A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could b ...
A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could b ...
The host is installed with LibreOffice before 6.2.6 and is prone to an insufficient url validation vulnerability. A flaw is present in the application, which fails to properly handle an issue in librelogo script. Successful exploitation could allow attackers to execute arbitrary python commands.
The host is installed with LibreOffice before 6.2.6 and is prone to a global-event script execution vulnerability. A flaw is present in the application, which fails to properly handle an issue in librelogo script. Successful exploitation could allow attackers to execute arbitrary python commands.
The host is installed with LibreOffice before 6.2.6 and is prone to an insufficient URL encoding attack vulnerability. A flaw is present in the application, which fails to properly handle an issue in allowed location script check. Successful exploitation could allow attackers to execute scripts in arbitrary locations on the file system.
The host is installed with LibreOffice 6.2.x before 6.2.7 or 6.3.x before 6.3.1 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to properly handle an unknown functionality of the file share/Scripts/python of the component URL Encoding. Successful exploitation could allow attackers to execute scripts in arbitrary locations on the file system by ...
The host is installed with Apache Subversion 1.9.x through 1.9.10, 1.10.x through 1.10.4 or 1.12.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle certain sequences of protocol commands. Successful exploitation could allow remote attackers to cause disruption for users of the server.
The host is installed with Apache Subversion 1.9.x through 1.9.10, 1.10.x through 1.10.4 or 1.12.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a well-formed read-only request. Successful exploitation could allow remote attackers to cause disruption for users of the server.
The host is installed with Artifex Ghostscript before 9.50 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle a specially crafted PostScript file. Successful exploitation could allows attackers to disable security protection and then have access to the file system, or execute arbitrary commands.
The host is installed with Artifex Ghostscript 9.x before 9.50 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle a specially crafted PostScript file. Successful exploitation could allows attackers to disable security protection and then have access to the file system, or execute arbitrary commands.