[Forgot Password]
Login  Register Subscribe

24436

 
 

131731

 
 

114846

 
 

909

 
 

89370

 
 

140

 
 
Paid content will be excluded from the download.

Filter
Matches : 12982 Download | Alert*

The host is installed with Citrix Receiver through 3.2 along with Citrix Receiver Online plug-in through 12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted malicious file from an SMB or WebDAV fileserver. Successful exploitation allows an attacker to execute arbitrary code on the client device in the conte ...

A buffer overflow vulnerability exists in the Microsoft SQL Server that could allow remote code execution on an affected system. An attacker who successfully exploited this vulnerability could execute code in the context of the SQL Server Database Engine service account. To exploit the vulnerability, an attacker would need to submit a specially crafted query to an affected SQL server.

The host is installed with Adobe Flash Player before 30.0.0.154 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause information disclosure.

The host is installed with Acrobat DC Classic or Acrobat Reader DC Classic before 2015.006.30434, Acrobat DC Continuous or Acrobat Reader DC Continuous before 2018.011.20055, Acrobat 2017 or Acrobat Reader 2017 before 2017.011.30096 and is prone to a heap overflow vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could lead to a ...

The host is installed with Acrobat DC Classic or Acrobat Reader DC Classic before 2015.006.30434, Acrobat DC Continuous or Acrobat Reader DC Continuous before 2018.011.20055, Acrobat 2017 or Acrobat Reader 2017 before 2017.011.30096 and is prone to an out-of-bounds write vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could le ...

The host is installed with Acrobat DC Classic or Acrobat Reader DC Classic before 2015.006.30434, Acrobat DC Continuous or Acrobat Reader DC Continuous before 2018.011.20055, Acrobat 2017 or Acrobat Reader 2017 before 2017.011.30096 and is prone to an out-of-bounds write vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could le ...

The host is installed with Acrobat DC Classic or Acrobat Reader DC Classic before 2015.006.30434, Acrobat DC Continuous or Acrobat Reader DC Continuous before 2018.011.20055, Acrobat 2017 or Acrobat Reader 2017 before 2017.011.30096 and is prone to an out-of-bounds write vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could le ...

The host is installed with Acrobat DC Classic or Acrobat Reader DC Classic before 2015.006.30434, Acrobat DC Continuous or Acrobat Reader DC Continuous before 2018.011.20055, Acrobat 2017 or Acrobat Reader 2017 before 2017.011.30096 and is prone to a use-after-free vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could lead to ...

The host is installed with Acrobat DC Classic or Acrobat Reader DC Classic before 2015.006.30434, Acrobat DC Continuous or Acrobat Reader DC Continuous before 2018.011.20055, Acrobat 2017 or Acrobat Reader 2017 before 2017.011.30096 and is prone to an out-of-bounds write vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could le ...

The host is installed with Acrobat DC Classic or Acrobat Reader DC Classic before 2015.006.30434, Acrobat DC Continuous or Acrobat Reader DC Continuous before 2018.011.20055, Acrobat 2017 or Acrobat Reader 2017 before 2017.011.30096 and is prone to an out-of-bounds write vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could le ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1298

© SecPod Technologies