[Forgot Password]
Login  Register Subscribe

24547

 
 

132805

 
 

131373

 
 

909

 
 

108481

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 852 Download | Alert*

A denial of service vulnerability exists when Windows improperly handles hard links, aka 'Microsoft Windows Denial of Service Vulnerability'.

An elevation of privilege vulnerability exists in Microsoft Windows Setup when it does not properly handle privileges, aka 'Microsoft Windows Setup Elevation of Privilege Vulnerability'.

An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles hard links, aka 'Windows Error Reporting Manager Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1339, CVE-2019-1342.

A remote code execution vulnerability exists when the Windows Imaging API improperly handles objects in memory, aka 'Windows Imaging API Remote Code Execution Vulnerability'.

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'.

A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input, aka 'MS XML Remote Code Execution Vulnerability'.

YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a Boolean expression which determine its logic.

The host is installed with Apple Mac OS X through 10.12.6, 10.13.6 or 10.14.5 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues. Successful exploitation allows attackers to execute arbitrary code or read restricted memory.

The host is installed with Apple Mac OS X 10.12.6, 10.13.6 or 10.14.5 and is prone to an encryption Key negotiation vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. Successful exploitation allows an attacker in a privileged network position to intercept Bluetooth traffic (Key Negotiation of Bluetooth - KNOB).

The host is installed with kibana before 6.6.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a issue in the security audit logger. Successful exploitation allows attackers to execute arbitrary commands with permissions of the kibana process on the host system.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   85

© SecPod Technologies