[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14848 Download | Alert*

The host is installed with oracle WebLogic through 10.3.6.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle WLS-Web services issue. Successful exploitation allows an attacker to partially access data.

The host is installed with Google Chrome before 44.0.2403.89 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a specially crafted website. Successful exploitation could allow attackers to execute arbitrary code on the system or cause a denial of service.

The host is installed with Google Chrome before 64.0.3282.119 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to potentially run arbitrary code outside sandbox via a crafted HTML page.

The host is installed with Google Chrome before 64.0.3282.119 and is prone to an address bar spoofing vulnerability. A flaw is present in the application, which fails to handle an unknown function of the component Omnibox. Successful exploitation allows attackers to carry out phishing-style attacks.

The host is installed with Artifex Ghostscript through 9.25 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle vectors involving the 1policy operator. Successful exploitation could allow attackers to bypass a sandbox protection mechanism.

The host is installed Google Chrome before 10.0.648.127, Apple Safari before 5.0.6 or Apple iTunes before 10.5 and is prone to denial of service vulnerability. A flaw is present in the application which does not properly handle attributes. Successful exploitation allow remote attackers to cause a denial of service(DOM tree corruption) via unknown vectors.

Mozilla Firefox ESR 60.3 : Mozilla developers and community members Daniel Veditz and Philipp reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.

The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU6 MP10 or 14.x before 14 RU1 MP1 and is prone to a local denial of service vulnerability. A flaw is present in the application, which fails to handle issues in code paths. Successful exploitation could allows local users to exploit an unspecified race condition to cause denial of service conditions on the target syste ...

The host is installed with Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU6 MP10 or 14.x before 14 RU1 MP1 and is prone to a local privilege escalation vulnerability. A flaw is present in the application, which fails to handle the resources. Successful exploitation could allows a user to gain elevated access to resources that are normally protected at lower access levels.

The host is installed with Google Chrome before 10.0.648.127, Apple Safari before 5.0.6 or Apple iTunes before 10.5 and is prone to denial of service vulnerability. A flaw is present in the applications which does not properly handle SVG cursors. Successful exploitation allow remote attackers to cause a denial of service via unknown vectors that lead to a "stale pointer".


Pages:      Start    1058    1059    1060    1061    1062    1063    1064    1065    1066    1067    1068    1069    1070    1071    ..   1484

© SecPod Technologies