[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26496 Download | Alert*

A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could b ...

A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could b ...

The host is installed with LibreOffice before 6.2.6 and is prone to an insufficient url validation vulnerability. A flaw is present in the application, which fails to properly handle an issue in librelogo script. Successful exploitation could allow attackers to execute arbitrary python commands.

The host is installed with LibreOffice before 6.2.6 and is prone to a global-event script execution vulnerability. A flaw is present in the application, which fails to properly handle an issue in librelogo script. Successful exploitation could allow attackers to execute arbitrary python commands.

The host is installed with LibreOffice before 6.2.6 and is prone to an insufficient URL encoding attack vulnerability. A flaw is present in the application, which fails to properly handle an issue in allowed location script check. Successful exploitation could allow attackers to execute scripts in arbitrary locations on the file system.

The host is installed with LibreOffice 6.2.x before 6.2.7 or 6.3.x before 6.3.1 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to properly handle an unknown functionality of the file share/Scripts/python of the component URL Encoding. Successful exploitation could allow attackers to execute scripts in arbitrary locations on the file system by ...

The host is installed with Apache Subversion 1.9.x through 1.9.10, 1.10.x through 1.10.4 or 1.12.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle certain sequences of protocol commands. Successful exploitation could allow remote attackers to cause disruption for users of the server.

The host is installed with Apache Subversion 1.9.x through 1.9.10, 1.10.x through 1.10.4 or 1.12.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a well-formed read-only request. Successful exploitation could allow remote attackers to cause disruption for users of the server.

The host is installed with Artifex Ghostscript before 9.50 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle a specially crafted PostScript file. Successful exploitation could allows attackers to disable security protection and then have access to the file system, or execute arbitrary commands.

The host is installed with Artifex Ghostscript 9.x before 9.50 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle a specially crafted PostScript file. Successful exploitation could allows attackers to disable security protection and then have access to the file system, or execute arbitrary commands.


Pages:      Start    1237    1238    1239    1240    1241    1242    1243    1244    1245    1246    1247    1248    1249    1250    ..   2649

© SecPod Technologies