[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14850 Download | Alert*

The host is installed with Google Chrome and is prone to security bypass vulnerability. A flaw is present in the browser, which fails to enforce ASLR/DEP/Sandbox security restrictions and fails to validate data. Successful exploitation could allow remote attackers to cause bypass security restriction, execute arbitrary code or cause denial of service.

The host is installed with Opera Browser and is prone to memory-corruption vulnerability. A flaw is present in the application which is caused by an error when handling malformed tags. Successful exploitation allows remote attacker to execute arbitrary code and cause denial of service condition.

The host is installed with Adobe Flash Media Server and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle malicious XML data. Successful exploitation could allow remote attackers to cause a denial of service.

The host is installed with SharePoint Server 2013 Client Components SDK, Microsoft SharePoint Designer 2007 SP3, 2010 SP1, SP2, 2013, SP1, Microsoft Office Web Apps Server 2013, SP1, Microsoft Windows SharePoint Services 3.0 SP3, SharePoint Server 2007, 2010 SP1, SP2, 2013, Microsoft SharePoint Foundation 2013 , 2010 SP1, SP2, Microsoft Web Applications 2010 SP1, SP2, Microsoft Project Server 2013 ...

The host is installed with SharePoint Server 2013 Client Components SDK, Microsoft Office Web Apps Server 2013, SP1, Microsoft SharePoint Server 2013 or Microsoft SharePoint Foundation 2013 and is prone to elevation of privilege vulnerability. A flaw is present in the applications, which fail to properly sanitize a specially crafted request to an affected SharePoint server. Successful exploitation ...

The host is installed with Microsoft Web Applications 2010 SP1 or SP2 and is prone to remote code execution vulnerability. A flaw is present in the application, which fail to properly sanitize the page content. Successful exploitation allows attackers to run arbitrary code in the security context of the W3WP service account.

The host is installed with Apache HTTP Server 2.4.18 through 2.4.20 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a SSL client certificate validation. Successful exploitation could allow remote attackers to access resources protected by certificate authentication without providing a valid client certificate.

The host is installed with Apple iTunes before 12.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple iTunes before 12.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple iTunes before 12.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    1293    1294    1295    1296    1297    1298    1299    1300    1301    1302    1303    1304    1305    1306    ..   1484

© SecPod Technologies