[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26496 Download | Alert*

The host is installed with Artifex Ghostscript 9.x before 9.50 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle a specially crafted PostScript file. Successful exploitation could allows attackers to disable security protection and then have access to the file system, or execute arbitrary commands.

The host is installed with Artifex Ghostscript before 9.50 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle a specially crafted PostScript file. Successful exploitation could allows attackers to disable security protection and then have access to the file system, or execute arbitrary commands.

The host is installed with Artifex Ghostscript before 9.50 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle a specially crafted PostScript file. Successful exploitation could allows attackers to escalate privileges and access files outside of restricted areas.

The host is installed with PostgreSQL 11.x before 11.5, 10.x before 10.10, 9.6.x before 9.6.15, 9.5.x before 9.5.19, 9.4.x before 9.4.24 and is prone to a SQL injection vulnerability. A flaw is present in the application which fails to properly handle the SECURITY DEFINER function. Successful exploitation allows attackers with EXECUTE permission on the function to execute arbitrary SQL as the owne ...

The host is installed with PostgreSQL 11.x before 11.5 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application which fails to properly handle the memory disclosure in cross-type comparison for hashed subplan. Successful exploitation allows attackers to read arbitrary bytes of server memory..

The host is installed with Apache Tomcat versions 9.0.0.M1 to 9.0.19 or 8.5.0 to 8.5.40 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to handle the issue in HTTP/2 connection. Successful exploitation allows attackers to cause server-side threads to block eventually leading to thread exhaustion and a DoS.

The host is installed with Wireshark 2.6.0 to 2.6.6 or 2.4.0 to 2.4.12 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the RPCAP dissector issue. Successful exploitation allows attackers to cause an application crash.

The host is installed with Wireshark 2.6.0 to 2.6.6 or 2.4.0 to 2.4.12 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the ASN.1 BER dissector issue. Successful exploitation could cause buffer overflow associated with excessive digits in time values.

The host is installed with Wireshark 2.6.0 to 2.6.6 or 2.4.0 to 2.4.12 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the TCAP dissector issue. Successful exploitation allows attackers to cause an application crash.

The host is installed with 7 zip 9.20 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the PartitionRef field in the Long Allocation Descriptor in a UDF file. Successful exploitation could allow attackers to crash the service.


Pages:      Start    1238    1239    1240    1241    1242    1243    1244    1245    1246    1247    1248    1249    1250    1251    ..   2649

© SecPod Technologies