The host is installed with OpenSSH before 7.1p2 and is prone to denial of service vulnerability. A flaw is present in resend_bytes function in roaming_common.c in the client, which fails to validate the pathnames passed to its functions. Successful exploitation could allow remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstr ...
The host is installed with OpenSSH before 7.1p2 and is prone to information disclosure vulnerability. A flaw is present in roaming_read and roaming_write functions in roaming_common.c, which when certain proxy and forward options are enabled, do not properly maintain connection file descriptors. Successful exploitation could allow remote servers to cause a denial of service (heap-based buffer over ...
The host is installed with Apple iTunes before 12.9.1 or Apple iCloud before 7.8 and is prone to an unspecified vulnerability. A flaw is present in the application, which fail to properly handle a weakness in the Miller-Rabin primality test. Successful exploitation could allow attackers to exploit a weakness in the Miller-Rabin primality test.
The host is installed with Apple iTunes before 12.9.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fail to properly handle a crafted string. Successful exploitation could allow attackers to corrupt heap.
The host is installed with Apple iTunes before 12.9 or Apple iCloud before 7.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fail to properly handle crafted content. Successful exploitation could allow attackers to execute arbitrary code with system privileges.
The host is installed with Apple iTunes before 12.9 or Apple iCloud before 7.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fail to properly handle crafted content. Successful exploitation could allow attackers to gain elevated privileges.
The host is installed with Apple iTunes before 12.9 or Apple iCloud before 7.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fail to properly handle crafted content. Successful exploitation could allow attackers to gain elevated privileges.
The host is installed with Apple iTunes before 12.9 or Apple iCloud before 7.7 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fail to properly perform memory management. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with SQL Server and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow an authenticated attacker to send data over a network to an affected SQL Server.
The host is installed with Oracle MySQL Server through 8.0.27 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Replication. Successful exploitation allows attackers to affect Availability.