[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26884 Download | Alert*

Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting SGX, may allow a privileged user to potentially enable escalation of privilege via local access.

The host is installed with Apache Jena 4.4.0 or Apache Jena before 4.2.0 or and is prone to an XML external entity (XXE) vulnerability. A flaw is present in the application, which fails to properly handle the RDF/XML parser. Successful exploitation could allow an attacker to cause an external DTD to be retrieved.

The host is installed with WinRAR through 5.60 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle the parsing of crafted ACE and RAR archive formats. Successful exploitation allows attackers to perform arbitrary code execution in the context of the current user.

The host is installed with WinRAR through 5.61 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle the crafting of the filename field of the ACE format (in UNACEV2.dll). Successful exploitation allows attackers to manipulate the filename field with specific patterns and ignore the destination (extraction) folder, thus treating the fi ...

The host is installed with WinRAR through 5.60 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle the parsing of a crafted LHA / LZH archive formats. Successful exploitation allows attackers to perform arbitrary code execution in the context of the current user.

The host is installed with WinRAR through 5.61 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle the crafting of the filename field of the ACE format. Successful exploitation allows attacker to create empty files and folders everywhere in the file system.

The host is installed with WinRAR before 5.30.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle a trojan horse file. Successful exploitation allows local users to gain privileges.

The host is installed with WinRAR before 3.71 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to handle crafted ACE, ARJ, BZ2, CAB, GZ, LHA, RAR, TAR or ZIP files. Successful exploitation have unknown impact and attack vectors.

The host is installed with Kaseya VSA Agent and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle improper authentication validation through the web panel. Successful exploitation could allow a remote attacker to bypass security restrictions and deploy arbitrary programs to all connected clients via crafted SQL commands.

The host is installed with WSO2 API Manager version 2.2.0 through 4.0.0 and is prone to a path traversal vulnerability. A flaw is present in the applications which fails to properly handle unrestricted file upload with resultant remote code execution. Successful exploitation allows remote attackers to execute code.


Pages:      Start    1676    1677    1678    1679    1680    1681    1682    1683    1684    1685    1686    1687    1688    1689    ..   2688

© SecPod Technologies