[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14850 Download | Alert*

The host is installed with Internet Explorer 9 or 10 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly access an object in memory. Successful exploitation allows attackers to execute arbitrary code in the context of the current user.

The host is installed with Internet Explorer 6, 7, 8, 9 or 10 and is prone to cross-site-scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly handle certain character sequences. Successful exploitation allows attackers to perform cross-site scripting attacks.

The host is installed with Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 or Windows 8 and is prone to elevation of privilege vulnerability. The flaw is present in the Windows kernel, which fails to handle memory corruption condition in the NT Virtual DOS Machine (NTVDM). Successful exploitation could allow attackers to run arbitrary code in kernel mode.

The host is installed with Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 or Windows 8 and is prone to elevation of privilege vulnerability. The flaw is present in the Windows kernel, which fails to handle memory corruption condition in the NT Virtual DOS Machine (NTVDM). Successful exploitation could allow attackers to run arbitrary code in kernel mode.

The host is installed with Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 or Windows 8 and is prone to elevation of privilege vulnerability. The flaw is present in the Windows kernel, which fails to handle memory corruption condition in the NT Virtual DOS Machine (NTVDM). Successful exploitation could allow attackers to run arbitrary code in kernel mode.

The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to terminate packet-data processing after finding zero remaining bytes. Successful exploitation allows attackers to cause a denial of service (loop) via a crafted packet.

The host is installed with Oracle MySQL 5.5.31 or earlier or 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server Replication. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to InnoDB. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to XA Transactions. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.5.31 or earlier or 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Audit Log. Successful exploitation allows attackers to affect integrity.


Pages:      Start    1156    1157    1158    1159    1160    1161    1162    1163    1164    1165    1166    1167    1168    1169    ..   1484

© SecPod Technologies