[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15027 Download | Alert*

The host is installed with Artifex Ghostscript before 9.24 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which uses incorrect restoration of privilege checking during handling of invalid access exceptions. Successful exploitation could allow attackers to supply crafted postScript files to crash the interpreter or potentially execute code.

The host is installed with Artifex Ghostscript before 9.24 and is prone to a denial of service vulnerability. A flaw is present in the application, which uses incorrect exec stack handling in the "CS" and "SC" PDF primitives. Successful exploitation could allow attackers to supply crafted postScript files to crash the interpreter or potentially execute code.

The host is installed with Artifex Ghostscript before 9.24 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle the ztype parameter. Successful exploitation could allow attackers to supply crafted postScript files to crash the interpreter or potentially execute code.

The host is installed with Artifex Ghostscript before 9.24 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to properly handle the setcolor function. Successful exploitation could allow attackers to supply crafted postScript files to crash the interpreter or potentially execute code.

The host is installed with Artifex Ghostscript before 9.24 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle the .setdistillerkeys PostScript command. Successful exploitation could allow attackers to supply crafted postScript files to crash the interpreter or potentially execute code.

The host is installed with Artifex Ghostscript before 9.25 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an exception during incorrect "restoration of privilege" checking when running out of stack. Successful exploitation could allow attackers to supply crafted PostScript to execute code using the "pipe" instruction.

The host is installed with Artifex Ghostscript before 9.25 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle crafted postscript. Successful exploitation could allow attackers to potentially overwrite or replace error handlers to inject code.

The host is installed with Python through versions 2.7.16 or 3.7.2 and is prone to a CRLF injection vulnerability. The flaw is present in the application, which fails to properly handle an issue in urrlib2. Successful exploitation allows attackers to initiate CRLF injection.

Mozilla Firefox 67, Mozilla Firefox ESR 60.7, Mozilla Thunderbird 60.7, Java 7u221, 8u212, 11.0.3 and 12.0.2: A use-after-free vulnerability was discovered in the <code>png_image_free</code> function in the libpng library. This could lead to denial of service or a potentially exploitable crash when a malformed image is processed.

The host is installed with Oracle Java SE through 7u221, 8u212, 11.0.3 or 12.0.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to AWT. Successful exploitation allows attackers to affect integrity and availability.


Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   1502

© SecPod Technologies