[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Microsoft Windows Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, Server 2012, Windows 8.1 or Server 2012 R2 and is prone to an Onetype font parsing vulnerability. A flaw is present in the application, which fails to handle a crafted OpenType fonts. Successful exploitation could allow attackers to take complete control of the affected system.

The host is installed with Microsoft Windows Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, Server 2012, Windows 8.1 or Server 2012 R2 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which terminates a process when a user logs off. An attacker who successfully exploited this vulnerability could run code that is designed to m ...

The host is installed with Microsoft Windows Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, Server 2012, Windows 8.1 or Server 2012 R2 and is prone to a security feature bypass vulnerability. A flaw is present in the Windows kernel-mode driver, which fails to properly validate and enforce impersonation levels. An attacker who successfully exploited this vulnerability cou ...

The host is installed with Microsoft Microsoft Windows Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, Server 2012, Windows 8.1, Server 2012 R2, .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2 or 4.6 and is prone to an Onetype font parsing vulnerability. A flaw is present in the application, which fails to handle a crafted OpenType fonts. Successful exploitat ...

The host is installed with OpenAFS before 1.6.0700 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle an invalid packet. Successful exploitation allows remote attackers to cause a denial of service (performance degradation).

The host is installed with OpenAFS 1.4.1400, 1.4.1200 or 1.4.0700 and is prone to a double free vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows remote attackers to cause a denial of service and execute arbitrary code.

The host is installed with Winlog Lite SCADA or Winlog Pro SCADA before 2.07.18 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a packet with a crafted negative integer. Successful exploitation could allow attackers to crash the service.

The host is installed with Winlog Lite SCADA or Winlog Pro SCADA before 2.07.17 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a packet with a crafted positive integer after the opcode. Successful exploitation could allow attackers to crash the service.

The host is installed with Winlog Lite SCADA or Winlog Pro SCADA before 2.07.17 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a packet with an invalid file-pointer index. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Privoxy before 3.0.21 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle Proxy-Authenticate and Proxy-Authorization headers in the client-server data stream. Successful exploitation could allow attackers to spoof the intended proxy service.


Pages:      Start    1439    1440    1441    1442    1443    1444    1445    1446    1447    1448    1449    1450    1451    1452    ..   1516

© SecPod Technologies