[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31505 Download | Alert*

The host is installed with Artifex Ghostscript before 10.02.0 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle the pcl/pl/plfont.c:418 in pl_glyph_name function. Successful exploitation allows attackers to cause a denial of service via transforming a crafted PCL file to PDF format.

The host is installed with Adobe Bridge through 12.0.4 or 13.x through 13.0.3 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause memory leak.

The host is installed with Adobe Bridge through 12.0.4 or 13.x through 13.0.3 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause memory leak.

The host is installed with Visual Studio code before 1.82.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified handle. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with PaperCut NG 20.0.0 before 20.1.9 or 21.0.0 before 21.2.13 or 22.0.0 before 22.1.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in application servers. Successful exploitation could allow an unauthenticated attacker with direct server IP access to upload arbitrary files into a target directo ...

The host is installed with VMware Workstation 17.x before 17.5 or or VMware Player 17.x before 17.5 and is prone to an information disclosure read vulnerability. A flaw is present in the application, which fails to properly handle issues in the functionality for sharing host Bluetooth devices. Successful exploitation could allow attackers with local administrative privileges on a virtual machine t ...

The host is installed with Adobe Photoshop 2022 through 23.5.5, or 2023 before 24.7.1 and is prone to an access of uninitialized pointer vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause arbitrary code execution.

The host is installed with Adobe Creative Cloud before 5.10 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Teamviewer 15.41 before 15.42.8 and is prone to an improper authorisation vulnerability. A flaw is present in the application, which fails to handle the local device settings. Successful exploitation allows an unprivileged user to change basic local device settings even though the options were locked.

The host is installed with Docker Desktop before 4.12.0 and is prone to an argument injection vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to gain local privilege.


Pages:      Start    1942    1943    1944    1945    1946    1947    1948    1949    1950    1951    1952    1953    1954    1955    ..   3150

© SecPod Technologies