[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31089 Download | Alert*

Scripting Engine Memory Corruption Vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE ren ...

The host is installed with Flask-Caching extension for Flask through 1.10.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a cache storage system. Successful exploitation allow attackers to gain access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and e ...

Intel: CVE-2022-0001 Branch History Injection

The host is installed with Axiosys Bento4 through 1.6.0-639 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the applications which fails to properly handle an issue in some unknown functionality of the component mp42aac. Successful exploitation allows remote attackers to cause unspecified impact.

The host is installed with SaltStack Salt through 3003 and is prone to a buffer overflow vulnerability. A flaw exists exists within the application, which fails to properly handle the func variable in salt/salt/modules/status.py file. Successful exploitation allows attacker to execute arbitrary code.

The host is installed with Oracle Database Server 19c, or 21c and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle an issue in the Oracle Database Fleet Patching and Provisioning (jackson-databind). Successful exploitation allows attackers to cause a denial of service or other unspecified impact via a crafted object that uses cyclic dependencies ...

Windows Search Remote Code Execution Vulnerability. In an email or instant message attack scenario, the attacker could send the targeted user a specially crafted file that is designed to exploit the remote code execution vulnerability. In any case an attacker would have no way to force a user to view attacker-controlled content. Instead, an attacker would have to convince a user to take action. Fo ...

Windows Projected File System Elevation of Privilege Vulnerability. Successful exploitation of this vulnerability requires an attacker to win a race condition. Any authenticated user could trigger this vulnerability. It does not require admin or other elevated privileges. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

Reliability Analysis Metrics Calculation Engine (RACEng) Elevation of Privilege Vulnerability. An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges.

Windows Fax Service Remote Code Execution Vulnerability. Exploitation of the vulnerability requires that a user open a specially crafted file.* In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.* In a web-based attack scenario, an attacker could host a website (or leverage a compromise ...


Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   3108

© SecPod Technologies