[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31600 Download | Alert*

The host is installed with Geforce Experience prior to 3.27.0.112 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle NVContainer component. On successful exploitation, user without administrator privileges can create a symbolic link to a file that requires elevated privileges to write to or modify, which may lead to denial of ...

The host is installed with Git before 2.39.2 or Visual Studio 2017 or 2019 or 2022 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle an issue in `gitk` component. Successful exploitation allows attackers to potentially run executables from the current directory inadvertently, which can be exploited with some social engineering to tr ...

The host is installed with Docker Desktop before 4.17.x and is prone to a bypass vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation allows an unprivileged user to bypass ECI restrictions by setting Docker host to docker.raw.sock.

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.14 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality. Successful exploitation leads to credentials disclosure within a trusted session.

The host is installed with Trellix Agent through 5.7.8 and is prone to a heap-based overflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in unspecified vectors. Successful exploitation could allows a remote user to alter the page heap in the macmnsvc process memory block resulting in the service becoming unavailable.

The host is installed with Trellix Agent through 5.7.8 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an issue in unspecified vectors. Successful exploitation could allows a local users, during install/upgrade workflow, to replace one of the Agent's executables before it can be executed.

The host is installed with Adobe Media Encoder before 15.4.3 or 22.0 before 22.1.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause arbitrary code execution.

The host is installed with Cacti 1.2.6 and is prone to an insecure direct object reference vulnerability. A flaw is present in the application, which fails to properly handle a modified local_graph_id parameter. Successful exploitation allows an attacker to access sensitive information or perform unauthorized actions by manipulating object references.

The host is installed with Adobe ColdFusion 2018 before update 12 or 2021 before update 2 and is prone to a use of inherently dangerous function vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could allow attackers to bypass the security feature.

The host is installed with Artifex Ghostscript through 10.01.2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to have unspecified impact.


Pages:      Start    1892    1893    1894    1895    1896    1897    1898    1899    1900    1901    1902    1903    1904    1905    ..   3159

© SecPod Technologies