[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16289 Download | Alert*

The host is installed with Oracle Java SE 1.6.0_37 before 1.6.0_39 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to Scripting. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.

The host is installed with Fortinet FortiClient 6.2.1 and is prone to an os command injection vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation could allow a local user of the system on which FortiClient is running to execute unauthorized code as root by bypassing a security check.

The host is installed with Fortinet FortiClient 6.4.3 and is prone to an improper link resolution before file access vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation could allow a local and unprivileged user to overwrite privileged shell scripts executed during the installation phase via escalating their privileges to ...

The host is installed with Fortinet FortiClient 6.4.0 through 7.0.0 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation could allow an authenticated attacker to hijack the MacOS camera via replacing the FortiClient camera handling library with a malicious one.

The host is installed with Fortinet FortiClient 7.0.0 through 7.0.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle issues in logstream for the FortiTray process. Successful exploitation could allow a local authenticated attacker to obtain the SSL-VPN password in cleartext via running a logstream for the FortiTray process in the ...

The host is installed with Fortinet FortiClient 6.0.0 through 6.4.6 or 7.0.0 through 7.0.1 and is prone to an improper certificate validation vulnerability. A flaw is present in the application, which fails to handle the issues in unspecified vectors. Successful exploitation could allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the F ...

The host is installed with Fortinet FortiClient 4.0.0 through 5.6.6, 6.0.0 before 6.4.10 or 7.0.0 before 7.0.8 and is prone to a download of code without integrity check vulnerability. A flaw is present in the application, which fails to handle issues in integrity checks. Successful exploitation could allow a local attacker to escalate their privileges via modifying the installer upon upgrade.

The host is installed with Trellix Agent through 5.7.8 and is prone to a heap-based overflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in unspecified vectors. Successful exploitation could allows a remote user to alter the page heap in the macmnsvc process memory block, resulting in the service becoming unavailable.

The host is installed with Trellix Agent through 5.7.8 and is prone to a command injection vulnerability. A flaw is present in the application, which fails to properly handle an issue in unspecified vectors. Successful exploitation could allows local users to place an arbitrary file into the /Library/Trellix/Agent/bin/ folder. The malicious file is executed by running the TA deployment feature loc ...

The host is installed with Visual Studio code before 1.31.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle environment variables. Successful exploitation could allow attackers to run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take ...


Pages:      Start    717    718    719    720    721    722    723    724    725    726    727    728    729    730    ..   1628

© SecPod Technologies