[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15799 Download | Alert*

The host is installed with Kibana before 6.8.9 or 7.x before 7.7.0 and is prone to a prototype pollution vulnerability. A flaw is present in the application, which fails to properly handle an issue in Upgrade Assistant. Successful exploitation could allow an authenticated attacker to insert data that would cause Kibana to execute arbitrary code.

The host is installed with Kibana before 6.8.6 or 7.x before 7.5.1 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in the coordinate and region map visualizations. Successful exploitation could allow an attacker to execute JavaScript in the victims browser.

The host is installed with Kibana before 5.6.15 or 6.x before 6.6.1 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in unspecified vectors. Successful exploitation could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users.

The host is installed with Xcode before 11.2 on Apple Mac OS X 10.14.4 or later and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted file. Successful exploitation may lead to arbitrary code execution.

The host is installed with Xcode before 11.2 on Apple Mac OS X 10.14.4 or later and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted file. Successful exploitation may lead to arbitrary code execution.

The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user.

The host is installed with Microsoft Office 2011 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user.

The host is installed with Microsoft Office 2011 for Mac and is prone to an integer underflow vulnerability. A flaw is present in the application, which decreases an integer value beyond its intended minimum value. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attac ...

The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user.

The host is installed with Apple Mac OS X 10.6.8 and is prone to an out-of-bounds memory access vulnerability. A flaw is present in the application, which fails to handle embedded Type 1 fonts. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1567    1568    1569    1570    1571    1572    1573    1574    1575    1576    1577    1578    1579    ..   1579

© SecPod Technologies