[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26496 Download | Alert*

The host is installed with OpenSSL 1.0.2 through 1.0.2t or 1.1.1 through 1.1.1d and is prone to a buffer overflow vulnerability. A flaw is present in the application which fails to handle an issue in x64_64 Montgomery squaring procedure. Successful exploitation allows a remote attacker to obtain sensitive information.

The host is installed with Mozilla Thunderbird before 68.1.1 and is prone to a spoofing attack vulnerability. A flaw is present in the application , whose execution can make incorrect processing of S/MIME messages. Successful exploitation could allow attackers to create a specially crafted message and make it look as it was signed with a valid signature.

The host is installed with Oracle MySQL Server 5.6.x through 5.6.45 or 5.7.x through 5.7.27 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Security: Encryption. Successful exploitation allows attackers to affect confidentiality.

The host is installed with Oracle MySQL Server 5.6.x through 5.6.45 or 5.7.x through 5.7.27 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Security: Encryption. Successful exploitation allows attackers to affect confidentiality.

The host is installed with Oracle MySQL Server 5.6.x through 5.6.45 or 5.7.x through 5.7.27 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Security: Encryption. Successful exploitation allows attackers to affect confidentiality.

The host is installed with Oracle MySQL Server 5.6.x through 5.6.45 or 5.7.x through 5.7.27 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Security: Encryption. Successful exploitation allows attackers to affect confidentiality.

The host is installed with Artifex Ghostscript 9.x before 9.28 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle the crafted PostScript file. Successful exploitation could allow attackers to escalate privileges within the ghostscript and access files outside of restricted areas or execute commands.

A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could b ...

A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could b ...

A tampering vulnerability exists when Git for Visual Studio improperly handles virtual drive paths. An attacker who successfully exploited this vulnerability could write arbitrary files and directories to certain locations on a vulnerable system. However, an attacker would have limited control over the destination of the files and directories. To exploit the vulnerability, an attacker must clone a ...


Pages:      Start    1236    1237    1238    1239    1240    1241    1242    1243    1244    1245    1246    1247    1248    1249    ..   2649

© SecPod Technologies