[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with HP System Management Homepage and is prone to remote code-execution vulnerability. A flaw is present in the application which is caused by errors in PHP, OpenSSL and Libxml. Successful exploitation allow remote attacker to cause a denial of service or compromise a vulnerable system.

A privilege escalation vulnerability is present in Windows Local Security Authority Subsystem Service (LSASS). A flaw is present in LSASS, which fails to process some specially crafted authentication requests. Successful exploitation could allow an attacker to gain additional privileges and execute arbitrary code.

The host is installed with IBM SolidDB and is prone to denial of service vulnerability. A flaw is present in the application which fails to properly handle the remote procedure commands. Successful exploitation allows remote attacker to cause the solidDB process to dereference a NULL pointer and subsequently crash.

The host is installed with Adobe Flash Media Server and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle malicious XML data. Successful exploitation could allow remote attackers to cause a denial of service.

The host is installed with SharePoint Server 2013 Client Components SDK, Microsoft SharePoint Designer 2007 SP3, 2010 SP1, SP2, 2013, SP1, Microsoft Office Web Apps Server 2013, SP1, Microsoft Windows SharePoint Services 3.0 SP3, SharePoint Server 2007, 2010 SP1, SP2, 2013, Microsoft SharePoint Foundation 2013 , 2010 SP1, SP2, Microsoft Web Applications 2010 SP1, SP2, Microsoft Project Server 2013 ...

The host is installed with Microsoft Web Applications 2010 SP1 or SP2 and is prone to remote code execution vulnerability. A flaw is present in the application, which fail to properly sanitize the page content. Successful exploitation allows attackers to run arbitrary code in the security context of the W3WP service account.

The host is installed with Apache HTTP Server 2.4.18 through 2.4.20 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a SSL client certificate validation. Successful exploitation could allow remote attackers to access resources protected by certificate authentication without providing a valid client certificate.

The host is installed with Google Chrome before 63.0.3239.84 and is prone to a URL spoofing vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 64.0.3282.119 and is prone to a Use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 64.0.3282.119 and is prone to a Same origin bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    1261    1262    1263    1264    1265    1266    1267    1268    1269    1270    1271    1272    1273    1274    ..   1502

© SecPod Technologies