[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78764

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 10984 Download | Alert*

The host is installed with Apache OpenOffice 4.1.2 or earlier and is prone to an out-of-bounds memory access vulnerability. A flaw is present in the application, which fails to handle crafted MetaActions in an (1) ODP or (2) OTP file. Successful exploitation could allow attackers to crash the service.

The host is installed with Apache OpenOffice before 4.1.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a file that impersonates a dynamic-link library. Successful exploitation could allow attackers to execute an arbitrary code with elevated privileges.

The host is installed with Apache OpenOffice before 4.1.3 and is prone to an unquoted Windows search path vulnerability. A flaw is present in the application, which fails to handle execution of unwanted software installed by a Trojan Horse application. Successful exploitation could allow attackers to crash the service.

The host is installed with Apache OpenOffice before 4.1.4 and is prone to an arbitrary file disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted document. Successful exploitation could allow attackers to disclose sensitive information.

The host is installed with Apache OpenOffice before 4.1.4 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle a crafted document. Successful exploitation could allow attackers to crash the service.

The host is installed with Apache OpenOffice before 4.1.4 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle a crafted document. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with Apache OpenOffice before 4.1.4 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle a crafted document. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

A denial of service vulnerability exists when .NET Core improperly handles parsing certificate data. An attacker who successfully exploited this vulnerability could cause a denial of service against a .NET Core web application. The vulnerability can be exploited remotely, without authentication

An information disclosure vulnerability exists in ASP.NET Core that allows bypassing cross-origin resource sharing(CORS) configurations. An attacker who successfully exploited the vulnerability could retrieve content, that is normally restricted, from a web application.

A denial of service vulnerability exists when ASP.NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against a ASP.NET Core web application. The vulnerability can be exploited remotely, without authentication.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1098

© 2013 SecPod Technologies