[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26369 Download | Alert*

The host is installed with Telegram Desktop before 1.5.12 and is prone to an IDN homograph attack vulnerability. A flaw is present in the application, which fails to handle issues in character representation in fonts. Successful exploitation allows attackers to cause script spoofing attacks.

The host is installed with Apache CouchDB 1.x before 2.2.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the validation issue in administrator-supplied configuration settings. Successful exploitation could allow attackers to escalate their privileges to that of the operating system's user under which CouchDB runs, by bypassing the ...

The host is installed with BSplayer Free 2.51 Build 1022 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle the skin parameter in the options section of a skins file (.bsi). Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with BSplayer Free 2.32 Build 975 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the boundary checks issue on user-supplied input. Successful exploitation could allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long hostname in a .bsl playlist file.

The host is installed with Firebird 2.5.0 or 2.5.1 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an empty dynamic SQL query. Successful exploitation could allow remote authenticated users to cause a denial of service.

The host is installed with GoodTech SSH Server 6.4 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in the SFTP subsystem. Successful exploitation could allow remote authenticated users to execute arbitrary code.

The host is installed with Qbik WinGate through 6.2.2.1137 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a issue in the IMAP service. Successful exploitation could allow remote attackers to cause a denial of service (resource exhaustion) or possibly execute arbitrary code via a long argument to the LIST command.

The host is installed with VanDyke Software SecureCRT before 8.7.2 and is prone to a memory corruption vulnerability. A flaw is present in the application which fails to handle an issues when emulation functions receive a large negative number. Successful exploitation may allow remote attackers to cause SecureCRT to crash or the execute arbitrary code.

The host is installed with Nvidia graphics driver with 460.x prior to 461.09 and is prone to a denial of service vulnerability. A flaw is present in the kernel mode layer (nvlddmkm.sys) handler, which fails to properly handle unknown vector. Successful exploitation may allow attackers to cause denial of service, or escalation of privileges.

The host is installed with Zoho ManageEngine ADSelfService Plus before build 6003 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which does not properly enforce user privileges associated with a Certificate dialog. Successful exploitation could allow an unauthenticated attacker to escalate privileges on a Windows host.


Pages:      Start    2613    2614    2615    2616    2617    2618    2619    2620    2621    2622    2623    2624    2625    2626    ..   2636

© SecPod Technologies