[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 10916 Download | Alert*

A memory leak was discovered in the backport of fixes for CVE-2018-16864 in Red Hat Enterprise Linux. Function dispatch_message_real in journald-server.c does not free the memory allocated by set_iovec_field_free to store the `_CMDLINE=` entry. A local attacker may use this flaw to make systemd-journald crash. This issue only affects versions shipped with Red Hat Enterprise since v219-62.2.

In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459

The host is installed with Elasticsearch 5.x before 6.8.21, 7.x before 7.16.1 or Logstash 5.x before 6.8.21, 7.x before 7.16.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle an issue in Log4j library. Successful exploitation could allow attackers to cause information leakage or denial of service.

The host is installed with Elasticsearch 5.x before 6.8.21, 7.x before 7.16.1 or Logstash 5.x before 6.8.21, 7.x before 7.16.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle an issue in Log4j library. Successful exploitation could allow attackers to cause information leakage or denial of service.

The host is installed with Adobe Flash Media Server before 3.5.6, and 4.x before 4.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 7.0.517.44 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle invalid frames. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Google Chrome before 7.0.517.44 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle invalid frames. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in vorbis_dec.c in the Vorbis decoder in FFmpeg, a decoder component used in the application, which fails to properly handle WebM file. Successful exploitation will allow the attacker to cause a denial of service condition.

The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in vorbis_dec.c in the Vorbis decoder in FFmpeg, a decoder component used in the application, which fails to properly handle WebM file. Successful exploitation will allow the attacker to cause a denial of service condition.

The host is installed with Google Chrome before 13.0.782.107 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to enforce proper permissions for files. Successful exploitation could allow attackers to bypass intended access restrictions.


Pages:      Start    596    597    598    599    600    601    602    603    604    605    606    607    608    609    ..   1091

© SecPod Technologies