[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14850 Download | Alert*

The host is installed with Citrix Workspace App before 1912 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow local user to escalate their privilege level to administrator during the uninstallation process.

The host is installed with Citrix Workspace App before 1912 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow local user to escalate their privilege level to administrator during the uninstallation process.

The host is installed with Citrix Workspace App before 1904 or Citrix Receiver before 4.9 CU6(4.9.6001) and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to enforce local drive access preferences. Successful exploitation could allow attackers to get read/write access to the clients local drives which could enable code execution on the client d ...

The host is installed with Real Networks RealPlayer and is prone to buffer overflow vulnerability. A flaw is present in rvrender.dll, which fails to handle malicious Internet Video Recording (IVR) files. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Symantec Endpoint Protection (SEP) 12.x before 12.1 RU6 MP10 or 14.x before 14.2 RU2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to compromise the software application to gain elevated access to resources that are normally protected fro ...

The host is installed with Symantec Endpoint Protection Manager (SEPM) 14.x before 14.2 RU1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to compromise the software application to gain elevated access to resources that are normally protected from an application or ...

The host is installed with Symantec Endpoint Protection Manager (SEPM) 14.x before 14.2 RU2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to compromise the software application to gain elevated access to resources that are normally protected from an application or ...

The host is installed with Symantec Endpoint Protection (SEP) 14.x before 14.2 RU2 and is prone to a password protection bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to bypass the secondary layer of password protection with local administrator rights.

The host is installed with Symantec Endpoint Protection (SEP) 14.x before 14.2 RU2 and is prone to an unsigned code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute code without a resident proper digital signature.

The host is installed with Symantec Endpoint Protection (SEP) 14.x before 14.2 RU2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to compromise the software application to gain elevated access to resources that are normally protected from an application or user.


Pages:      Start    1093    1094    1095    1096    1097    1098    1099    1100    1101    1102    1103    1104    1105    1106    ..   1484

© SecPod Technologies