[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

251139

 
 

909

 
 

196159

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 10958 Download | Alert*

The host is installed with Adobe Reader before 8.1.6 or 9.x before 9.1.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Reader before 8.1.6 or 9.x before 9.1.2 and is prone to a multiple heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted PDF file with a JPX. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Adobe Reader before 8.1.6 or 9.x before 9.1.2 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with Adobe Reader before 8.1.6 or 9.x before 9.1.2 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with Oracle Weblogic Server 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to take over the server without authorization.

The host is installed with gnutls before 3.1.0 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate. Successful exploitation could allow remote attackers to conduct downgrade attacks.

The host is installed with gnutls on Red Hat Enterprise Linux 6 or 7 and is prone to a cross-signature attack vulnerability. A flaw is present in the application, which fails to properly validate whether the two signature algorithms match on certificate import. Successful exploitation could allow attackers to produce forged certificate.

The host is installed with Elasticsearch 6.7.x through 6.8.3 and 7.x through 7.3.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle an issue in API Key service. Successful exploitation could allow attackers to send a specially crafted request and determine if a username exists in the Elasticsearch native realm.

The host is installed with Elasticsearch 6.7.x through 6.8.3 and 7.x through 7.3.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle an issue in API Key service. Successful exploitation could allow attackers to send a specially crafted request and determine if a username exists in the Elasticsearch native realm.

The intr function in sound/oss/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "double fetch" vulnerability.


Pages:      Start    1062    1063    1064    1065    1066    1067    1068    1069    1070    1071    1072    1073    1074    1075    ..   1095

© SecPod Technologies