[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14858 Download | Alert*

Google Chrome before 7.0.517.41 does not properly handle the unloading of a page, which allows remote attackers to spoof URLs via unspecified vectors.

Google Chrome before 6.0.472.59 does not properly implement Geolocation, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.

The host is installed with PostgreSQL 9.3.3 or earlier versions and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly invoke initdb to specify the authentication requirements for a database cluster to be used for the tests. Successful exploitation allow local users to gain privileges by leveraging access to this cluster.

The host is installed with Apache HTTP Server 2.4.17 through 2.4.23 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle exceptional conditions. Successful exploitation could allow remote attackers to cause a denial of service.

The host is installed with Apache HTTP Server 2.4.17 or 2.4.18 and is prone to a remote denial of service vulnerability. A flaw is present in the application, which fails to handle exceptional conditions. Successful exploitation could allow remote attackers to cause a denial of service.

The host is installed with Apache HTTP Server 2.4.25 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle a maliciously constructed HTTP/2 request. Successful exploitation could allow attackers to dereference a NULL pointer and crash the server process.

The host is installed with Citrix Workspace App before 2105 or before 1912 LTSR CU4 and is prone to an improper access control vulnerability. A flaw is present in the application, which fails to handle unspecified issues. Successful exploitation could leads to local privilege escalation.

The host is installed with Apache OpenOffice 4.1.2 or earlier and is prone to an out-of-bounds memory access vulnerability. A flaw is present in the application, which fails to handle crafted MetaActions in an (1) ODP or (2) OTP file. Successful exploitation could allow attackers to crash the service.

The host is installed with Apache OpenOffice before 4.1.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a file that impersonates a dynamic-link library. Successful exploitation could allow attackers to execute an arbitrary code with elevated privileges.

The host is installed with Apache OpenOffice before 4.1.3 and is prone to an unquoted Windows search path vulnerability. A flaw is present in the application, which fails to handle execution of unwanted software installed by a Trojan Horse application. Successful exploitation could allow attackers to crash the service.


Pages:      Start    1303    1304    1305    1306    1307    1308    1309    1310    1311    1312    1313    1314    1315    1316    ..   1485

© SecPod Technologies