[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

126291

 
 

909

 
 

105100

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 10263 Download | Alert*

The host is installed with Oracle Java SE through 7u221, 8u212, 11.0.3 or 12.0.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Utilities. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle Java SE through 11.0.3 or 12.0.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JSSE. Successful exploitation allows attackers to affect confidentiality.

Mozilla Firefox 65.0.1, Mozilla Firefox ESR 60.5.1, Mozilla Thunderbird 60.7.2: A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw.

Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer.

The host is installed with Google Chrome before 75.0.3770.142 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation may lead to exposure of sensitive information.

The host is installed with Google Chrome before 75.0.3770.142 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Puppet 2.x before 2.6.18, 2.7.x before 2.7.21, 3.1.x before 3.1.1 and is prone to security bypass vulnerability. A flaw is present in the applications, which fail to handle the default configuration for puppet masters. Successful exploitation allows remote authenticated nodes to submit reports for other nodes via unspecified vectors.

The host is installed with Puppet 2.6.x before 2.6.18 and is prone to remote code-execution vulnerability. A flaw is present in the applications, which fail to handle a crafted request for a report. Successful exploitation allows remote authenticated users to execute arbitrary code on the puppet master, or an agent with puppet kick enabled.

The host is installed with Puppet 2.7.x before 2.7.21 or 3.1.x before 3.1.1 and is prone to SSL Protocol downgrade vulnerability. A flaw is present in the application, which fails to properly negotiate the SSL protocol between client and master. Successful exploitation allows remote attackers to conduct SSLv2 downgrade attacks against SSLv3 sessions via unspecified vectors.

The host is installed with Puppet before 2.6.18, 2.7.x before 2.7.21 or 3.1.x before 3.1.1 or and is prone to arbitrary code-execution vulnerability. A flaw is present in the application, which fails to handle a crafted HTTP request. Successful exploitation allows remote authenticated users to execute arbitrary code.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1026

© SecPod Technologies