[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26507 Download | Alert*

The host is installed with Apache Tomcat 10.1.0-M1 before 10.1.0-M17, 10.0.0-M1 before 10.0.23, 9.0.30 before 9.0.65 or 8.5.50 before 8.5.82 and is prone to a cross-site scripting vulnerability. A flaw is present in application, which fails to properly validate user data. Successful exploitation could allow attackers to perform cross site scripting.

The host is installed with Artifex Ghostscript 9.50 and is prone to an out of bounds write vulnerability. A flaw is present in the application, which fails to properly handle issues in clj_media_size function in devices/gdevclj.c. Successful exploitation allows attackers to cause a denial of service or other unspecified impact(s) via opening of crafted PDF document.

A security feature bypass vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLMv2 protection if a client is also sending LMv2 responses. An attacker who successfully exploited this vulnerability could gain the ability to downgrade NTLM security features.To exploit this vulnerability, the attacker would need to be able to modify NTLM tra ...

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.To exploit this vulnerability, an attacker woul ...

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.To exploit this vulnerability, an attacker woul ...

The host is installed with Wireshark 3.6.0 before 3.6.9 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the issue in OPUS protocol dissector. Successful exploitation could allow attackers to inject a malformed packet onto the wire or by convincing victim to read a malformed packet trace file.

The host is installed with Adobe InCopy through 16.0 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Nvidia graphics driver with 460.x prior to 461.09 and is prone to a denial of service vulnerability. A flaw is present in the kernel mode layer (nvlddmkm.sys) handler, which fails to properly handle unknown vector. Successful exploitation may allow attackers to cause denial of service, escalation of privileges, and information disclosure.

The host is installed with Nvidia graphics driver with 460.x prior to 461.09 and is prone to a denial of service vulnerability. A flaw is present in the kernel mode layer (nvlddmkm.sys) handler, which fails to properly handle unknown vector. Successful exploitation may allow attackers to cause denial of service.

The host is installed with Nvidia graphics driver with 460.x prior to 462.31 or 465.x prior to 466.11 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to properly handle unspecified vectors. Successful exploitation may lead to denial of service.


Pages:      Start    1612    1613    1614    1615    1616    1617    1618    1619    1620    1621    1622    1623    1624    1625    ..   2650

© SecPod Technologies