[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8274 Download | Alert*

The host is installed with Acrobat DC Classic or Acrobat Reader DC Classic before 2015.006.30461 , Acrobat DC Continuous or Acrobat Reader DC Continuous before 2019.010.20064, Acrobat 2017 or Acrobat Reader 2017 before 2017.011.30110 and is prone to a security bypass vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could lead t ...

The host is installed with CA License software before 1.90.03 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to restrict system commands. Successful exploitation could allow attackers to gain privileges.

The host is installed with CA License software before 1.90.03 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to gain privileges.

The host is installed with Google SketchUp before 8.0.14346 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted SKP file. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Microsoft Office 2008 and 2011 for Mac and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle memory when opening specially crafted Excel files. Successful exploitation allows attackers to run arbitrary code.

The host is installed with Office 2008 and 2011 for Mac and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to properly handle memory when opening specially crafted Excel files. Successful exploitation allows attackers to run arbitrary code.

The host is installed with Office 2011 for Mac and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which is caused when Microsoft Excel encounters a modified data structure while parsing a specially crafted Excel file. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Splunk 4.0 through 4.3 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to prevent the injection of web script or HTML. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unknown vectors.

The host is installed with Bogofilter before 1.2.3 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle an email containing a base64 string. Successful exploitation could allow attackers to crash the service.

The host is installed with IBM Lotus Notes 8.5.x before 8.5.3 FP3 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to include the HTTPOnly flag in a Set-Cookie header for a web-application cookie. Successful exploitation allows remote attackers to obtain potentially sensitive information via script access to this cookie.


Pages:      Start    765    766    767    768    769    770    771    772    773    774    775    776    777    778    ..   827

© SecPod Technologies