[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26703 Download | Alert*

The host is installed with Apache Tomcat 10.1.0-M1 before 10.1.0-M17, 10.0.0-M1 before 10.0.23, 9.0.30 before 9.0.65 or 8.5.50 before 8.5.82 and is prone to a cross-site scripting vulnerability. A flaw is present in application, which fails to properly validate user data. Successful exploitation could allow attackers to perform cross site scripting.

The host is installed with Artifex Ghostscript 9.50 and is prone to an out of bounds write vulnerability. A flaw is present in the application, which fails to properly handle issues in clj_media_size function in devices/gdevclj.c. Successful exploitation allows attackers to cause a denial of service or other unspecified impact(s) via opening of crafted PDF document.

A security feature bypass vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLMv2 protection if a client is also sending LMv2 responses. An attacker who successfully exploited this vulnerability could gain the ability to downgrade NTLM security features.To exploit this vulnerability, the attacker would need to be able to modify NTLM tra ...

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.To exploit this vulnerability, an attacker woul ...

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.To exploit this vulnerability, an attacker woul ...

An information disclosure vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could obtain information that could be useful for further exploitation.To exploit the vulnerability, a user would have to open a specially crafted file.The security update addresses the vulnerability by correcting how Micros ...

An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the information disclosure does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability.To ...

The host is installed with Wireshark 3.6.0 before 3.6.9 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the issue in OPUS protocol dissector. Successful exploitation could allow attackers to inject a malformed packet onto the wire or by convincing victim to read a malformed packet trace file.

The host is installed with Adobe InCopy through 16.0 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Nvidia graphics driver with 460.x prior to 461.09 and is prone to a denial of service vulnerability. A flaw is present in the kernel mode layer (nvlddmkm.sys) handler, which fails to properly handle unknown vector. Successful exploitation may allow attackers to cause denial of service, escalation of privileges, and information disclosure.


Pages:      Start    1639    1640    1641    1642    1643    1644    1645    1646    1647    1648    1649    1650    1651    1652    ..   2670

© SecPod Technologies