[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194074 Download | Alert*

The host is missing a high severity security update according to Google advisory. The update is required to fix heap buffer overflow vulnerability. The flaws are present in the application, which fails to handle unspecified vector. Successful exploitation allows attackers to have unspecified impact.

The host is missing a high severity security update according to Google advisory. The update is required to fix heap buffer overflow vulnerability. The flaws are present in the application, which fails to handle unspecified vector. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 88.0.4324.150 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 88.0.4324.150 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is missing a high severity security update according to Google advisory. The update is required to fix heap buffer overflow vulnerability. The flaws are present in the application, which fails to handle unspecified vector. Successful exploitation allows attackers to have unspecified impact.

The host is missing a high severity security update according to Google advisory. The update is required to fix heap buffer overflow vulnerability. The flaws are present in the application, which fails to handle unspecified vector. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 88.0.4324.150 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

Heap-based buffer overflow in the pstoedit_suffix_table_init function in output-pstoedit.c in AutoTrace 0.31.1 allows remote attackers to cause a denial of service via a crafted bmp image file. A biWidth*biBitCnt integer overflow in input-bmp.c in autotrace 0.31.1 allows attackers to provide an unexpected input value to malloc via a malformed bitmap image. A bitmap double free in main.c in autotr ...

AutoTrace is a program for converting bitmaps to vector graphics.

The host is missing a critical security update according to Adobe advisory, APSB21-11. The update is required to fix an out-of-bounds write vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could lead to arbitrary code execution in the context of the current user.


Pages:      Start    9285    9286    9287    9288    9289    9290    9291    9292    9293    9294    9295    9296    9297    9298    ..   19407

© SecPod Technologies