[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26049 Download | Alert*

Visual Studio Code Elevation of Privilege Vulnerability. An attacker who successfully exploited this vulnerability could execute code in the context of another Visual Studio Code user on the vulnerable system.

The host is installed with Oracle MySQL Server through 5.7.40 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: PS. Successful exploitation allows attackers to affect Availability.

Mozilla Firefox ESR 102.10, Mozilla Thunderbird 102.10 : Unexpected data returned from the Safe Browsing API could have led to memory corruption and a potentially exploitable crash.

Mozilla Thunderbird 102.10 : Certain malformed OpenPGP messages could trigger incorrect parsing of PKESK/SKESK packets due to a bug in the Ribose RNP library used by Thunderbird up to version 102.9.1, which would cause the Thunderbird user interface to hang. The issue was discovered using Google's oss-fuzz.

Mozilla Thunderbird 102.10 : OCSP revocation status of recipient certificates was not checked when sending S/Mime encrypted email, and revoked certificates would be accepted. Thunderbird versions from 68 to 102.9.1 were affected by this bug.

The host is installed with Atlassian Confluence Server 6.1.0 before 7.13.20, 7.14.0 before 7.19.8, or 7.20.0 before 8.2.0 and is prone to a remote code execution vulnerability. A flaw is present in the application which fails to properly handle issue in unspecified vectors. Successful exploitation allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, ...

The host is installed with Artifex Ghostscript prior to 10.01.2 and is prone to an arbitrary command execution vulnerability. A flaw is present in the application, which fails to properly validate permission for pipe devices (with the %pipe% prefix or the | pipe character prefix). Successful exploitation allows attackers to make the rogue documents not only to create pages of text and graphics, b ...

The host is installed with Google Chrome before 106.0.5249.61 and is prone to an insufficient data validation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 106.0.5249.61 and is prone to an insufficient data validation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 90.0.4430.72 and is prone to an insufficient validation of untrusted input vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    1086    1087    1088    1089    1090    1091    1092    1093    1094    1095    1096    1097    1098    1099    ..   2604

© SecPod Technologies