[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31403 Download | Alert*

The host is installed with Comodo Antivirus 12.2.2.8012 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle an issue in the NTFS directory junction. Successful exploitation could allow attackers to restore a malicious DLL from quarantine into the System32 folder.

Microsoft Office Security Feature Bypass Vulnerability

The host is installed with Couchbase Server 7.1.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to perform a man in the middle attack or decrypting network communication.

The host is installed with Microsoft Azure RTOS GUIX Studio before 6.1.17.0 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Azure RTOS GUIX Studio before 6.1.17.0 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Atlassian Bitbucket Server 7.0.0 before 7.6.17, 7.7.0 before 7.17.10, 7.18.0 before 7.21.4, 8.0.0 before 8.0.3, 8.1.0 before 8.1.3, and 8.2.0 before 8.2.2 or 8.3.0 before 8.3.1 and is prone to a command injection vulnerability. A flaw is present in the application, which fails to handle an issue in multiple API endpoints. Successful exploitation allows remote attackers w ...

The host is installed with RealVNC VNC Server before 6.11.0 or VNC Viewer before 6.22.826 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle MSI installer repair mode. Successful exploitation could allow attackers to gain local privilege.

The host is installed with Google Chrome before 106.0.5249.61 and is prone to an insufficient validation of untrusted vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 106.0.5249.61 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 107.0.5304.62 and is prone to an inappropriate implementation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    1992    1993    1994    1995    1996    1997    1998    1999    2000    2001    2002    2003    2004    2005    ..   3140

© SecPod Technologies