[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31456 Download | Alert*

The host is installed with Adobe Bridge before 11.1.4 or 12.x before 12.0.3 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

Microsoft Windows Sysmon Elevation of Privilege Vulnerability. An attacker who successfully exploited this vulnerability could gain administrator privileges. A locally authenticated attacker could manipulate information on the Sysinternals services to achieve elevation from local user to SYSTEM admin.

Windows Terminal Remote Code Execution Vulnerability. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

The host is installed with HP Managed Printing Administration before 2.6.4 and is prone to a directory traversal vulnerability. The flaw is present in the application, which fails to handle MPAUploader.Uploader.1.UploadFiles function. Successful exploitation allows attackers to create arbitrary files.

The host is installed with HP Managed Printing Administration before 2.6.4 and is prone to a stack-based buffer overflow vulnerability. The flaw is present in the application, which fails to handle long filename parameter in an uploadfile action to Default.aspDefault.asp. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with HP Managed Printing Administration before 2.6.4 and is prone to a directory traversal vulnerability. The flaw is present in the application, which fails to handle crafted form data in hpmpa/jobDelivery/Default.asp files. Successful exploitation allows remote attackers to create arbitrary files.

The host is installed with HP Managed Printing Administration before 2.6.4 and is prone to a unspecified vulnerability. The flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to obtain sensitive information, modify data, or cause a denial of service.

The host is installed with Microsoft Windows Server 2008, Server 2008 R2 or Server 2012 and is prone to information disclosure vulnerability. A flaw is present in the application, which is caused when an Active Directory Federation Services instance exposes account information through an open endpoint. Successful exploitation allows attackers to reveal information pertaining to the service account ...

The host is installed with Windows Defender for Microsoft Windows 8 and is prone to elevation of privilege vulnerability. A flaw is present in the application, which is caused when improper pathnames are used by the Microsoft Antimalware Client. Successful exploitation allows attackers to execute arbitrary code in the security context of the LocalSystem account and take complete control of the sys ...

Stack-based buffer overflow in nsum.exe in the Windows Media Unicast Service in Media Services for Microsoft Windows 2000 Server SP4 allows remote attackers to execute arbitrary code via crafted packets associated with transport information, aka "Media Services Stack-based Buffer Overflow Vulnerability."


Pages:      Start    1765    1766    1767    1768    1769    1770    1771    1772    1773    1774    1775    1776    1777    1778    ..   3145

© SecPod Technologies