[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31188 Download | Alert*

The host is installed with Adobe InDesign before 16.2.4 or 17.x before 17.3 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to arbitrary code execution.

The host is installed with Adobe Bridge before 11.1.4 or 12.x before 12.0.3 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Bridge before 11.1.4 or 12.x before 12.0.3 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Bridge before 11.1.4 or 12.x before 12.0.3 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Bridge before 11.1.4 or 12.x before 12.0.3 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

Microsoft Windows Sysmon Elevation of Privilege Vulnerability. An attacker who successfully exploited this vulnerability could gain administrator privileges. A locally authenticated attacker could manipulate information on the Sysinternals services to achieve elevation from local user to SYSTEM admin.

Windows Terminal Remote Code Execution Vulnerability. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

The host is installed with HP Managed Printing Administration before 2.6.4 and is prone to a directory traversal vulnerability. The flaw is present in the application, which fails to handle MPAUploader.Uploader.1.UploadFiles function. Successful exploitation allows attackers to create arbitrary files.

The host is installed with HP Managed Printing Administration before 2.6.4 and is prone to a stack-based buffer overflow vulnerability. The flaw is present in the application, which fails to handle long filename parameter in an uploadfile action to Default.aspDefault.asp. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with HP Managed Printing Administration before 2.6.4 and is prone to a directory traversal vulnerability. The flaw is present in the application, which fails to handle crafted form data in hpmpa/jobDelivery/Default.asp files. Successful exploitation allows remote attackers to create arbitrary files.


Pages:      Start    1695    1696    1697    1698    1699    1700    1701    1702    1703    1704    1705    1706    1707    1708    ..   3118

© SecPod Technologies