[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

126348

 
 

909

 
 

102767

 
 

150

 
 
Paid content will be excluded from the download.

Filter
Matches : 17692 Download | Alert*

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current u ...

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system.There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing ...

The host is installed with Apache HTTP Server 2.4.18 through 2.4.38 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle the http/2 request. Successful exploitation could allow attackers to bypass certain security restrictions and to perform unauthorized actions.

The host is installed with Apache HTTP Server 2.4.34 through 2.4.38 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an upgrade request from http/1.1 to http/2. Successful exploitation could allow attackers to cause misconfiguration and crash.

The host is installed with AnyDesk before 3.6.1 and is prone to a dll injection vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could result in dll injection vulnerability.

The host is installed with AnyDesk before 4.1.3 and is prone to a dll preloading vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could result in dll preloading vulnerability.

The host is installed with Dell SupportAssist before 3.2.0.90 and is prone to an improper origin vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to attempt CSRF attacks on users of the impacted systems.

The host is installed with Dell SupportAssist before 3.2.0.90 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary executables.

The host is installed with Adobe Media Encoder before 13.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to disclose sensitive information.

The host is installed with Adobe Media Encoder before 13.1 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1769

© SecPod Technologies