[Forgot Password]
Login  Register Subscribe

26408

 
 

132812

 
 

151352

 
 

909

 
 

120842

 
 

163

 
 
Paid content will be excluded from the download.

Filter
Matches : 158 Download | Alert*

The host is installed with Google Chrome before 45.0.2454.85 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow remote attackers to execute arbitrary code or crash the service.

An elevation of privilege vulnerability exists in Microsoft Windows when Kerberos falls back to NT LAN Manager (NTLM) Authentication Protocol as the default authentication protocol.In a remote attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to send malicious traffic to a domain controller. An attacker who successfully exploited this vulnerab ...

The host is installed with Foxit Reader before 9.1.0.5096 or Foxit PhantomPDF before 9.1.0.5096 and is prone to an use-after-free execution vulnerability. A flaw is present in the applications which fails to properly handle iDefense ID V-jyb51g3mv9 component. Successful exploitation allow remote attackers to execute arbitrary code.

The host is installed with Foxit Reader before 9.1.0.5096 or Foxit PhantomPDF before 9.1.0.5096 and is prone to an use-after-free execution vulnerability. A flaw is present in the applications which fails to properly handle iDefense ID V-y0nqfutlf3 component. Successful exploitation allow remote attackers to execute arbitrary code.

Mozilla Firefox 74, Mozilla Firefox ESR 68.6 and Mozilla Thunderbird 68.6 : The first time AirPods are connected to an iPhone, they become named after the user's name by default (e.g. Jane Doe's AirPods.) Websites with camera or microphone permission are able to enumerate device names, disclosing the user's name. To resolve this issue, Firefox added a special case that renames devices containing ...

The host is installed with Apache HTTP Server 2.4.33 through 2.4.38 and is prone to a stack buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle specially crafted PROXY headers. Successful exploitation could allow attackers to trigger a stack buffer overflow or NULL pointer deference.

Mozilla Firefox 69, Mozilla Firefox ESR 68.1 : If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any <code>javascript:</code> URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions.

The host is installed with JetBrains YouTrack before 2019.2.55152 and is prone to an incorrect default permissions vulnerability vulnerability. A flaw is present in the application, which fails to properly handle an issue in the issues list. Successful exploitation could allow attackers to remove tags from issues list without the corresponding permission.

The host is installed with JetBrains YouTrack before 2020.1.659 and is prone to an incorrect default permissions vulnerability. A flaw is present in the application, which fails to properly handle an issue in DB export. Successful exploitation could allow attackers to cause unspecified impact.

The host is installed with PHP and is prone to race condition vulnerability. A flaw is present is in the PCNTL extension in PHP before 5.3.4, when a user-defined signal handler has been defined and many concurrent signals are being delivered to it through ext/pcntl leading to a race condition. Successful exploitation allows context-dependent attackers to cause a denial of service (memory corruptio ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   15

© SecPod Technologies