[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

123799

 
 

909

 
 

102620

 
 

150

 
 
Paid content will be excluded from the download.

Filter
Matches : 96352 Download | Alert*

A flaw was found in Exim versions 4.87 to 4.91 before release 1.20 . Improper validation of recipient address in deliver_message function in /src/deliver.c may lead to remote command execution

A flaw was found in Exim versions 4.87 to 4.91 . Improper validation of recipient address in deliver_message function in /src/deliver.c may lead to remote command execution. Fixed In Version:¶ exim 4.92

neovim: heavily refactored vim fork Neovim could be made to run programs as your login if it opened a specially crafted file.

dbus: simple interprocess messaging system DBus could allow unintended access to services.

vim: Vi IMproved - enhanced vi editor Several security issues were fixed in Vim.

The host is missing a critical update according to Adobe advisory, APSB19-30. The update is required to fix a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation allows remote attackers to cause arbitrary code execution in the context of the current user.

The host is missing a critical update according to Adobe advisory, APSB19-30. The update is required to fix a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation allows remote attackers to cause arbitrary code execution in the context of the current user.

The host is installed with Adobe Flash Player before 32.0.0.207 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause arbitrary code execution.

The host is installed with Adobe Flash Player before 32.0.0.207 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause arbitrary code execution.

A spoofing vulnerability that could allow a security feature bypass exists in when Azure DevOps Server does not properly sanitize user provided input. An attacker who exploited the vulnerability could trick a user into loading a page containing malicious content. An authenticated attacker could exploit the vulnerability by sending a specially crafted payload to the Azure DevOps Server, which would ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   9635

© SecPod Technologies