[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99536

 
 

909

 
 

80128

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 14433 Download | Alert*

The host is installed with Adobe Flash Player before 18.0.0.232 or Adobe AIR before 18.0.0.199 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Flash Player before 18.0.0.232 or Adobe AIR before 18.0.0.199 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Flash Player before 18.0.0.232 or Adobe AIR before 18.0.0.199 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Flash Player before 18.0.0.232 or Adobe AIR before 18.0.0.199 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 18.0.0.232 or Adobe AIR before 18.0.0.199 and is prone to an use-after-free vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 18.0.0.232 or Adobe AIR before 18.0.0.199 and is prone to an use-after-free vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with OpenSSH and is prone to a security bypass vulnerability. A flaw is present in x11_open_helper function which, lacks a check of the refusal deadline for X connections. Successful exploitation could allow an attacker to bypass intended access restrictions.

The host is installed with Apache Tomcat 7.x before 7.0.68 or 8.x before 8.0.31 and is prone to a security bypass vulnerability. A flaw is present in the Manager and Host Manager applications, which establish sessions and send CSRF tokens for arbitrary new requests. Successful exploitation allows remote authenticated users to bypass a CSRF protection mechanism by using a token.

The host is installed with Apache Tomcat 7.x before 7.0.66 or 8.x before 8.0.30 and is prone to a session fixation vulnerability. A flaw is present in the session-persistence implementation, which fails to handle different session settings used for deployments of multiple versions of the same web application. Successful exploitation allows remote attackers to hijack web sessions by leveraging use ...

The host is installed with Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.67 or 8.x before 8.0.30 and is prone to an information disclosure vulnerability. A flaw is present in the Mapper component, which processes redirects before considering security constraints and Filters. Successful exploitation allows remote attackers to determine the existence of a directory.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1443

© 2013 SecPod Technologies