[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 7345 Download | Alert*

The host is installed with Python through versions 2.7.16 or 3.7.2 and is prone to a CRLF injection vulnerability. The flaw is present in the application, which fails to properly handle an issue in urrlib2. Successful exploitation allows attackers to initiate CRLF injection.

The host is installed with Microsoft .NET Framework or Microsoft Silverlight and is prone to a remote code execution vulnerability. Flaws are present in the Microsoft ASP.NET and Microsoft Silverlight, which fails to handle specially crafted web pages. Successful exploitation could allow attackers to execute arbitrary code on the affected system.

The host is installed with Microsoft Silverlight 5 or Microsoft Silverlight 5 Developer Runtime and is prone to double dereference vulnerability. A flaw is present in the application, which fails to handle a specially crafted Silverlight application. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new accounts with full user rights.

The host is installed with Google Chrome before 31.0.1650.48, Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, SeaMonkey before 2.23, Java SE 5.0 through 5.0u61, 6.0 through 6u71, 7.0 through 7u51, 8.0, Windows vista, server 2008, server 2008 R2, win 7, win server 2012, win server 2012 R2, Windows server 2016, win 10 or microsoft silverlight and earlier and is pr ...

The host is installed with Microsoft Silverlight 5 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle certain objects in memory. Successful exploitation allows attackers to disclose information on the local system.

The host is installed with Microsoft Office 2003 SP3 /2007 SP3 /2010 SP1, Windows, Visual Studio .NET 2003 SP1, Lync 2010, Lync Basic 2013 or Lync 2010 Attendee, and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly process crafted TrueType font (TTF) file. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Oracle Java SE 7 update 40 and earlier and is prone to unspecified vulnerability. The flaw is present in the application, which fails to handle vectors related to deployment. Successful exploitation allows remote attackers to affect confidentiality, integrity and availability.

The host is installed with Apache Subversion 1.7.11 through 1.7.12 or 1.8.0 through 1.8.4 and is prone to denial of service vulnerability. The flaw is present in get_parent_resource function in repos.c in mod_dav_svn Apache HTTPD server module in Apache Subversion, which fails to properly handle a non-canonical URL in a request, as demonstrated using a trailing /. Successful exploitation allows re ...

The host is installed with Mozilla Firefox before 43.0, Firefox ESR 38.x before 38.5 or Thunderbird 38.x before 38.5 and is prone to multiple unspecified vulnerabilities. The flaws are present in the applications, which fail to handle unknown vectors. Successful exploitation allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary ...

The host is installed with Mozilla Firefox before 43.0, Firefox ESR 38.x before 38.5 or Thunderbird 38.x before 38.5 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation allows remote attackers to cause a denial of service (memory corruption and application crash).


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   734

© SecPod Technologies