[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26631 Download | Alert*

The host is installed with Apache Tomcat 10.0.0-M5 through 10.0.14, 9.0.35 through 9.0.56 or 8.5.55 through 8.5.73 and is prone to an race condition vulnerability. A flaw is present in application, which fails to handle tomcat persist sessions while using the FileStore. Successful exploitation allows attackers to perform actions with the privileges of the local user.

The host is installed with Apache Tomcat 10.1.0-M1 before 10.1.0-M17, 10.0.0-M1 before 10.0.23, 9.0.30 before 9.0.65 or 8.5.50 before 8.5.82 and is prone to a cross-site scripting vulnerability. A flaw is present in application, which fails to properly validate user data. Successful exploitation could allow attackers to perform cross site scripting.

The host is installed with Artifex Ghostscript 9.50 and is prone to an out of bounds write vulnerability. A flaw is present in the application, which fails to properly handle issues in clj_media_size function in devices/gdevclj.c. Successful exploitation allows attackers to cause a denial of service or other unspecified impact(s) via opening of crafted PDF document.

A security feature bypass vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLMv2 protection if a client is also sending LMv2 responses. An attacker who successfully exploited this vulnerability could gain the ability to downgrade NTLM security features.To exploit this vulnerability, the attacker would need to be able to modify NTLM tra ...

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.To exploit this vulnerability, an attacker woul ...

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.To exploit this vulnerability, an attacker woul ...

The host is installed with Wireshark 3.6.0 before 3.6.9 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle the issue in OPUS protocol dissector. Successful exploitation could allow attackers to inject a malformed packet onto the wire or by convincing victim to read a malformed packet trace file.

The host is installed with Adobe InCopy through 16.0 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Nvidia graphics driver with 460.x prior to 461.09 and is prone to a denial of service vulnerability. A flaw is present in the kernel mode layer (nvlddmkm.sys) handler, which fails to properly handle unknown vector. Successful exploitation may allow attackers to cause denial of service, escalation of privileges, and information disclosure.

The host is installed with Nvidia graphics driver with 460.x prior to 461.09 and is prone to a denial of service vulnerability. A flaw is present in the kernel mode layer (nvlddmkm.sys) handler, which fails to properly handle unknown vector. Successful exploitation may allow attackers to cause denial of service.


Pages:      Start    1625    1626    1627    1628    1629    1630    1631    1632    1633    1634    1635    1636    1637    1638    ..   2663

© SecPod Technologies