[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17304 Download | Alert*

The host is installed with Zoom Client through 4.6.8 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle an issue in the disable-library-validation entitlement. Successful exploitation allows attackers to obtain unprompted microphone and camera access by loading a crafted library and thereby inheriting Zoom Client's microphone and camer ...

The host is installed with Zoom Client through 4.6.8 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle an issue in the user-writable temporary directory. Successful exploitation allows attackers to obtain root access by replacing runwithroot through a local process (with the user's privileges).

The host is installed with Zoom Client before 4.4.52595.0425 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to handle an issue in the ZoomOpener daemon. Successful exploitation allows remote attackers to execute code with a maliciously crafted launch URL.

The host is installed with Opera before 9.63 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted certificate. Successful exploitation could allow attackers to spoof servers and obtain sensitive information.

The host is installed with Oracle Java SE 6 update 32 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Web Container or Deployment. Successful exploitation allows remote attackers to affect confidentiality and integrity.

The host is installed with Oracle Java SE 6 update 32 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Hotspot. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 6 update 32 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JAXP. Successful exploitation allows remote attackers to affect availability.

The host is installed with Oracle Java SE 6 update 32 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Hotspot. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 6 update 32 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 6 update 32 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.


Pages:      Start    786    787    788    789    790    791    792    793    794    795    796    797    798    799    ..   1730

© SecPod Technologies