[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31600 Download | Alert*

The host is installed with Adobe InDesign before 16.2.4 or 17.x before 17.3 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to arbitrary code execution.

The host is installed with Adobe Bridge before 11.1.4 or 12.x before 12.0.3 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Bridge before 11.1.4 or 12.x before 12.0.3 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Bridge before 11.1.4 or 12.x before 12.0.3 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Bridge before 11.1.4 or 12.x before 12.0.3 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

Microsoft Windows Sysmon Elevation of Privilege Vulnerability. An attacker who successfully exploited this vulnerability could gain administrator privileges. A locally authenticated attacker could manipulate information on the Sysinternals services to achieve elevation from local user to SYSTEM admin.

Windows Terminal Remote Code Execution Vulnerability. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

The host is installed with HP Managed Printing Administration before 2.6.4 and is prone to a directory traversal vulnerability. The flaw is present in the application, which fails to handle MPAUploader.Uploader.1.UploadFiles function. Successful exploitation allows attackers to create arbitrary files.

The host is installed with HP Managed Printing Administration before 2.6.4 and is prone to a stack-based buffer overflow vulnerability. The flaw is present in the application, which fails to handle long filename parameter in an uploadfile action to Default.aspDefault.asp. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with HP Managed Printing Administration before 2.6.4 and is prone to a directory traversal vulnerability. The flaw is present in the application, which fails to handle crafted form data in hpmpa/jobDelivery/Default.asp files. Successful exploitation allows remote attackers to create arbitrary files.


Pages:      Start    1791    1792    1793    1794    1795    1796    1797    1798    1799    1800    1801    1802    1803    1804    ..   3159

© SecPod Technologies