[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14840 Download | Alert*

The host is installed with Adobe Dreamweaver CC versions 18.0 or earlier and is prone to command injection vulnerability. A flaw is present in the application, which fails to handle the URI handler. Successful exploitation allows attackers to inject operating system commands and execute arbitrary code on the target user's system.

The host is installed with Adobe Captivate 9 or earlier and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the crafted requests. Successful exploitation allows local users, and possibly remote attackers to view potentially sensitive information on the target system.

The host is installed with Adobe Captivate 9 or earlier and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle the quiz reporting feature. Successful exploitation allows local users, and possibly remote attackers to to read and write arbitrary files to the server.

The host is installed with Google Chrome before 70.0.3538.67 and is prone to a sandbox escape vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 70.0.3538.67 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 70.0.3538.67 and is prone to an URL spoof vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 70.0.3538.67 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 70.0.3538.67 and is prone to a URL spoof vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 70.0.3538.67 and is prone to a cross-origin URL disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 70.0.3538.67 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    1052    1053    1054    1055    1056    1057    1058    1059    1060    1061    1062    1063    1064    1065    ..   1483

© SecPod Technologies