[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 193626 Download | Alert*

The host is installed with Irfanview 4.54 and is prone to a write access violation vulnerability. A flaw is present in the applications which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to cause user mode write access violations.

The host is installed with Irfanview 4.54 and is prone to a write access violation vulnerability. A flaw is present in the applications which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to cause user mode write access violations.

The host is installed with Papercut NG before 18.3.6 and is prone to a script injection vulnerability. A flaw is present in the applications which fails to properly handle user interface, aka PC-15163. Successful exploitation allow remote attackers to cause script injection.

The host is installed with Papercut NG through 18.3.8 or Papercut NG 19.0.1 through 19.0.3 and is prone to a unspecified vulnerability vulnerability. A flaw is present in the applications which fails to properly handle unspecified vectors. Successful exploitation could allow a remote attackers to execute arbitrary code.

The host is installed with Keepass 2.48 and is prone to exposure of sensitive information to an unauthorized actor vulnerability. A flaw is present in the application, which fails to properly handle logging the plain text passwords in system log. Successful exploitation allows attackers to interact and read sensitive passwords and logs.

Microsoft Visual C++ 2005 Redistribution Pkg is installed.

Microsoft Visual C++ 2005 Service Pack 1 Redistribution Pkg is installed.

The character + in various files used to be markers for systems to insert data from NIS maps at a certain point in a system configuration file. These entries are no longer required on most systems, but may exist in files that have been imported from other platforms. Rationale: These entries may provide an avenue for attackers to gain privileged access on the system.

Although the useradd program will not let you create a duplicate User ID (UID), it is possible for an administrator to manually edit the /etc/passwd file and change the UID field. Rationale: Users must be assigned unique UIDs for accountability and to ensure appropriate access protections.

The kernel module sctp should be disabled.


Pages:      Start    10470    10471    10472    10473    10474    10475    10476    10477    10478    10479    10480    10481    10482    10483    ..   19362

© SecPod Technologies