[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

114411

 
 

909

 
 

88812

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 88593 Download | Alert*

Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their offic ...

libssh versions 0.6 and above have an authentication bypass vulnerability in the server code. By presenting the server an SSH2_MSG_USERAUTH_SUCCESS message in place of the SSH2_MSG_USERAUTH_REQUEST message which the server would expect to initiate authentication, the attacker could successfully authenticate without any credentials.

moin: Collaborative hypertext environment MoinMoin could be made to expose sensitive information if it received a specially crafted input.

The host is installed with Adobe InDesign 13.0 or earlier and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle the specially crafted .inx file. Successful exploitation allows local users, and possibly remote attackers to execute remote code.

The host is installed with Adobe InDesign 13.0 or earlier and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle the specially crafted .inx file. Successful exploitation allows local users, and possibly remote attackers to cause privilege escalation.

The host is installed with Adobe InDesign 12.1.0 or earlier and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows local users, and possibly remote attackers to execute arbitrary code.

Adobe InDesign is installed (64-bit)

The host is installed with Adobe InDesign before 11.4.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows local users, and possibly remote attackers to execute arbitrary code.

The host is installed with Oracle Java SE through 6u201, 7u191, 8u182 or 11 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Networking. Successful exploitation allows attackers to affect Confidentiality.

The host is installed with Oracle Java SE through 6u201, 7u191, 8u182 or 11 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Security. Successful exploitation allows attackers to affect Integrity.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   8859

© SecPod Technologies