[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26416 Download | Alert*

The host is installed with Apple iCloud before 7.5 or Apple iTunes before 12.7.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly perform state management. Successful exploitation could allow local user to read a persistent device identifier.

The host is installed with Apple iCloud before 7.5 or Apple iTunes before 12.7.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly perform state management. Successful exploitation could allow local user to modify the state of the Keychain.

The host is installed with Apple iCloud before 7.5 or Apple iTunes before 12.7.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly perform state management. Successful exploitation could allow local user to view sensitive user information.

The host is installed with Oracle Fusion Middleware MapViewer 12.2.1.2 or 12.2.1.1 or 11.1.1.9 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the issues in Map Builder component. Successful exploitation allows attackers to affect confidentiality, integrity and availability.

The host is installed with KeePass 1.6.0 before 2.13 and is prone to an untrusted search path vulnerability. A flaw is present in the application which fails to properly handle an issue in the directory that contains a .kdbx file. Successful exploitation allows attackers to gain privileges via a Trojan horse DwmApi.dll file in the current working directory.

The host is installed with KeePass before 1.18 and is prone to an untrusted search path vulnerability. A flaw is present in the application which fails to properly handle an issue in the directory that contains a .kdb file. Successful exploitation allows attackers to gain privileges via a Trojan horse DLL in the current working directory.

The host is installed with KeePass through 2.33 and is prone to an improper input validation vulnerability. A flaw is present in the application which fails to properly handle an issue in the automatic update feature. Successful exploitation allows man-in-the-middle attackers to execute arbitrary code by spoofing the version check response and supplying a crafted update.

The host is installed with KeePass 1.32 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to properly handle an issue in the entry details view function. Successful exploitation allows attackers to decrypt certain database entries into memory, which may result in the disclosure of sensitive information.

The host is installed with Zoom Client before 5.10.3 and is prone to an DLL injection vulnerability. A flaw is present in the application, which fails to properly handle an unspecified vector. Successful exploitation allows attackers to run arbitrary code on the victims host.

The host is installed with Python 2.7 through 2.7.17, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 and is prone to an unsafe dll loading vulnerability. A flaw is present in the application, which fails to properly handle verification of api-ms-win-core-path-l1-1-0.dll that can be loaded and used instead of the system's copy. Successful exploitation allows can cause unspecified impa ...


Pages:      Start    1730    1731    1732    1733    1734    1735    1736    1737    1738    1739    1740    1741    1742    1743    ..   2641

© SecPod Technologies