[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 10926 Download | Alert*

The host is installed with Google Chrome before 28.0.1500.71 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which does not properly prevent pop-under windows. Successful exploitation allows remote attackers to have an unspecified impact.

The host is installed with Google Chrome before 28.0.1500.71 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which does not properly prevent pop-under windows. Successful exploitation allows remote attackers to have an unspecified impact.

The host is installed with RHEL 6 or 7 and is prone to a command injection vulnerability. A flaw is present in the application, which fails to properly sanitize certain input before passing it to the gnuplot delegate functionality. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 20160407.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Flash Player before 11.2.202.616 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption).

An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system.

The host is installed with Docker-ce or Docker-ee before 18.09.4 and is prone to a command injection vulnerability. A flaw is present in the application, which fails an issue in the way docker build processes remote git URLs. Successful exploitation allows attackers to cause code execution in the context of the user executing the docker build command.

The host is installed with Docker-ce or Docker-ee before 18.09.4 and is prone to a command injection vulnerability. A flaw is present in the application, which fails an issue in the way docker build processes remote git URLs. Successful exploitation allows attackers to cause code execution in the context of the user executing the docker build command.

The swiotlb_print_info function in lib/swiotlb.c in the Linux kernel through 4.14.14 allows local users to obtain sensitive address information by reading dmesg data from a "software IO TLB" printk call.

A memory leak in the ql_alloc_large_buffers function in drivers/net/ethernet/qlogic/qla3xxx.c in the Linux kernel before 5.3.5 allows local users to cause a denial of service by triggering pci_dma_mapping_error failures, aka CID-1acb8f2a7a9f.


Pages:      Start    596    597    598    599    600    601    602    603    604    605    606    607    608    609    ..   1092

© SecPod Technologies