[Forgot Password]
Login  Register Subscribe

24436

 
 

131815

 
 

115228

 
 

909

 
 

90122

 
 

140

 
 
Paid content will be excluded from the download.

Filter
Matches : 13850 Download | Alert*

An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior. A locally authenticated attacker could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The secur ...

A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects. An attacker who successfully exploited the vulnerability could use a specially crafted file or script to perform actions. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing ...

A remote code execution vulnerability exists in PowerShell Editor Services. An attacker who successfully exploited this vulnerability could execute malicious code on a vulnerable system. In an attack scenario, an attacker could execute malicious code in a PowerShell Editor Services process. The update addresses the vulnerability by correcting how PowerShell Editor Services secures local connection ...

The host is installed with SumatraPDF before 2.1 and is prone to heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted PDF document. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with SumatraPDF before 2.1 and is prone to heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted PDF document. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with Adobe Captivate 9 or earlier and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the crafted requests. Successful exploitation allows local users, and possibly remote attackers to view potentially sensitive information on the target system.

The host is installed with Adobe Captivate 9 or earlier and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle the quiz reporting feature. Successful exploitation allows local users, and possibly remote attackers to to read and write arbitrary files to the server.

The host is installed with PostgreSQL 10.x before 10.1, 9.2.x before 9.2.24, 9.3.x before 9.3.20, 9.4.x before 9.4.15, 9.5.x before 9.5.10 or 9.6.x before 9.6.6 and is prone to a remote privilege escalation vulnerability. The flaws present in the application fails to handle the initialization scripts of PostgreSQL. Successful exploitation allows attackers to bypass certain restrictions and execute ...

The host is installed with PostgreSQL 10.x before 10.1, 9.3.x before 9.3.20, 9.4.x before 9.4.15, 9.5.x before 9.5.10 or 9.6.x before 9.6.6 and is prone to a memory disclosure vulnerability. The flaw present in the application fails to handle the json function call issue. Successful exploitation allows attackers to crash the server or disclose a few bytes of server memory.

The host is installed with PostgreSQL 10.x before 10.1, 9.5.x before 9.5.10 or 9.6.x before 9.6.6 and is prone to a security bypass vulnerability. The flaws present in the application fails to handle the SELECT privileges in INSERT ... ON CONFLICT DO UPDATE commands. Successful exploitation allows attackers to to bypass certain security restrictions, and perform unauthorized actions or obtain sens ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1384

© SecPod Technologies