[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26369 Download | Alert*

The host is installed with Adobe Illustrator CC 2021 before 25.2 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to arbitrary code execution.

The host is installed with OpenSSL 1.0.2s through 1.0.2x and is prone to an incorrect SSLv2 rollback protection vulnerability. A flaw is present in the application, which fails to correctly handle the padding check logic implemented in a server that supports greater than SSLv2. On successful exploitation, an attacker could make a server accept a connection if a version rollback attack has occurred ...

The host is installed with Cisco AnyConnect Secure Mobility Client before 4.9.05042 is prone to a DLL hijacking vulnerability. A flaw is present in the application which fails to handle a crafted IPC message sent to the AnyConnect process. Successful exploitation could allows attackers to execute arbitrary code on the affected machine with SYSTEM privileges.

The host is installed with Adobe Bridge before 11.0.1 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Bridge before 11.0.1 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apache Tomcat 10.0.0-M1 through 10.0.0, 9.0.0.M1 through 9.0.41 or 8.5.0 through 8.5.61 and is prone to an information disclosure vulnerability. A flaw is present in application, which fails to handle new h2c connection requests. Successful exploitation allows attackers to duplicate request headers and a limited amount of request body from one request to another meaning ...

The host is installed with OpenSSH before 8.5 and is prone to a double-free memory corruption vulnerability. A flaw is present in application, which fails to handle issues in ssh-agent. Successful exploitation could leads to unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.

The host is installed with Adobe Creative Cloud before 5.4.0 and is prone to an arbitrary file overwrite vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.

The host is installed with Adobe Creative Cloud before 5.4.0 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to escalate privileges.

The host is installed with Adobe Animate 20.0.x before 20.5.2 or 21.0.x before 21.0.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause information disclosure.


Pages:      Start    1597    1598    1599    1600    1601    1602    1603    1604    1605    1606    1607    1608    1609    1610    ..   2636

© SecPod Technologies