[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

123799

 
 

909

 
 

102660

 
 

150

 
 
Paid content will be excluded from the download.

Filter
Matches : 14538 Download | Alert*

The host is installed with AnyDesk before 3.6.1 and is prone to a dll injection vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could result in dll injection vulnerability.

The host is installed with Dell SupportAssist before 3.2.0.90 and is prone to an improper origin vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to attempt CSRF attacks on users of the impacted systems.

The host is installed with Dell SupportAssist before 3.2.0.90 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary executables.

The host is installed with Adobe Media Encoder before 13.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to disclose sensitive information.

The host is installed with Adobe Media Encoder before 13.1 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with VideoLAN VLC media player before 3.0.7 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an invalid AVI file. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 32.0.0.207 or flash plugin for IE10, IE 11 or Microsoft Edge and is prone to a use-after-free vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

An elevation of privilege vulnerability exists when the Windows Shell fails to validate folder shortcuts. An attacker who successfully exploited the vulnerability could elevate privileges by escaping a sandbox.To exploit this vulnerability, an attacker would require unprivileged execution on the victim system.The security update addresses the vulnerability by correctly validating folder shortcuts.

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system.There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing ...

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system.There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1453

© SecPod Technologies