[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253650

 
 

909

 
 

197367

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9 or 8.4.x before 8.4.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a table with crafted index functions by functions that modify (1) search_path or (2) a prepared statement. Success ...

The host is installed with PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9 or 8.4.x before 8.4.2 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate. Successful exploitation all ...

The host is installed with PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11 or 8.4 before 8.4.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle (1) ALTER USER or (2) ALTER DATABASE statement. Successful exploitation allows remote authenticated users to remove arbitrary ...

The host is installed with PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11 or 8.4 before 8.4.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle pltcl_modules table. Successful exploitation allows remote authenticated users, with database-creation privileges, to execute ...

The host is installed with PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11 or 8.4 before 8.4.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a crafted script, related to the Safe module (aka Safe.pm) for Perl. Successful exploitation allows remote authenticated user ...

The host is installed with Adobe Illustrator CS4 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle memory. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Illustrator CS4 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle memory. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Illustrator CC 2019 before 24.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to execute arbitrary code.

The host is installed with Adobe Illustrator CC 2019 before 24.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to execute arbitrary code.

The host is installed with Adobe Illustrator CC 2019 before 24.0 and is prone to an insecure library loading (DLL hijacking) vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to perform privilege escalation.


Pages:      Start    1366    1367    1368    1369    1370    1371    1372    1373    1374    1375    1376    1377    1378    1379    ..   1502

© SecPod Technologies