[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14850 Download | Alert*

The host is installed with Adobe Media Encoder through 14.2 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Media Encoder through 14.2 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe ColdFusion 2016 before update 16 or 2018 before update 10 and is prone to a DLL search-order hijacking vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation allows remote attackers to escelate priveleges.

The host is installed with Adobe ColdFusion 2016 before update 16 or 2018 before update 10 and is prone to a DLL search-order hijacking vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation allows remote attackers to escelate priveleges.

The host is installed with Artifex Ghostscript 9.50 or 9.52 and is prone to a buffer underflow vulnerability. A flaw is present in the application, which fails to handle 'rsearch' calculation for the 'post' size. Successful exploitation could allow attackers to use a non-standard PostScript operator for overriding of file access controls.

The host is installed with TeamViewer versions before 8.x before 8.0.258861, 9.x before 9.0.258860, 10.x before 10.0.258873, 11.x before 11.0.258870, 12.x before 12.0.258869, 13.x before 13.2.36220, 14.x before 14.7.48350 or 15.x before 15.8.3 and is prone to an improper URL handling vulnerability. The flaw is present in Application which fails to handle custom URI. Successful exploitation allows ...

The host is installed with Opera before 11.01 and is prone to information disclosure vulnerability. A flaw is present in Opera which does not properly handle redirections and HTTP responses. Successful exploitation allows remote web servers to obtain sufficient access to local files and obtain potentially sensitive information from the contents of the files using an unknown response manipulation.

The host is installed with Telegram Desktop through 2.1.13 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to handle the Dangerous File Type Execution protection mechanism. Successful exploitation allows attackers to cause spoofing attacks.

Mozilla Firefox ESR 68.12 and Mozilla Thunderbird 68.12 : When aborting an operation, such as a fetch, an abort signal may be deleted while alerting the objects to be notified. This results in a use-after-free and we presume that with enough effort it could have been exploited to run arbitrary code.

The host is installed with Citrix Workspace App 1912, 2002, 2006 or 2006.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle automatic update service. Successful exploitation could allow attaclers to escalate priveleges.


Pages:      Start    1092    1093    1094    1095    1096    1097    1098    1099    1100    1101    1102    1103    1104    1105    ..   1484

© SecPod Technologies