[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26416 Download | Alert*

The host is installed with Adobe Bridge versions less than or equal 12.0.1 and is prone to an out of bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.

The host is installed with Adobe Bridge versions less than or equal 12.0.1 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.

The host is installed with Adobe Bridge versions less than or equal 12.0.1 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.

The host is installed with Adobe Animate before 21.0.11 or 22.0.x before 22.0.6 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.

The host is installed with OpenSSL 3.0.4 and is prone to a heap memory corruption vulnerability. A flaw is present in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions which fails to properly handle issues in RSA implementation with 2048 bit private keys. Successful exploitation could allow an attacker to trigger a remote code execution on the machine performing the com ...

The host is installed with PostgreSQL 10.x before 10.21, 11.x before 11.16, 12.x before 12.11, 13.x before 13.7 or 14.x before 14.3 and is prone to a SQL injection vulnerability. A flaw is present in the application which fails to properly process the Autovacuum, REINDEX, CREATE INDEX, REFRESH MATERIALIZED VIEW, CLUSTER, and pg_amcheck commands activated relevant protections. Successful exploitati ...

The host is installed with Axiosys Bento4 1.6.0-639 and is prone to a use after free vulnerability and use after free vulnerability. A flaw is present in the applications which fails to properly handle an issue in function GetOffset of the file Ap4Sample.h of the component mp42hls. Successful exploitation allows remote attackers to cause unspecified impact.

The host is installed with Axiosys Bento4 1.6.0-639 and is prone to a null pointer dereference vulnerability vulnerability. A flaw is present in the applications which fails to properly handle an issue in function AP4_StsdAtom of the file Ap4StsdAtom.cpp of the component MP4fragment. Successful exploitation allows remote attackers to cause unspecified impact.

The host is installed with Axiosys Bento4 1.6.0-639 and is prone to a heap based buffer overflow vulnerability classified vulnerability. A flaw is present in the applications which fails to properly handle an issue in function AP4_BitStream::WriteBytes of the file Ap4BitStream.cpp of the component avcinfo. Successful exploitation allows remote attackers to cause unspecified impact.

The host is installed with Axiosys Bento4 1.6.0-639 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the applications which fails to properly handle an issue in unknown functionality of the file AvcInfo.cpp of the component avcinfo. Successful exploitation allows remote attackers to cause unspecified impact.


Pages:      Start    1513    1514    1515    1516    1517    1518    1519    1520    1521    1522    1523    1524    1525    1526    ..   2641

© SecPod Technologies