[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

114563

 
 

909

 
 

88860

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 12060 Download | Alert*

The host is installed with Oracle MySQL Server through 5.5.61, 5.6.41, 5.7.23 or 8.0.12 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to InnoDB (zlib). Successful exploitation allows attackers to affect Confidentiality, Integrity and Availability.

The host is installed with Adobe InDesign 13.0 or earlier and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle the specially crafted .inx file. Successful exploitation allows local users, and possibly remote attackers to execute remote code.

The host is installed with Adobe InDesign 13.0 or earlier and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle the specially crafted .inx file. Successful exploitation allows local users, and possibly remote attackers to cause privilege escalation.

The host is installed with Adobe InDesign 12.1.0 or earlier and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows local users, and possibly remote attackers to execute arbitrary code.

The host is installed with Adobe InDesign before 11.4.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows local users, and possibly remote attackers to execute arbitrary code.

The host is installed with Oracle Java SE through 6u201, 7u191, 8u182 or 11 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Networking. Successful exploitation allows attackers to affect Confidentiality.

The host is installed with Oracle Java SE through 6u201, 7u191, 8u182 or 11 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Security. Successful exploitation allows attackers to affect Integrity.

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then ins ...

An elevation of privilege vulnerability exists when Microsoft Outlook initiates processing of incoming messages without sufficient validation of the formatting of the messages. An attacker who successfully exploited the vulnerability could attempt to force Outlook to load a local or remote message store (over SMB). To exploit the vulnerability, the attacker could send a specially crafted email to ...

A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1205

© SecPod Technologies