The host is installed with Adobe Audition 14.4 or before version and is prone to an access of memory location after end of buffer vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.
The host is installed with Adobe Audition 14.4 or before version and is prone to an access of memory location after end of buffer vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.
The host is installed with Adobe Audition 14.4 or before version and is prone to an access of memory location after end of buffer vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.
The host is installed with Adobe Premiere Pro before 15.4.3 or 22.0 before 22.1.1 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to gain privileges.
The host is installed with Adobe Premiere Pro before 15.4.3 or 22.0 before 22.1.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to gain privileges.
The host is installed with Adobe Premiere Pro before 15.4.3 or 22.0 before 22.1.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to gain privileges.
The host is installed with Adobe Premiere Pro before 15.4.3 or 22.0 before 22.1.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to gain privileges.
The host is installed with Apple iTunes before 12.10.1 or Apple iCloud before 7.14 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to properly handle buffer overflow. Successful exploitation could allow attackers to execute arbitrary code through a maliciously crafted text file.
The host is installed with OpenSSL 3.0.0 through 3.0.7 and is prone to a denial of service vulnerability. A flaw is present in application which fails to handle issues in policy constraint in X.509 certificate. Successful exploitation could allow an attacker to cause denial of service.
The host is installed with Docker Desktop 4.13.0 before 4.23.0, and is prone to an improper protection of alternate path vulnerability. A flaw is present in the application, which fails to properly handle the debug shell which remains accessible for a short time window after launching docker desktop.. Successful exploitation allows an unprivileged user to bypass enhanced container isolation (eci) ...