[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26803 Download | Alert*

The host is installed with Google Chrome before 107.0.5304.62 and is prone to an insufficient data validation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

A remote code execution vulnerability exists in Windows when the iSNS Server service fails to properly validate input from the client, leading to an integer overflow. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SYSTEM account.An attacker could exploit the vulnerability by creating a specially crafted application to connect to the iSNS Ser ...

The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold and SP1, and Visual C++ 2005 SP1 and 2008 Gold and SP1 does not properly enforce string termination, which allows remote attackers to obtain sensitive information via a crafted HTML document with an ATL (1) component or (2) control that triggers a buffer over-read, related to ATL header ...

The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold and SP1, and Visual C++ 2005 SP1 and 2008 Gold and SP1 does not properly enforce string termination, which allows remote attackers to obtain sensitive information via a crafted HTML document with an ATL (1) component or (2) control that triggers a buffer over-read, related to ATL header ...

The host is installed with Draw.io version before 19.0.2 and is prone to a cross site scripting vulnerability. A flaw is present in the applications which fails to properly handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Draw.io version before 19.0.2 and is prone to a code injection vulnerability. A flaw is present in the applications which fails to properly handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Avast Antivirus before 19.7 and is prone to a buffer overflow vulnerability. A flaw exists in the application, which fails to properly handle aswSnx.sys driver. Successful exploitation allows local attackers to cause a denial of service via a crafted request to the aswSnx.sys driver.

The host is installed with OpenVPN 2.4.x before 2.4.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle malformed requests to the interactive service helper. Successful exploitation could allow attackers to cause denial of service through memory corruption.

The host is installed with OpenSSH through 7.8 and is prone to a user enumeration vulnerability. A flaw is present in the application, which fails to properly handle an issue in auth-gss2.c. Successful exploitation could allow remote attackers to identify existing users on a target machine.

The host is installed with VMWare Tools 11.x before 11.3.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle issues in the VM3DMP driver. Successful exploitation could allow attackers to trigger a PANIC in the VM3DMP driver leading to a denial-of-service condition in the Windows guest operating system.


Pages:      Start    1704    1705    1706    1707    1708    1709    1710    1711    1712    1713    1714    1715    1716    1717    ..   2680

© SecPod Technologies