[Forgot Password]
Login  Register Subscribe

23631

 
 

126998

 
 

101924

 
 

909

 
 

80911

 
 

121

 
 
Paid content will be excluded from the download.

Filter
Matches : 12358 Download | Alert*

The host is installed with Adobe Reader or Acrobat before 11.0.16, Acrobat or Acrobat Reader DC Classic before 15.006.30172 or Acrobat or Acrobat Reader DC Continuous before 15.016.20039 and is prone to an use-after-free vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Oracle MySQL Server through 5.5.58, through 5.6.38 or through 5.7.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Optimizer. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 5.5.58, through 5.6.38 or through 5.7.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Optimizer. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 5.5.58, through 5.6.38 or through 5.7.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Optimizer. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 5.5.58, through 5.6.38 or through 5.7.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: DDL. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 5.5.58, through 5.6.38 or through 5.7.19 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server : Partition. Successful exploitation allows attackers to affect Integrity and Availability.

The host is installed with Evernote before 6.3 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle a Trojan horse dll file in an unspecified directory. Successful exploitation could allow remote attackers to gain privileges in an unspecified directory.

An information disclosure vulnerability exists in ASP.NET Core that allows bypassing cross-origin resource sharing(CORS) configurations. An attacker who successfully exploited the vulnerability could retrieve content, that is normally restricted, from a web application.

An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scriptin ...

An open redirect vulnerability exists in ASP.NET Core that could lead to elevation of privilege. To exploit the vulnerability, an attacker could send a link that has a specially crafted URL, and convince the user to click the link.


Pages:      Start    7    8    9    10    11    12    13    14    15    16    17    18    19    20    ..   1235

© 2013 SecPod Technologies