[Forgot Password]
Login  Register Subscribe

26408

 
 

132812

 
 

151352

 
 

909

 
 

120842

 
 

163

 
 
Paid content will be excluded from the download.

Filter
Matches : 404 Download | Alert*

The host is installed with Google Chrome before 45.0.2454.85 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow remote attackers to execute arbitrary code or crash the service.

The host is installed with Google Chrome before 45.0.2454.85 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow remote attackers to execute arbitrary code or crash the service.

The host is installed with Google Chrome before 45.0.2454.85 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow remote attackers to execute arbitrary code or crash the service.

The host is installed with Google Chrome before 45.0.2454.85 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow remote attackers to execute arbitrary code or crash the service.

An elevation of privilege vulnerability exists in Microsoft Windows when Kerberos falls back to NT LAN Manager (NTLM) Authentication Protocol as the default authentication protocol.In a remote attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to send malicious traffic to a domain controller. An attacker who successfully exploited this vulnerab ...

The host is installed with Foxit Reader before 9.1.0.5096 or Foxit PhantomPDF before 9.1.0.5096 and is prone to an use-after-free execution vulnerability. A flaw is present in the applications which fails to properly handle iDefense ID V-jyb51g3mv9 component. Successful exploitation allow remote attackers to execute arbitrary code.

The host is installed with Foxit Reader before 9.1.0.5096 or Foxit PhantomPDF before 9.1.0.5096 and is prone to an use-after-free execution vulnerability. A flaw is present in the applications which fails to properly handle iDefense ID V-y0nqfutlf3 component. Successful exploitation allow remote attackers to execute arbitrary code.

Mozilla Firefox 74, Mozilla Firefox ESR 68.6 and Mozilla Thunderbird 68.6 : The first time AirPods are connected to an iPhone, they become named after the user's name by default (e.g. Jane Doe's AirPods.) Websites with camera or microphone permission are able to enumerate device names, disclosing the user's name. To resolve this issue, Firefox added a special case that renames devices containing ...

Mozilla Firefox 74, Mozilla Firefox ESR 68.6 and Mozilla Thunderbird 68.6 : The first time AirPods are connected to an iPhone, they become named after the user's name by default (e.g. Jane Doe's AirPods.) Websites with camera or microphone permission are able to enumerate device names, disclosing the user's name. To resolve this issue, Firefox added a special case that renames devices containing ...

PowerDNS Recursor from 4.1.0 up to and including 4.3.0 does not sufficiently defend against amplification attacks. An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third party authoritative name servers. The attack uses a crafted reply by an authoritative name server to amplify the resulting traffic between the recursive and other aut ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   40

© SecPod Technologies