[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15134 Download | Alert*

The host is installed with Google Chrome before 79.0.3945.79 and is prone to an incorrect security ui vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

An exploitable cross site scripting vulnerability exists in the add filter functionality of the rails_admin rails gem version 1.2.0. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim"s browser. An attacker can phish an authenticated user to trigger this vulnerability.

The "Apache NetBeans" autoupdate system does not validate SSL certificates and hostnames for https based downloads. This allows an attacker to intercept downloads of autoupdates and modify the download, potentially injecting malicious code. Apache NetBeans" versions up to and including 11.2 are affected by this vulnerability.

asyncpg before 0.21.0 allows a malicious PostgreSQL server to trigger a crash or execute arbitrary code via a crafted server response, because of access to an uninitialized pointer in the array data decoder.

The host is installed with Adobe Flash Player before 11.2.202.569 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Flash Player before 11.2.202.569 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Flash Player before 11.2.202.569 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Flash Player before 11.2.202.569 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Flash Player before 11.2.202.569 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a URLLoader.load call. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 11.2.202.569 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a URLLoader.load call. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1087    1088    1089    1090    1091    1092    1093    1094    1095    1096    1097    1098    1099    1100    ..   1513

© SecPod Technologies