[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26616 Download | Alert*

The host is installed with Inkscape 0.91 and is prone to an out of bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation may allow an attacker to execute arbitrary code.

The host is installed with Inkscape 0.91 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle an uninitialized pointer. Successful exploitation may allow an attacker to have access to unauthorized information.

The host is installed with Inkscape 0.91 and is prone to an out of bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation may allow an attacker to have access to unauthorized information.

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.19, 8.5.x through 8.5.5.25 and is prone to an use of a broken or risky cryptographic algorithm vulnerability. A flaw is present in the application, which fails to properly handle an issue in the outbound TLS connections. Successful exploitation allows attackers to have unspecified impact.

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.19, 8.5.x through 8.5.5.25 and is prone to a XML External Entity (XXE) injection vulnerability. A flaw is present in the application, which fails to properly handle an issue in the processing XML data. Successful exploitation could leads to expose sensitive information, consume memory resources, or to cond ...

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.19, 8.5.x through 8.5.5.25 and is prone to a server-side request forgery vulnerability. A flaw is present in the application, which fails to properly handle an issue in the crafted requests. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Adobe Photoshop 2023 before 24.7.3, or 2024 before 25.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause memory leak.

The host is installed with Node.js 20.x before 20.11.1, or 21.x before 21.6.2 and is prone to a path traversal vulnerability. A flaw is present in the application which fails to properly handle the experimental permission model. Successful exploitation could allow an attacker to modify the result of path.resolve() using the monkey-patching Buffer internals, leading to a path traversal vulnerabilit ...

The host is installed with Node.js 20.x before 20.11.1, or 21.x before 21.6.2 and is prone to a path traversal vulnerability. A flaw is present in the application which fails to properly handle multiple built-in utility functions used to normalize paths. Successful exploitation could allow an attacker to overwite the node:fs functions with user-defined implementations leading to filesystem permiss ...

The host is installed with Node.js 20.x before 20.11.1, or 21.x before 21.6.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle the Node.js experimental permission model. Successful exploitation could allow an attacker to give access to everything after the wildcard character of a file path.


Pages:      Start    7    8    9    10    11    12    13    14    15    16    17    18    19    20    ..   2661

© SecPod Technologies