[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252271

 
 

909

 
 

196835

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26864 Download | Alert*

The host is installed with Adobe InDesign before 16.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.

The host is installed with Apache Spark through 3.0.3, 3.1.1 through 3.1.2 or 3.2.0 through 3.2.1 and is prone to a command injection vulnerability. A flaw is present in the application, which fails to properly handle an issue in Spark UI as it can enable ACLs via the configuration option spark.acls.enable. Successful exploitation could allows attackers to reach a permission check function that wi ...

Microsoft Excel Information Disclosure Vulnerability

Microsoft SharePoint Server Remote Code Execution Vulnerability

Microsoft Office Graphics Remote Code Execution Vulnerability

Microsoft Office Graphics Remote Code Execution Vulnerability

Exploitation of the vulnerability requires that a user open a specially crafted file. * In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. * In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) ...

Exploitation of the vulnerability requires that a user open a specially crafted file. * In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. * In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) ...

Exploitation of the vulnerability requires that a user open a specially crafted file. * In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. * In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) ...

Exploitation of the vulnerability requires that a user open a specially crafted file. * In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. * In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) ...


Pages:      Start    1754    1755    1756    1757    1758    1759    1760    1761    1762    1763    1764    1765    1766    1767    ..   2686

© SecPod Technologies