[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26707 Download | Alert*

The host is installed with Docker Desktop before 3.6.0 and is prone to a code execution vulnerability. A flaw is present in the application, which fails to handle the access control. Successful exploitation could allow an attacker with low privilege to read, write and possibly even execute code inside the containers.

The host is installed with Telegram Desktop 1.3.14 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation could leak end-user public and private IP addresses during a call because of an unsafe default behavior in which P2P connections are accepted from clients outside of the My Cont ...

The host is installed with jsonwebtoken through 8.5.1 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to properly handle key retrieval parameter of jwt.verify(). Successful exploitation could allow attackers to cause arbitrary code execution.

Mozilla Firefox ESR 102.2 and Mozilla Thunderbird 102.2 : A data race could occur in the PK11_ChangePW function, potentially leading to a use-after-free vulnerability. In Firefox, this lock protected the data when a user changed their master password.

The host is installed with GlobalProtect Agent 5.0.x, 5.1.x before 5.1.9 or 5.2.x before 5.2.8 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in system processes. Successful exploitation allows a man-in-the-middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privil ...

The host is installed with GlobalProtect App 5.0.x before 5.0.10 or 5.1.x before 5.1.4 and is prone to a file race condition vulnerability. A flaw is present in the application, which fails to properly handle an issue during GlobalProtect app upgrade. Successful exploitation allows a local limited Windows user to execute programs with SYSTEM privileges.

The host is installed with GlobalProtect Agent version 4.1.0 and is prone to a local information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the session tokens. Successful exploitation could allow attackers to obtain sensitive information that may aid in launching further attacks.

The host is installed with GlobalProtect Agent 5.1.x before 5.1.8 or 5.2.x before 5.2.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in user input validation. Successful exploitation allows a local limited Windows user to send specifically-crafted input to the GlobalProtect app that results in a Windows blue screen ...

The host is installed with GlobalProtect App 5.2 before 5.2.9 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an issue in the Connect Before Logon feature. Successful exploitation allows attackers to escalate SYSTEM or root privileges when authenticating with Connect Before Logon under certain circumstances.

The host is installed with GlobalProtect Agent 5.1.x before 5.1.10 or 5.2.x before 5.2.9 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the credentials of the local user. Successful exploitation allows a user to prevent the transmission of the user's local user credentials to the target GlobalProtect portal regardless o ...


Pages:      Start    1807    1808    1809    1810    1811    1812    1813    1814    1815    1816    1817    1818    1819    1820    ..   2670

© SecPod Technologies