[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14840 Download | Alert*

An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on ...

The host is installed with the Microsoft Windows, VMware Workstation 14.x before 14.1.2 or VMware Player 14.x before 14.1.2 and is prone to a speculative store bypass vulnerability. The application fails to properly handle speculative execution control mechanism issues. On successful exploitation, an attacker could cause information disclosure in applications and/or execution runtimes which rely o ...

The host is installed with Ghostscript through 9.20 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle an unknown input to the -dSAFER argument. Successful exploitation could allow attackers to determine the existence and size of arbitrary files.

The host is installed with Artifex Ghostscript before 9.23 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle the uninitialized memory access in the aesdecode operator. Successful exploitation could allow attackers to crash the interpreter or potentially execute code.

The host is installed with Artifex Ghostscript before 9.23 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle the LockDistillerParams parameter. Successful exploitation could allow attackers to crash the interpreter or execute code.

The host is installed with Artifex Ghostscript before 9.23 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle the .shfill operator. Successful exploitation could allow attackers to supply crafted postScript files to crash the interpreter or potentially execute code.

The host is installed with Artifex Ghostscript before 9.23 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle .tempfile restrictions and write files. Successful exploitation could allow attackers to supply malicious postScript files to bypass .tempfile restrictions and write files.

The host is installed with Artifex Ghostscript before 9.24 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle .tempfile restrictions and write files. Successful exploitation could allow attackers to supply malicious postScript files to bypass .tempfile restrictions and write files.

The host is installed with Artifex Ghostscript before 9.24 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle the builtin PDF14 converter. Successful exploitation could allow attackers to supply crafted postScript files to crash the interpreter or potentially execute code.

The host is installed with Artifex Ghostscript before 9.24 and is prone to a denial of service vulnerability. A flaw is present in the application, which uses incorrect free logic in pagedevice. Successful exploitation could allow attackers to supply crafted postScript files to crash the interpreter or potentially execute code.


Pages:      Start    3    4    5    6    7    8    9    10    11    12    13    14    15    16    ..   1483

© SecPod Technologies