[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31394 Download | Alert*

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in Java Runtime Environment (JRE) component in the application, which fails to properly handle vectors related to NIO. Successful exploitation allows remote attackers to affect availability.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in Java Runtime Environment (JRE) component in the application, which fails to properly handle vectors related to 2D. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The Microsoft .NET forms authentication capability for ASP.NET allows remote attackers to bypass authentication for .aspx files in restricted directories via a request containing a (1) "\" (backslash) or (2) "\\\%5C" (encoded backslash), aka "Path Validation Vulnerability."

The Microsoft .NET forms authentication capability for ASP.NET allows remote attackers to bypass authentication for .aspx files in restricted directories via a request containing a (1) "\" (backslash) or (2) "\\\%5C" (encoded backslash), aka "Path Validation Vulnerability."

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user i ...

The host is installed with Internet Explorer 10 or 11 and is prone to a memory corruption vulnerability. A flaw is present in Internet Explorer, which improperly handles objects in memory. Successful exploitation could allow attackers to gain the same user rights as the current user, if the current user is logged on with administrative user rights.

The host is installed with Microsoft Windows 8.1, Server 2012 or Server 2012 R2 and is prone to a netlogon elevation of privilege vulnerability. A flaw is present in the windows netlogon, which fails to properly establishes a secure communications channel to a domain controller. An attacker who successfully exploited this vulnerability could run a specially crafted application on a domain-joined s ...

The host is installed with Vista SP2, Server 2008 SP2, Server 2008 R2 SP1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle kernel API enforced permissions. An attacker who successfully exploited the vulnerability could impersonate processes, interject cross-process communication, or interrupt system functionality.

The host is installed with Internet Explorer 9, 10 or 11 and is prone to a security feature bypass vulnerability. A flaw is present in Internet Explorer, which improperly handles URLs validation process in IE for restricted ports. Successful exploitation could allow attackers to trick a user to visit a malicious website or inject malicious code into a compromised website then allowing attackers to ...

The host is installed with Adobe Flash Player before 18.0.0.352 or 19.x through 21.x before 21.0.0.242 or Adobe AIR before 21.0.0.215 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to cause code execution.


Pages:      Start    2064    2065    2066    2067    2068    2069    2070    2071    2072    2073    2074    2075    2076    2077    ..   3139

© SecPod Technologies