[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87888

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 12621 Download | Alert*

An elevation of privilege vulnerability exists in the Microsoft Server Message Block (SMB) Server when an attacker with valid credentials attempts to open a specially crafted file over the SMB protocol on the same machine. An attacker who successfully exploited this vulnerability could bypass certain security checks in the operating system. To exploit the vulnerability, an attacker would first ha ...

An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log o ...

The host is installed with 7 zip through 16.2 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle a Trojan horse DLL. Successful exploitation could allow remote attackers to gain privileges.

The host is installed with Adobe ColdFusion 8.0, 8.0.1 or 9.0 and is prone to information disclosure vulnerability. A flaw is present in the application due to affected module. Successful exploitation allows remote attackers to obtain sensitive information via unspecified vectors.

The host is installed with Adobe ColdFusion 8.0, 8.0.1 or 9.0 and is prone to cross-site scripting vulnerability. A flaw is present in the application due to an error in the Administrator page. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unknown vectors.

The host is installed with Adobe ColdFusion 8.0, 8.0.1 or 9.0 and is prone to cross-site scripting vulnerability. A flaw is present in the application due to an error in a method. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unknown vectors.

The host is installed with Adobe PageMaker 7.0.1 or 7.0.2 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a malformed .PMD file. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe PageMaker 7.0.1 or 7.0.2 and is prone to heap-based buffer overflow vulnerability. A flaw is present int he application, which fails to handle a .PMD file with a crafted font structure. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe PageMaker 7.0.1 or 7.0.2 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a .PMD file with a crafted font structure. Successful exploitation allows user-assisted remote attackers to execute arbitrary code.

The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Replication. Successful exploitation allows remote authenticated users to affect confidentiality and integrity.


Pages:      Start    1246    1247    1248    1249    1250    1251    1252    1253    1254    1255    1256    1257    1258    1259    ..   1262

© SecPod Technologies