[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31600 Download | Alert*

The host is installed with Foxit PDF Reader through 12.1.3.15356 or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.7.53812, 12.x through 12.1.3.15356 or 2023.1.0.15510 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation could allow attackers to execute remote code or disclose i ...

The host is installed with Apple iTunes before 12.12.9 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle the logic issue. On successful exploitation, an app may be able to elevate privileges.

The host is installed with Apple iTunes before 12.12.9 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle the logic issue. On successful exploitation, an app may be able to elevate privileges.

The host is installed with Apple iTunes before 12.12.9 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle the logic issue. On successful exploitation, an app may be able to elevate privileges.

The host is installed with Apple iTunes before 12.12.9 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle the logic issue. On successful exploitation, an app may be able to elevate privileges.

The host is installed with Apple iTunes before 12.12.9 and is prone to a dynamic library loading vulnerability. A flaw is present in the applications, which fail to properly handle a path searching issue. On successful exploitation, an app may be able to gain elevated privileges.

The host is installed with Cacti 1.2.25 and is prone to an SQL injection vulnerability. A flaw is present in the application, which fails to properly handle the form_actions() function in the managers.php function. Successful exploitation allows a remote attacker to obtain sensitive information.

Improper initialization in the Intel(R) TXT SINIT ACM for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Out-of-bounds read in firmware for the Intel(R) Integrated Sensor Solution before versions 5.4.2.4579v3, 5.4.1.4479 and 5.0.0.4143 may allow a privileged user to potentially enable denial of service via local access.

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.


Pages:      Start    1603    1604    1605    1606    1607    1608    1609    1610    1611    1612    1613    1614    1615    1616    ..   3159

© SecPod Technologies