[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252212

 
 

909

 
 

196748

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31433 Download | Alert*

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.

Dell BIOS contains an Improper Authorization vulnerability. An unauthenticated physical attacker may potentially exploit this vulnerability, leading to denial of service.

The host is installed with PHP 8.1.x below 8.1.8 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle issue in issues in fileinfo functions. On successful exploitation, when fileinfo functions, such as finfo_buffer, due to incorrect patch applied to the third party code from libmagic, incorrect function may be used to free alloc ...

The host is installed with PHP versions 7.4.x below 7.4.28, 8.0.x below 8.0.16 or 8.1.x below 8.1.3 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to properly handle issues in the filter functions with FILTER_VALIDATE_FLOAT filter and min/max limits. On successful exploitation, when using filter functions with FILTER_VALIDATE_FLOAT filter and min ...


Pages:      Start    1567    1568    1569    1570    1571    1572    1573    1574    1575    1576    1577    1578    1579    1580    ..   3143

© SecPod Technologies