[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15029 Download | Alert*

The host is installed with PHP and is prone to Denial of Service vulnerability. The flaw is present exif.c in the Exif extension in PHP on 64-bit platforms, which performs an incorrect cast

The host is installed with IBM Lotus Domino and is prone to authentication bypass vulnerability. A flaw is present in the Server Controller authentication mechanism, which accepts UNC share pathnames in the COOKIEFILE field which retrieves stored credentials. Successful exploitation could allow remote attackers to bypass authentication.

The host is installed with PHP and is prone to denial of service vulnerability. A flaw is present in the imap_do_open function in IMAP extension and imap_do_open function in IMAP extension which fails to perform input validation. Successful exploitation allows the attacker to execute arbitrary code or cause memory corruption.

The host is installed with IBM Lotus Domino and is prone to authentication bypass vulnerability. A flaw is present in rhe server, which fails to enforce authetication before alllowing users to change the default configuration of the server console. Successful exploitation could allow remote attackers to perform administrative changes or obtain sensitive information via Load, Tell, or Set Configura ...

The host is installed with Google Chrome and is prone to Use-after-free vulnerability. The flaw in present in WebKit in Webcore, due to improper handling of provisional items by the HistoryController component. Successful exploitation could allow remote attackers to crash the affected application, denying service to legitimate users.

The host is installed with VLC Media Player before 1.1.8 and is prone to arbitrary code execution vulnerability. A flaw is present in the application which is caused due to an error when processing video files with large dimensions. Successful exploitation could allow remote attackers to overflow a buffer and execute arbitrary code on the system or cause the application to crash.

The host is installed with VLC Media Player before 1.1.8 and is prone to arbitrary code execution vulnerability. A flaw is present in the application which is caused by a memory corruption error in the "libdirectx" plugin when processing malformed NSV data. Successful exploitation allows remote attacker to overflow a buffer and execute arbitrary code on the system or cause the application to crash ...

The host is installed with Opera before 11.01 and is prone to security vulnerability. A flaw is present in the download manager, which uses the wrong executable when trying to show the folder view. Successful exploitation could let remote attackers to execute arbitrary code via a crafted web site that hosts an executable file.

The host is installed with Google Chrome before 80.0.3987.87 and is prone to an incorrect security UI vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Kerio Connect 7.1.4 build 2985 or MailServer 6.x and is prone to denial of service vulnerability. A flaw is present in STARTTLS implementation in the application which does not properly restrict I/O buffering. Successful exploitation allow man-in-the-middle attackers to insert commands into encrypted SMTP sessions.


Pages:      Start    1039    1040    1041    1042    1043    1044    1045    1046    1047    1048    1049    1050    1051    1052    ..   1502

© SecPod Technologies