[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

139033

 
 

909

 
 

112583

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 16854 Download | Alert*

The host is installed with Apple iTunes before 12.9.5 or Apple iCloud before 7.12 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle an input validation issue. Successful exploitation could allow attackers to execute arbitrary code through a malicious SQL query.

The host is installed with Apple iTunes before 12.9.5 or Apple iCloud before 7.12 and is prone to an improper access control vulnerability. A flaw is present in the applications, which fail to properly handle an input validation issue. Successful exploitation could allow attackers to read restricted memory through a malicious application.

The host is installed with Apple iTunes before 12.9.5 or Apple iCloud before 7.12 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle vulnerable code. Successful exploitation could allow attackers to gain elevated privileges through an application.

The host is installed with Apple iTunes before 12.9.5 or Apple iCloud before 7.12 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle a memory issue. Successful exploitation could allow attackers to gain elevated privileges through an application.

A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then in ...

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then ins ...

A security feature bypass vulnerability exists in Microsoft Office software by not enforcing macro settings on an Excel document. The security feature bypass by itself does not allow arbitrary code execution. To successfully exploit the vulnerability, an attacker would have to embed a control in an Excel worksheet that specifies a macro should be run. To exploit the vulnerability, an attacker woul ...

An information disclosure vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security ...

The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU1-MP1 and is prone to a remote file inclusion vulnerability. A flaw is present in the application, which fails to sanitize malicious input. Successful exploitation could allow attackers to conduct file-insertion attacks and execute arbitrary code.

The host is installed with Symantec Endpoint Manager 11.0 RU6 before 11.0 RU7 MP1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle flood of packets. Successful exploitation could allow attackers to crash the service.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1685

© SecPod Technologies