[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14858 Download | Alert*

The host is installed with ImageMagick 7.0.8-34 and is prone to an improper initialization vulnerability. The flaws are present in the WriteJP2Image function in coders/jp2.c, which fails to handle "use of uninitialized value". Successful exploitation could allows an attackers to cause unspecified impact.

The host is installed with ImageMagick 7.0.8-32 and is prone to an out-of-bounds read vulnerability. The flaws are present in theLocaleLowercase in MagickCore/locale.c, which fails to handle unspecified vectors. Successful exploitation could allows an attackers to cause signal for memory access violation,.

The host is installed with ImageMagick 7.0.8-25 and is prone to an resource management errors vulnerability. The flaws are present in the ReadSIXELImage in coders/sixel.c, which fails to handle unspecified vectors. Successful exploitation could lead to information disclosure.

The host is installed with ImageMagick 7.0.8-25 and is prone to an resource management errors vulnerability. The flaws are present in the WritePSDChannel in coders/psd.c, which fails to handle unspecified vectors. Successful exploitation could lead to information disclosure.

The host is installed with Google Chrome before 10.0.648.204 and is prone to buffer overflow vulnerability. A flaw is present in the application which does not properly handle base strings. Successful exploitation allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

The host is installed with Google Chrome before 10.0.648.204 and is prone to use-after-free vulnerability. A flaw is present in the frame-loader implementation in the application which does not properly handle frame-loader. Successful exploitation allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

The host is installed with Adobe ColdFusion 2016 before Update 14 or 2018 before Update 8 and is prone to a remote file read vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation allows attackers to cause arbitrary file read from the Coldfusion install directory.

The host is installed with Adobe ColdFusion 2016 before Update 14 or 2018 before Update 8 and is prone to a file inclusion vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution of files located in the webroot or its subdirectory.

The host is installed with PostgreSQL 9.x before 9.6.17, 10.x before 10.12 and 11.x before 11.7 or 12.x before 12.2 and is prone to a database corruption vulnerability. A flaw is present in the application which fails to handle an authorization check issue in PostgreSQL's "ALTER ... DEPENDS ON EXTENSION". Successful exploitation allows attackers to perform drop objects such as function, triggers, ...

The host is installed with Google Chrome before 10.0.648.204 or Apple iTunes before 10.5 and is prone to use-after-free vulnerability. A flaw is present in the HTMLCollection implementation in the application which does not properly implement HTMLCollection. Successful exploitation allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.


Pages:      Start    1087    1088    1089    1090    1091    1092    1093    1094    1095    1096    1097    1098    1099    1100    ..   1485

© SecPod Technologies