[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26369 Download | Alert*

The host is installed with Adobe Photoshop CC 2017 before 18.1.4 or Adobe Photoshop CC 2018 before 19.1.4.698 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to perform remote code execution.

The host is installed with Oracle MySQL MySQL 5.6.x through 5.6.22 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to XA. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with Oracle MySQL MySQL 5.6.x through 5.6.22 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to Optimizer. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with Oracle MySQL MySQL 5.6.x through 5.6.22 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to Server : Partition. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 12.2.1.3 or 12.2.1.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Third Party Tools (jackson-databind). Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Centralized Thirdparty Jars (jackson-databind). Successful exploitation can cause unspecified impact.

Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability. Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component. An attacker who successfully exploited this vulnerability could gain administrator privileges. An unauthenticated attacker could conduct an attack that could leverage cryptographic protocol vu ...

Netlogon RPC Elevation of Privilege Vulnerability. Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component. An attacker who successfully exploited this vulnerability could gain administrator privileges. An authenticated attacker could leverage cryptographic protocol vulnerabilities in the Windows Netlogon protoc ...

The host is installed with Adobe ColdFusion 2018 before update 12 or 2021 before update 2 and is prone to an improper access control vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could allow attackers to bypass the security feature.

The host is installed with Adobe InDesign before 16.4.2 or 17.x before 17.2 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.


Pages:      Start    1712    1713    1714    1715    1716    1717    1718    1719    1720    1721    1722    1723    1724    1725    ..   2636

© SecPod Technologies