[Forgot Password]
Login  Register Subscribe

24003

 
 

131517

 
 

106904

 
 

909

 
 

84902

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 11893 Download | Alert*

The host is installed with Apache Subversion before 1.7.21 or 1.8.x before 1.8.14 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the history of a node that has been moved from a hidden path. Successful exploitation could allow attackers to obtain sensitive path information.

The host is installed with Adobe Photoshop CC 2014 before 15.2.3.58 or Adobe Photoshop CC 2015 before 16.0.0.88 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Photoshop CC 2014 before 15.2.3.58 or Adobe Photoshop CC 2015 before 16.0.0.88 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Photoshop CC 2014 before 15.2.3.58 or Adobe Photoshop CC 2015 before 16.0.0.88 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Photoshop CC 2014 before 15.2.3.58 or Adobe Photoshop CC 2015 before 16.0.0.88 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Reader or Acrobat 10.x before 10.1.15, 11.x before 11.0.12, Acrobat DC Classic before 2015.006.30060, Acrobat Reader DC Classic before 2015.006.30060, Acrobat DC Continuous before 2015.008.20082 or Acrobat Reader DC Continuous before 2015.008.20082 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to handle unspeci ...

The host is installed with Oracle Virtualization VirtualBox prior to 4.0.32, 4.1.40, 4.2.32, or 4.3.30 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Core. Successful exploitation could allow allows local users to affect confidentiality, integrity, and availability.

The host is installed with Microsoft Excel 2007, 2010, 2013, 2016, Office Compatibility pack, Excel Viewer 2007, Sharepoint Server 2007, 2010 or 2013 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle objects in memory. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Excel 2010, 2013, 2016, Sharepoint Server 2010 or 2013 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle objects in memory. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with OpenSSL 1.0.2 before 1.0.2e and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a zero p value in an anonymous Diffie-Hellman (DH) ServerKeyExchange message. Successful exploitation allows remote attackers to crash the service.


Pages:      Start    1124    1125    1126    1127    1128    1129    1130    1131    1132    1133    1134    1135    1136    1137    ..   1189

© 2013 SecPod Technologies