[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 198378 Download | Alert*

The host is installed with Avast Antivirus before 22.11 or AVG Antivirus before 22.11 and is prone to a null pointer dereference vulnerability. A flaw exists in the application. which fails to properly handle the RPC-interface. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with Avast Antivirus before 22.11 or AVG Antivirus before 22.11 and is prone to a time-of-check/time-of-use (TOCTOU) vulnerability. A flaw exists in the application. which fails to properly handle the quarantine process. Successful exploitation allows attackers to delete arbitrary file or directory.

snapd: Daemon and tooling that enable snap packages An intended access restriction in snapd could be bypassed by strict mode snaps.

The host is installed with MongoDB 4.4.x, 5.0 before 5.0.14 or 6.3.x and is prone to a improper certificate validation vulnerability. A flaw is present in the application, which fails to handle an issues in unspecified vectors. On successful exploitation, if the MongoDB Server running on Windows is configured to use TLS with a specific set of configuration options that are already known to work se ...

apport: automatically generate crash reports for debugging Apport could be used to escalate privilege on specially configured systems.

apport: automatically generate crash reports for debugging Apport could be used to escalate privilege on specially configured systems.

The host is installed with GitLab CE/EE 11.9 before 15.9.6, 15.10 before 15.10.5, 15.11 before 15.11.1 and is prone to an improper access control vulnerability. A flaw is present in the application, which fails to properly handle certain conditions. Successful exploitation allows for a privileged attacker, to obtain session tokens from all users of a GitLab instance.

The host is installed with GitLab CE/EE 11.9 before 15.9.6, 15.10 before 15.10.5, 15.11 before 15.11.1 and is prone to an improper access control vulnerability. A flaw is present in the application, which fails to properly handle certain conditions. Successful exploitation allows for a privileged attacker, to obtain session tokens from all users of a GitLab instance.

The host is installed with GitLab CE/EE 12.9 before 16.0.8, 16.1 before 16.1.3, or 16.2 before 16.2.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to leak a user's email via an error message for groups that restrict membership by email domain.

The host is installed with GitLab CE/EE 12.9 before 16.0.8, 16.1 before 16.1.3, or 16.2 before 16.2.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to leak a user's email via an error message for groups that restrict membership by email domain.


Pages:      Start    10412    10413    10414    10415    10416    10417    10418    10419    10420    10421    10422    10423    10424    10425    ..   19837

© SecPod Technologies