[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87888

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 12681 Download | Alert*

The host is installed with Teamviewer 10.x through 13.x and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle brute-force authentication. Successful exploitation allows attackers to determine the correct value of the default 4-digit PIN.

The host is installed with Acrobat DC Classic or Acrobat Reader DC Classic before 2015.006.30434, Acrobat DC Continuous or Acrobat Reader DC Continuous before 2018.011.20055, Acrobat 2017 or Acrobat Reader 2017 before 2017.011.30096 and is prone to an out-of-bounds write vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could le ...

The host is installed with Wireshark through 2.6.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle the create_app_running_mutex function issue. Successful exploitation allows attackers to arbitrarily modify access control.

The host is installed with Artifex Ghostscript before 9.25 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an exception during incorrect "restoration of privilege" checking when running out of stack. Successful exploitation could allow attackers to supply crafted PostScript to execute code using the "pipe" instruction.

The host is installed with Artifex Ghostscript before 9.24 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle .tempfile restrictions and write files. Successful exploitation could allow attackers to supply malicious postScript files to bypass .tempfile restrictions and write files.

The host is installed with Artifex Ghostscript before 9.24 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle the builtin PDF14 converter. Successful exploitation could allow attackers to supply crafted postScript files to crash the interpreter or potentially execute code.

The host is installed with Artifex Ghostscript before 9.24 and is prone to a denial of service vulnerability. A flaw is present in the application, which uses incorrect free logic in pagedevice. Successful exploitation could allow attackers to supply crafted postScript files to crash the interpreter or potentially execute code.

The host is installed with Artifex Ghostscript before 9.24 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the stack-size checking during error handling. Successful exploitation could allow attackers to supply crafted postScript files to crash the interpreter or potentially execute code.

The host is installed with Artifex Ghostscript before 9.24 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which uses incorrect restoration of privilege checking during handling of invalid access exceptions. Successful exploitation could allow attackers to supply crafted postScript files to crash the interpreter or potentially execute code.

The host is installed with Artifex Ghostscript before 9.24 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle the ztype parameter. Successful exploitation could allow attackers to supply crafted postScript files to crash the interpreter or potentially execute code.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1268

© SecPod Technologies