The host is installed with OpenSSL 1.0.2 through 1.0.2t or 1.1.1 through 1.1.1d and is prone to a buffer overflow vulnerability. A flaw is present in the application which fails to handle an issue in x64_64 Montgomery squaring procedure. Successful exploitation allows a remote attacker to obtain sensitive information.
The host is installed with Mozilla Thunderbird before 68.1.1 and is prone to a spoofing attack vulnerability. A flaw is present in the application , whose execution can make incorrect processing of S/MIME messages. Successful exploitation could allow attackers to create a specially crafted message and make it look as it was signed with a valid signature.
The host is installed with Oracle MySQL Server 5.6.x through 5.6.45 or 5.7.x through 5.7.27 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Security: Encryption. Successful exploitation allows attackers to affect confidentiality.
The host is installed with Oracle MySQL Server 5.6.x through 5.6.45 or 5.7.x through 5.7.27 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Security: Encryption. Successful exploitation allows attackers to affect confidentiality.
The host is installed with Oracle MySQL Server 5.6.x through 5.6.45 or 5.7.x through 5.7.27 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Security: Encryption. Successful exploitation allows attackers to affect confidentiality.
The host is installed with Oracle MySQL Server 5.6.x through 5.6.45 or 5.7.x through 5.7.27 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Security: Encryption. Successful exploitation allows attackers to affect confidentiality.
The host is installed with Artifex Ghostscript 9.x before 9.28 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle the crafted PostScript file. Successful exploitation could allow attackers to escalate privileges within the ghostscript and access files outside of restricted areas or execute commands.
A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could b ...
A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could b ...
A tampering vulnerability exists when Git for Visual Studio improperly handles virtual drive paths. An attacker who successfully exploited this vulnerability could write arbitrary files and directories to certain locations on a vulnerable system. However, an attacker would have limited control over the destination of the files and directories. To exploit the vulnerability, an attacker must clone a ...