[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253562

 
 

909

 
 

197267

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31462 Download | Alert*

The host is installed with Oracle MySQL Server through 5.6.42, 5.7.24 or 8.0.13 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Optimizer. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 8.0.13 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Optimizer. Successful exploitation allows attackers to affect Availability.

The host is installed with OpenSSL 1.1.0 before 1.1.0h or OpenSSL 1.0.2b before 1.0.2n or MySQL Server prior to 5.6.40, 5.7.22 or 8.0.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle malicious input to a stack. Successful exploitation can allow attackers to crash the application.

The host is installed with oracle fusion middleware mapViewer 12.2.1.2 or 12.2.1.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the install (Apache Batik) component issue. Successful exploitation allows an attacker to gain access to sensitive information.

The host is installed with LibreOffice 6.3.x before 6.3.6 or 6.4.x before 6.4.3 and is prone to a missing encryption vulnerability. A flaw is present in the application, which fails to handle encryption of auto-saved non ODF file format upon subsequent saves after crash. Successful exploitation could leak sensitive data.

The host is installed with LibreOffice 6.4.x before 6.4.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle remote graphic links loaded from docx documents were not in stealth mode by default. Successful exploitation could leak sensitive data.

The host is installed with LibreOffice 6.4.x before 6.4.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle Form Handler component. Successful exploitation could lead to privilege escalation.

An elevation of privilege vulnerability exists when the OneDrive for Windows Desktop application improperly handles symbolic links. An attacker who successfully exploited this vulnerability could overwrite a targeted file with an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that coul ...

An elevation of privilege vulnerability exists when the OneDrive for Windows Desktop application improperly handles symbolic links. An attacker who successfully exploited this vulnerability could overwrite a targeted file with an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that coul ...

An elevation of privilege vulnerability exists when the OneDrive for Windows Desktop application improperly handles symbolic links. An attacker who successfully exploited this vulnerability could overwrite a targeted file with an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that coul ...


Pages:      Start    1354    1355    1356    1357    1358    1359    1360    1361    1362    1363    1364    1365    1366    1367    ..   3146

© SecPod Technologies