[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with Artifex Ghostscript before 9.24 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle the .setdistillerkeys PostScript command. Successful exploitation could allow attackers to supply crafted postScript files to crash the interpreter or potentially execute code.

The host is installed with OpenSSH through 8.3p1 and is prone to a command injection vulnerability. A flaw is present in the application, which fails to properly handle an issue in the scp.c toremote function. Successful exploitation could allow remote attackers to pass a backtick enabled payload as file name and when local scp command is executed, local shell will also execute backtick enabled pa ...

The host is installed with Microsoft .NET Framework or Microsoft Silverlight and is prone to a remote code execution vulnerability. Flaws are present in the Microsoft ASP.NET and Microsoft Silverlight, which fails to handle specially crafted web pages. Successful exploitation could allow attackers to execute arbitrary code on the affected system.

The host is installed with Microsoft .Net framework 2.0 SP1 or 2.0 SP2 or 3.5 or 3.5 SP1 or 4.0 or Microsoft Silverlight 4 and is prone to remote code execution vulnerability. A flaw is present in the applications which is caused when the .NET Framework or Microsoft Silverlight improperly validate arguments passed to built-in networking functions. Successful exploitation allows attacker to take co ...

The host is installed with Microsoft Silverlight 5 or Microsoft Silverlight 5 Developer Runtime and is prone to double dereference vulnerability. A flaw is present in the application, which fails to handle a specially crafted Silverlight application. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new accounts with full user rights.

The host is installed with Microsoft Office, Windows, and Silverlight and is prone TrueType Font parsing vulnerability. A flaw is present in the applications, which fails to handle a specially crafted TrueType font file. Successful exploitation could allow remote attackers to install programs, view, change, or delete data or create new accounts with full user rights.

The host is installed with Microsoft Office, Windows, .NET Framework, and Silverlight and is prone TrueType Font parsing vulnerability. A flaw is present in the applications, which fail to handle a specially crafted TrueType font file. Successful exploitation could allow remote attackers to install programs, view, change, or delete data or create new accounts with full user rights.

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a memory corruption vulnerability. A flaw is present in the application, which improperly allows applications to access objects in memory. An attacker who successfully exploited this vulnerability could corrupt system memory and execute arbitrary code.

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a remote code execution vulnerability. A flaw is present in the application, which properly decodes strings using a malicious decoder that can return negative offsets. An attacker who successfully exploited this vulnerability could obtain the same permissions as the currently logged-on user.

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle certain open and close requests. Successful exploitation could allow attackers to obtain the same permissions as the currently logged-on user.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1429

© SecPod Technologies