[Forgot Password]
Login  Register Subscribe

24437

 
 

131950

 
 

117544

 
 

909

 
 

91519

 
 

143

 
 
Paid content will be excluded from the download.

Filter
Matches : 14113 Download | Alert*

The host is installed with Adobe InDesign before 11.4.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows local users, and possibly remote attackers to execute arbitrary code.

The host is installed with Adobe InDesign 12.1.0 or earlier and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows local users, and possibly remote attackers to execute arbitrary code.

The host is installed with Adobe InDesign 13.0 or earlier and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle the specially crafted .inx file. Successful exploitation allows local users, and possibly remote attackers to cause privilege escalation.

The host is installed with Adobe InDesign 13.0 or earlier and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle the specially crafted .inx file. Successful exploitation allows local users, and possibly remote attackers to execute remote code.

A denial of service vulnerability exists in .NET Core 2.1 when System.IO.Pipelines improperly handles requests. An attacker who successfully exploited this vulnerability could cause a denial of service against an application that is leveraging System.IO.Pipelines. The vulnerability can be exploited remotely, without authentication. A remote unauthenticated attacker could exploit this vulnerability ...

The host is installed with Adobe Connect 9.7.5 or earlier and is prone to authentication bypass vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation allows attackers to bypass authentication and view potentially sensitive information on the target system.

The host is installed with Adobe Connect 9.7.5 or earlier and is prone to authentication bypass vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation allows attackers to hijack the target user's session.

The host is installed with Adobe Connect 9.7.5 or earlier and is prone to an insecure library loading vulnerability. A flaw is present in the application, which fails to handle the DLL files. Successful exploitation could lead to privilege escalation.

The host is installed with Adobe Connect 9.7 or earlier and is prone to OS command injection vulnerability. A flaw is present in the application, which fails to handle the URI handler. Successful exploitation could lead to arbitrary file deletion.

The host is installed with Adobe connect 9.7 or earlier and is prone to an unrestricted SWF file upload vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation allows attackers to view potentially sensitive information on the target system.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1411

© SecPod Technologies