[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26831 Download | Alert*

The host is installed with Teamviewer 15.41 before 15.42.8 and is prone to an improper authorisation vulnerability. A flaw is present in the application, which fails to handle the local device settings. Successful exploitation allows an unprivileged user to change basic local device settings even though the options were locked.

The host is installed with Docker Desktop before 4.12.0 and is prone to an argument injection vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to gain local privilege.

The host is installed with Docker Desktop Docker Docker_desktop versions less than 4.12.0 and is prone to a Rce vulnerability. A flaw is present in the application, which fails to properly handle query parameters in message-box route. Successful exploitation allows an attacker to cause remote code execution.

The host is installed with Docker Desktop Docker desktop 4.11.0 before 4.12.0, and is prone to a Local privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle ipc response spoofing. Successful exploitation allows an attacker to gain local privileges.

The host is installed with Docker Desktop Docker Docker_desktop versions less than 4.12.0 and is prone to a Rce vulnerability. A flaw is present in the application, which fails to properly handle a crafted extension description or changelog. Successful exploitation could allow an attacker to cause remote code execution.

The host is installed with Okta ScaleFT 1.13.1 before 1.68.2 and is prone to a command injection vulnerability. A flaw is present in the application, which fails to handle third-party library webbrowser. Successful exploitation could allow an attacker to cause unspecified impact.

The host is installed with Atlassian SourceTree before 3.1.3 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle an issue in the URI handlers. Successful exploitation allows a remote, unauthenticated attacker to gain remote code execution using a crafted URL.

The host is installed with Adobe Genuine Service before 6.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle symbolic links. Successful exploitation could allow an attacker to elevate privileges in the context of the current user.

The host is installed with Adobe Genuine Service before 6.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle secure library loading. Successful exploitation could allow an authenticated attacker to rewrite the file of the administrator, which may lead to elevated permissions.

The host is installed with Adobe Genuine Service before 6.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle secure library loading. Successful exploitation could allow an attacker with admin privileges to plant custom binaries and execute them with System permissions.


Pages:      Start    1647    1648    1649    1650    1651    1652    1653    1654    1655    1656    1657    1658    1659    1660    ..   2683

© SecPod Technologies