[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14840 Download | Alert*

The host is installed with Pidgin before 2.11.0 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle the password encryption. Successful exploitation allows attackers to decrypt hashed passwords by leveraging knowledge of client registration codes or gain login access by eavesdropping on login messages and re-using the hashed ...

The host is installed with Pidgin before 2.11.0 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle a crafted MXIT data. Successful exploitation allows attackers to convince users to enter a particular string which would then get converted incorrectly and could lead to a potential out-of-bounds read.

The host is installed with Pidgin before 2.11.0 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to properly handle a crafted MXIT data. Successful exploitation allows attackers to provide an invalid filename for a splash image.

The host is installed with Pidgin before 2.12.0 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle a invalid xml. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 56.0.2924.76 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 58.0.3029.96 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with LibreOffice before 5.1.6 or 5.2.x before 5.2.2 and is prone to an arbitrary file disclosure vulnerability. A flaw is present in the application, which fails to handle embedded object. Successful exploitation could allow remote attackers to expose details of the environment LibreOffice is running in.

The host is installed with LibreOffice before 5.2.5 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted emf file. Successful exploitation could allow remote attackers to trigger a heap buffer overflow.

The host is installed with LibreOffice before 5.2.5 and is prone to a heap-buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted wmf file. Successful exploitation could allow remote attackers to trigger a heap buffer overflow.

An elevation of privilege vulnerability exists when SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scripting attacks ...


Pages:      Start    1031    1032    1033    1034    1035    1036    1037    1038    1039    1040    1041    1042    1043    1044    ..   1483

© SecPod Technologies