A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory.
NVIDIA Windows GPU Display Driver R340 before 342.00 and R375 before 375.63 contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape ID 0x600000D where a value passed from a user to the driver is used without validation leading to escalation of privileges. This update add reliability and speed to the attack.
This module exploits an arbitrary file upload in Trend Micro Mobile Security for Enterprise to install an agent.
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory.
Multiple stack-based buffer overflow vulnerabilities have been identified in which the application does not verify string size before copying to memory, the attacker may then be able to crash the application or run arbitrary code.
The CG6Service Service in CyberGhost has the SetPeLauncherState method which allows a user to launch a debugger automatically for a determined process.
This can be abused by an attacker to gain SYSTEM privileges by attaching to a SYSTEM process.
This update fixes a minor bug.
This can be abused by an attacker to gain SYSTEM privileges by attaching to a SYSTEM process.
This update fixes a minor bug.
VX Search Enterprise is prone to a buffer overflow via an empty POST request to a long URI beginning with a /../ substring.
Adobe ColdFusion is prone to a remote vulnerability that allows attackers to take advantage of an insecure deployment of the JMX/RMI service used to manage and monitor the Java Virtual Machine.
The application allows an attacker to specify a server to perform authentication. That server also allows to execute controlled SQL directly against the database.
This module abuses of the previous vulnerabilities in order execute an agent as SYSTEM.
This module abuses of the previous vulnerabilities in order execute an agent as SYSTEM.
Username parameter in Registeration page 'register.ghp' is prone to a stack-based buffer-overflow vulnerability.
Application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer.
Application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer.
Pagination
- Previous page
- Page 44
- Next page