[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31148 Download | Alert*

The host is installed with Adobe Photoshop 2023 before 24.7.3, or 2024 before 25.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause memory leak.

The host is installed with Node.js 18.x before 18.19.1, 20.x before 20.11.1, or 21.x before 21.6.2 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to handle a specially crafted HTTP request with chunked encoding. Successful exploitation could allow an attacker to cause resource exhaustion and denial of service (DoS) leading to CPU and network ban ...

The host is installed with Node.js 20.x before 20.11.1, or 21.x before 21.6.2 and is prone to a path traversal vulnerability. A flaw is present in the application which fails to properly handle the experimental permission model. Successful exploitation could allow an attacker to modify the result of path.resolve() using the monkey-patching Buffer internals, leading to a path traversal vulnerabilit ...

The host is installed with Node.js 20.x before 20.11.1, or 21.x before 21.6.2 and is prone to a path traversal vulnerability. A flaw is present in the application which fails to properly handle multiple built-in utility functions used to normalize paths. Successful exploitation could allow an attacker to overwite the node:fs functions with user-defined implementations leading to filesystem permiss ...

The host is installed with Node.js 20.x before 20.11.1, or 21.x before 21.6.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle the Node.js experimental permission model. Successful exploitation could allow an attacker to give access to everything after the wildcard character of a file path.

The host is installed with Cisco Webex App before 42.7 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the checks for associations between user accounts and organization accounts. Successful exploitation could allow an authenticated, remote attacker to view and modify data for an organization other than their own organization.

Out of bounds read for some Intel(R) PROSet/Wireless WiFi products may allow a privileged user to potentially enable information disclosure via local access.

Improper input validation for some Intel(R) PROSet/Wireless WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access.

Improper input validation for some Intel(R) PROSet/Wireless WiFi products may allow an unauthenticated user to potentially enable denial of service via network access.

The host is installed with OpenSSL 3.1.0 before 3.1.1, 3.0.0 before 3.0.9 and is prone to a buffer over read vulnerability. A flaw is present in the application, which fails to properly handle the AES-XTS cipher decryption implementation. Successful exploitation allows attackers to cause application crash.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   3114

© SecPod Technologies