[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Dropbox version 0.7.110 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle the zero-length directory name in the LD_LIBRARY_PATH. Successful exploitation allows local users to gain privileges via a Trojan horse shared library in the current working directory.

The host is installed with 7 zip through 18.01 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly implement the "Large memory pages" option. Successful exploitation could allow remote attackers to bypass intended access restrictions.

The host is installed with 7 zip through 16.2 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle a Trojan horse DLL. Successful exploitation could allow remote attackers to gain privileges.

The host is installed with 7-zip before 4.5.7 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to cause unknown impact.

The host is installed with 7 zip 18.03 and earlier and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to handle a crafted RAR archive. Successful exploitation could allow remote attackers to crash the service through the usage of uninitialized memory.

The host is installed with Adobe Photoshop CS4 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted TIFF file. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Photoshop and is prone to security vulnerability. A flaw is present in the application, which fails to handle security issues. Successful exploitation could allow remote attackers to cause unknown impact.

The host is installed with Adobe Photoshop Elements 8.0 or earlier and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle crafted files. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with Adobe Photoshop CS4 11.0.1 or earlier and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle crafted ASL. ABR, GRD files. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Pidgin before 2.10.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle canceled SOCKS5 connection attempts. Successful exploitation allows user-assisted remote authenticated users to cause application crash via a sequence of XMPP file-transfer requests.


Pages:      Start    1376    1377    1378    1379    1380    1381    1382    1383    1384    1385    1386    1387    1388    1389    ..   1516

© SecPod Technologies