[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with PostgreSQL 11.x before 11.5, 10.x before 10.10, 9.6.x before 9.6.15, 9.5.x before 9.5.19, 9.4.x before 9.4.24 and is prone to a code execution vulnerability. A flaw is present in the application which fails to properly validate input. Successful exploitation allows execution of a code from unprotected directory.

The host is installed with Microsoft Office 2007 SP3, Office 2010 SP2 or Office 2013 SP1 and is prone to an use after free vulnerability. The flaw is present in the applications, which improperly handle objects in memory while parsing specially crafted office files. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Microsoft Windows Server 2003, Server 2008, Server 2008 R2, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8 or Windows 8.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted TrueType fonts. Successful exploitation could allow attackers to cause the target system to s ...

A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the ...

The host is installed with Oracle Java SE 5.0 before Update 20 and is prone to unspecified vulnerability. A flaw is present in the applications, which fails to properly handle unknown vectors. Successful exploitation has unknown impact and attack vectors.

The host is installed with the VMware Workstation 7.1.x before 7.1.4 or VMware Player 3.1.x before 3.1.4 and is prone to privilege escalation vulnerability via a race condition. A flaw is present in the application, which allows an attacker to access the guestOS to mount the arbitrary directories and hence gain control of the mounted directory. Successful exploitation leads to unauthorized modific ...

Unspecified vulnerability in Apple iTunes before 9.1 allows local users to gain console privileges via vectors related to log files, "insecure file operation," and syncing an iPhone, iPad, or iPod touch.

The host is installed with PGP Desktop 10.0.x through 10.2.x and Encryption Desktop Professional 10.3.x before 10.3.2 MP3 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted encrypted e-mail message that decompresses to a larger size. Successful exploitation allows remote attackers to cause a denial of service (CPU and memory consu ...

The host is installed with PGP Desktop 10.0.x before 10.0.3 SP2 and is prone to data insertion vulnerability. A flaw is present in the application, which does not properly implement the "Decrypt/Verify File via Right-Click" functionality for multi-packet OpenPGP messages that represent multi-message input. Successful exploitation allows remote attackers to spoof signed data by concatenating an add ...

The host is installed with Microsoft Windows Server 2003 SP2, Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, 8.1, Server 2012 or Server 2012 R2 and is prone to a security feature bypass vulnerability. A flaw is present in the application, that is caused by an issue in the TLS state machine whereby a client system accepts an RSA key with a shorter key length than the orig ...


Pages:      Start    1379    1380    1381    1382    1383    1384    1385    1386    1387    1388    1389    1390    1391    1392    ..   1502

© SecPod Technologies