[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

251139

 
 

909

 
 

196159

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26832 Download | Alert*

The host is installed with Google Chrome before 104.0.5112.79 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Symantec Endpoint Protection Manager Client before 14.3.5470.3000, 14.3 RU4 before 14.3.7419.4000, 14.3 RU5 before 14.3.8289.5000 or 14.3 RU6 before 14.3.9210.6000 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation allows an attacker to compromise the sof ...

The host is installed with Couchbase Server 6.5.x through 6.6.6, 7.x through 7.0.5 and 7.1.0 through 7.1.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle issues in server node for couchbase for a brief period, the Erlang distribution protocol's security cookie is set to "nocookie", which has no access controls. Successful exploitat ...

The host is installed with Google Chrome before 97.0.4692.71 and is prone to an inappropriate implementation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

An information disclosure vulnerability exists in Visual Studio Code Live Share Extension when it exposes tokens in plain text. To exploit the vulnerability, an attacker would need to perform a successful capture of the tokens from client to proxy, where specific proxy settings are being used, making this very difficult to exploit. The update address the vulnerability by modifying the way Visual S ...

.NET Spoofing Vulnerability. Successful exploitation of this vulnerability requires an attacker to successfully execute a blind XXE attack. Confidentiality is High, if an attacker successfully exploits this it is information disclosure. While the attacker could read files that shouldn't be exposed, they wouldn't have the ability to modify them in any way (Integrity) or delete them to stop the app ...

The host is installed with Adobe InDesign before 16.4 and is prone to an access of memory location after end of buffer vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.

The host is installed with Adobe InDesign before 16.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.

The host is installed with Apache Spark through 3.0.3, 3.1.1 through 3.1.2 or 3.2.0 through 3.2.1 and is prone to a command injection vulnerability. A flaw is present in the application, which fails to properly handle an issue in Spark UI as it can enable ACLs via the configuration option spark.acls.enable. Successful exploitation could allows attackers to reach a permission check function that wi ...

Microsoft Excel Information Disclosure Vulnerability


Pages:      Start    1737    1738    1739    1740    1741    1742    1743    1744    1745    1746    1747    1748    1749    1750    ..   2683

© SecPod Technologies