[Forgot Password]
Login  Register Subscribe

24437

 
 

132035

 
 

118831

 
 

909

 
 

92766

 
 

143

 
 
Paid content will be excluded from the download.

Filter
Matches : 14618 Download | Alert*

An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user system. The update addresses the vulnerability by correcting how the Wind ...

A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine. To exploit the vulnerability, an attacker would first have to access the local machine, and then run a malicious program. The update addresses the vulnerabi ...

A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine. To exploit the vulnerability, an attacker would first have to access the local machine, and then run a malicious program. The update addresses the vulnerabi ...

A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine. To exploit the vulnerability, an attacker would first have to access the local machine, and then run a malicious program. The update addresses the vulnerabi ...

Mozilla Firefox 65.0.1, Mozilla Firefox ESR 60.5.1, Thunderbird 60.5.1 : An integer overflow vulnerability in the Skia library can occur after specific transform operations, leading to a potentially exploitable crash.

The host is installed with Google Chrome before 71.0.3578.80, Firefox before 65.0.1, Firefox ESR before 60.5.1 or Thunderbird before 60.5.1 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Thunderbird before 60.5.1 and is prone to a signature spoofing vulnerability. A flaw is present in the application, which fails to handle S/MIME signatures. Successful exploitation allows an attacker to reuse a valid S/MIME signature to craft an email message with arbitrary content..

The host is installed with Audacity version 2.1.2 and is prone to a dll hijack vulnerability. A flaw is present in the application, which fails to properly handle the avformat-55.dll file. Successful exploitation could result in a DLL Hijack.

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fe ...

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fe ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1461

© SecPod Technologies