[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253562

 
 

909

 
 

197267

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 1000 Download | Alert*

Issue summary: Some non-default TLS server configurations can cause unboundedmemory growth when processing TLSv1.3 sessionsImpact summary: An attacker may exploit certain server configurations to triggerunbounded memory growth that would lead to a Denial of ServiceThis problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option isbeing used . In this case, under certain conditions, the ...

FreeRDP is a set of free and open source remote desktop protocol library and clients. In affected versions an integer overflow in `freerdp_bitmap_planar_context_reset` leads to heap-buffer overflow. This affects FreeRDP based clients. FreeRDP based server implementations and proxy are not affected. A malicious server could prepare a `RDPGFX_RESET_GRAPHICS_PDU` to allocate too small buffers, possib ...

An issue was discovered in some DNS recursive resolvers that allows remote attackers to cause a denial of service using a maliciously designed authority and response amplification

An issue was discovered in git where a client can convince upload-pack running on a server to allocate arbitrary amounts of memory, resulting in a possible denial of service.

The host is installed with Acrobat DC Continuous or Acrobat Reader DC Continuous before 2024.002.20759, Acrobat DC 2020 or Acrobat Reader DC 2020 before 20.005.30636 and is prone to an out-of-bounds read vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.

The host is installed with Acrobat DC Continuous or Acrobat Reader DC Continuous before 2024.002.20759, Acrobat DC 2020 or Acrobat Reader DC 2020 before 20.005.30636 and is prone to an out-of-bounds write vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.

The host is installed with Acrobat DC Continuous or Acrobat Reader DC Continuous before 24.002.20759, Acrobat DC 2020 or Acrobat Reader DC 2020 before 20.005.30635 and is prone to an out-of-bounds read vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could lead to arbitrary code execution.

The host is installed with Acrobat DC Continuous or Acrobat Reader DC Continuous before 24.002.20759, Acrobat DC 2020 or Acrobat Reader DC 2020 before 20.005.30635 and is prone to an out-of-bounds write vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could lead to arbitrary code execution.

The host is installed with Apple Mac OS 12 before 12.7.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the restriction of data container access. On successful exploitation, an app may be able to access sensitive user data.

The host is installed with Apple Mac OS 14 before 14.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. On successful exploitation, an app may be able to access user-sensitive data.


Pages:      Start    89    90    91    92    93    94    95    96    97    98    99    ..   99

© SecPod Technologies