[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256148

 
 

909

 
 

199106

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26521 Download | Alert*

The host is installed with Zoho ManageEngine ADSelfService Plus before 6122 and is prone to a remote code execution vulnerability. A flaw is present in the application which fails to properly handle the input sanitization in policy custom script feature. Successful exploitation allows a remote and partially authenticated attacker to inject arbitrary commands into the custom script feature.

The host is installed with Atlassian Bitbucket Server 8.0.x before 8.9, 8.9.x before 8.9.5, 8.10.x before 8.10.5, 8.11.x before 8.11.4, 8.12.x before 8.12.2 or 8.13.x before 8.13.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow an authenticated attacker to execute a ...

Unspecified vulnerability in Microsoft Excel 2000 SP3 through 2003 SP2, Viewer 2003, and Office 2004 for Mac allows user-assisted remote attackers to execute arbitrary code via crafted macros, aka "Macro Validation Vulnerability," a different vulnerability than CVE-2007-3490.

The host is installed with Apple Safari before 4.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted PNG file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with OpenSSL 0.9.8k or earlier is prone to unspecified vulnerability. A flaw is present in the application, which does not properly handle a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug. Successful exploitation could allow remote attackers to cause a denial of service (memory consumption).

The host is installed with OpenSSL 0.9.8k or earlier is prone to unspecified vulnerability. A flaw is present in the application, which does not properly handle DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka "DTLS fragment handling memory leak. Successful exploitation could allow remote attackers to cause a denial of service (memor ...

The host is installed with OpenSSL 0.9.8i and is prone to unspecified vulnerability. A flaw is present in the application, which does not properly handle a DTLS ChangeCipherSpec packet that occurs before ClientHello. Successful exploitation could allow remote attackers to cause a denial of service (NULL pointer dereference and daemon crash).

The host is installed with Apple Safari before 4.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an XML External Entity issue. Successful exploitation could allow attackers to read files from the user's system.

Opera before 10.00 does not check all intermediate X.509 certificates for revocation, which makes it easier for remote SSL servers to bypass validation of the certificate chain via a revoked certificate.

The host is installed with Dell SupportAssist for business PCs version 3.4.0 and is prone to an authentication bypass vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. Successful exploitation allows locally authenticated non-admin users to gain temporary privilege within the SupportAssist User Interface on their respective PC enablin ...


Pages:      Start    1049    1050    1051    1052    1053    1054    1055    1056    1057    1058    1059    1060    1061    1062    ..   2652

© SecPod Technologies