[Forgot Password]
Login  Register Subscribe

24002

 
 

127027

 
 

102010

 
 

909

 
 

81374

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 12360 Download | Alert*

An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses ...

The host is installed with LibreOffice through 6.0.1 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to properly handle =WEBSERVICE calls in a document. Successful exploitation could allow remote attackers to read arbitrary files.

The host is installed with Piriform CCleaner 3.26.0.1988 through 5.02.5101 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unallocated disk space. Successful exploitation could allow remote attackers to disclose sensitive information.

The host is installed with Notepad++ before 4.8.1 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle a trojan horse update. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with Notepad++ 6.6.9 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a long time attribute in an event element in an XML file. Successful exploitation could allow remote attackers to have unspecified impact.

A Denial of Service vulnerability exists when .NET, and .NET core, improperly process XML documents. An attacker who successfully exploited this vulnerability could cause a denial of service against a .NET application. A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to a .NET(or .NET core) application.

A security feature bypass vulnerability exists when Microsoft .NET Framework (and .NET Core) components do not completely validate certificates. An attacker could present a certificate that is marked invalid for a specific use, but the component uses it for that purpose. This action disregards the Enhanced Key Usage taggings. The security update addresses the vulnerability by helping to ensure tha ...

The host is installed with Google Chrome before 64.0.3282.167 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle derived class instantiation in V8. Successful exploitation allows attackers to exploit this issue to bypass certain security restrictions to gain unauthorized access.

The host is installed with Adobe Flash Player before 18.0.0.268, 19.x, 20.x before 20.0.0.228 or Adobe AIR before 20.0.0.204 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the applications, which fail to properly handle an MP3 file with COMM tags that are mishandled during memory allocation. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 18.0.0.324, 19.x, 20.x before 20.0.0.267 , Adobe AIR before 20.0.0.233, Internet Explorer 10, Internet Explorer 11 or Microsoft Edge and is prone to an integer overflow vulnerability. A flaw is present in the applications, which fail to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1235

© 2013 SecPod Technologies