[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112994

 
 

909

 
 

87812

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 12047 Download | Alert*

The host is installed with oracle fusion middleware mapViewer 12.2.1.2 or 12.2.1.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the map builder component issue. Successful exploitation allows an attacker to gain elevated privileges.

The host is installed with oracle fusion middleware mapViewer 12.2.1.2 or 12.2.1.3 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle the install (Apache Log4j) component issue. Successful exploitation allows an attacker to execute arbitrary code in the context of the affected application.

The host is installed with Git Client Plugin before 3.9.0 and is prone to a Server-side request forgery vulnerability. A flaw is present in the application, which fails to properly handle issues in the AssemblaWeb.java component. Successful exploitation could allow attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL.

A security feature bypass vulnerability exists when Skype for Business or Lync do not properly parse UNC path links shared via messages. An attacker who successfully exploited the vulnerability could execute arbitrary commands in the context of the logged-in user. The security feature bypass by itself does not allow arbitrary code execution. Instead, an attacker would have to convince users to cli ...

A Tampering vulnerability exists when Microsoft Macro Assembler improperly validates code. An attacker could introduce code into an application, which modifies data in an unintended manner. The security updates addresses the vulnerability by ensuring that Microsoft Macro Assembler properly validates code logic.

The host is installed with the VMware Workstation 14.x before 14.1.2 or VMware Player 14.x before 14.1.2 and may suffer from multiple out-of-bounds read vulnerabilities. The application fails to properly handle shader translator issue. Successful exploitation of these issues may lead to information disclosure or may allow attackers with normal user privileges to crash their VMs.

The host is installed with Foxit Reader less than or equal to 9.1.0.5096 or Foxit PhantomPDF less than or equal to 8.3.6.35572, 9.0.0.0 less than or equal to 9.1.0.5096 and is prone to a type confusion remote code execution vulnerability. A flaw is present in the application which fails to handle processing of PDF files. Successful exploitation could allow attackers to leverage this in conjunction ...

The host is installed with Trillian 3.1.0.121 and is prone to a ssl certificate vulnerability. A flaw is present in the application, which fails to handle a spoofed SSL certificate. Successful exploitation could allow attackers to obtain MSN credentials via a man-in-the-middle attack.

The host is installed with Trillian before 3.1.9.0 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted DTD file. Successful exploitation could allow attackers to cause a denial of service (crash) and possibly execute arbitrary code.

The host is installed with Trillian before 3.1.10.0 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a malformed attribute in an IMG tag. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    6    7    8    9    10    11    12    13    14    15    16    17    18    19    ..   1204

© SecPod Technologies