[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26884 Download | Alert*

The host is installed with Microsoft Office Office 2013 or SP1 and is prone to an uninitialized memory use vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Cisco WebEx extensions for Google Chrome before before 1.0.7, Mozilla Firefox before 106 or Internet Explorer before 2.1.0.10 and is prone to a Cisco WebEx browser extension remote code execution vulnerability. A flaw is present in the application, which fails to handle an application programing interface (API) response parser within the plugin. Successful exploitation a ...

The host is installed with Bamboo CI server before 6.10.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a missing authorization check. Successful exploitation could allow attackers to initiate periodic log scans and send the results to a user-specified email address.

The host is installed with Firebird 2.5.x before 2.5.7 or 3.x before 3.0.2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle insufficient checks in the UDF subsystem. Successful exploitation could allow remote authenticated users to execute code.

The host is installed with JetBrains PyCharm before 2019.2 and is prone to an out of bounds memory allocation vulnerability. A flaw is present in the application, which fails to properly handle a buffer allocation of unknown size issue. Successful exploitation allows attackers to lead to a remote invocation of an OOM error message because of uncontrolled memory allocation.

The host is installed with ActiveScriptRuby (ASR) before 1.8.7 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly restrict interaction with an Internet Explorer ActiveX environment. Successful exploitation could allow remote attackers to execute arbitrary Ruby code.

The host is installed with Quicktime before 7.7.2 and is prone to an integer signedness error vulnerability. A flaw is present in the application, which fails to properly handle a crafted QTVR movie file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Quicktime before 7.7.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted movie file with Sorenson encoding. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Quicktime before 7.7.2 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted pathname for a file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted TeXML file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    2612    2613    2614    2615    2616    2617    2618    2619    2620    2621    2622    2623    2624    2625    ..   2688

© SecPod Technologies