[Forgot Password]
Login  Register Subscribe

24003

 
 

131517

 
 

106747

 
 

909

 
 

84817

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 11230 Download | Alert*

The host is installed with Lenovo System Update before 3.14 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly validate the certificate when establishing an SSL connection. Successful exploitation could allow attackers to install arbitrary packages.

The host is installed with Lenovo System Update before 5.07.0019 and is prone to a local privilege escalation vulnerability. A flaw is present in the application, which allows local users to gain privileges by navigating to (1) "Click here to learn more" or (2) "View privacy policy" within the Tvsukernel.exe GUI application. Successful exploitation could allow local users to gain privileges.

The host is installed with Lenovo System Update before 5.07.0019 and is prone to a temporary administrator account vulnerability. A flaw is present in the application, which allows local users to gain privileges by making a prediction of tvsu_tmp_xxxxxXXXXX account credentials that requires knowledge of the time that this account was created. Successful exploitation could allow local users to pred ...

The host is installed with Lenovo System Update before 5.07.0013 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which improperly local users to submit commands to the System Update service. Successful exploitation could allow local users to gain privileges by launching signed Lenovo executables.

The host is installed with Lenovo System Update before 5.06.0034 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly generate security tokens. Successful exploitation could allow local users to gain privileges.

The host is installed with Lenovo System Update before 5.06.0034 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly validate CA chains during signature validation. Successful exploitation could allow attackers to upload and execute arbitrary files.

The host is installed with Lenovo System Update before 5.06.0034 and is prone to a race condition vulnerability. A flaw is present in the application, which fails to properly assign permissions to the update files directory. Successful exploitation could allow local users to gain privileges by writing to an update file after the signature is validated.

The host is installed with Adobe Flash Player before 29.0.0.171 or flash plugin for IE10, IE 11 or Microsoft Edge and is prone to a type confusion vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could lead to arbitrary code execution.

The host is installed with Acrobat DC Classic or Acrobat Reader DC Classic before 15.006.30418 , Acrobat DC Continuous or Acrobat Reader DC Continuous before 18.011.20040, Acrobat 2017 or Acrobat Reader 2017 before 17.011.30080 and is prone to a heap overflow vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could lead to arbitr ...

The host is installed with Acrobat DC Classic or Acrobat Reader DC Classic before 15.006.30418 , Acrobat DC Continuous or Acrobat Reader DC Continuous before 18.011.20040, Acrobat 2017 or Acrobat Reader 2017 before 17.011.30080 and is prone to a heap overflow vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could lead to arbitr ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1122

© 2013 SecPod Technologies