211, 8u202, 11.0.2 or 12 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Libraries. Successful exploitation allows attackers to affect availability.

Mozilla Firefox 65.0.1, Mozilla Firefox ESR 60.5.1: A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw.

The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to have unspecified impact.

The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to have unspecified impact.

The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to have unspecified impact.

The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to have unspecified impact.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1007

© SecPod Technologies