[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31422 Download | Alert*

The host is installed with Adobe Creative Cloud before 5.10 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Teamviewer 15.41 before 15.42.8 and is prone to an improper authorisation vulnerability. A flaw is present in the application, which fails to handle the local device settings. Successful exploitation allows an unprivileged user to change basic local device settings even though the options were locked.

The host is installed with Docker Desktop before 4.12.0 and is prone to an argument injection vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to gain local privilege.

The host is installed with Docker Desktop Docker Docker_desktop versions less than 4.12.0 and is prone to a Rce vulnerability. A flaw is present in the application, which fails to properly handle query parameters in message-box route. Successful exploitation allows an attacker to cause remote code execution.

The host is installed with Docker Desktop Docker desktop 4.11.0 before 4.12.0, and is prone to a Local privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle ipc response spoofing. Successful exploitation allows an attacker to gain local privileges.

The host is installed with Docker Desktop Docker Docker_desktop versions less than 4.12.0 and is prone to a Rce vulnerability. A flaw is present in the application, which fails to properly handle a crafted extension description or changelog. Successful exploitation could allow an attacker to cause remote code execution.

The host is installed with Okta ScaleFT 1.13.1 before 1.68.2 and is prone to a command injection vulnerability. A flaw is present in the application, which fails to handle third-party library webbrowser. Successful exploitation could allow an attacker to cause unspecified impact.

The host is installed with Atlassian SourceTree before 3.1.3 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle an issue in the URI handlers. Successful exploitation allows a remote, unauthenticated attacker to gain remote code execution using a crafted URL.

The host is installed with Adobe Genuine Service before 6.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle symbolic links. Successful exploitation could allow an attacker to elevate privileges in the context of the current user.

The host is installed with Adobe Genuine Service before 6.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle secure library loading. Successful exploitation could allow an authenticated attacker to rewrite the file of the administrator, which may lead to elevated permissions.


Pages:      Start    1915    1916    1917    1918    1919    1920    1921    1922    1923    1924    1925    1926    1927    1928    ..   3142

© SecPod Technologies