[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26031 Download | Alert*

The host is installed with cygwin before 4.1.13 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle crafted variables. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with cygwin before 4.1.13 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle crafted variables. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple iTunes before 12.12.4and is prone to an integer overflow vulnerability. A flaw is present in the applications, which fail to properly handle issues in input validation. On successful exploitation, a remote attacker may be able to cause unexpected application termination or arbitrary code execution.

The host is installed with Apple iTunes before 12.12.4and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle issues in input validation. On successful exploitation, processing a maliciously crafted image may lead to arbitrary code execution.

The host is installed with Apple iTunes before 12.12.4and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle issues in state management. On successful exploitation, a local attacker may be able to elevate their privileges.

The host is installed with Apple iTunes before 12.12.4and is prone to a logic vulnerability. A flaw is present in the applications, which fail to properly handle issues in state management. On successful exploitation, an application may be able to delete files for which it does not have permission.

The host is installed with OpenSSL 1.0.2 through 1.0.2zb or 1.1.1 through 1.1.1l or 3.0.0 and is prone to an information disclosure vulnerability. A flaw is present in the MIPS32 and MIPS64 squaring procedure, where there is a carry propagation bug. Successful exploitation could allow attackers to perform information disclosure.

The host is installed with OpenSSL 1.1.1 through 1.1.1p or 3.0.0 through 3.0.4 and is prone to an information disclosure vulnerability. A flaw is present in the AES OCB mode for 32-bit x86 which fails to properly encrypt the entirety of the data under some circumstances. On successful exploitation, it could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the ...

The host is installed with OpenSSL 3.0.0 before 3.0.3 and is prone to an improper certificate validation vulnerability. A flaw is present in the application which fails to handle an issue in the OCSP_basic_verify function. Successful exploitation could allow an attacker to trick the command line application report that the verification of an ocsp response with the "-no_cert_checks" option to be su ...

The host is installed with OpenSSL 3.0.0 before 3.0.3 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to handle an issue in the OPENSSL_LH_flush() function. Successful exploitation could allow an attacker to cause a long lived process when periodically decoding certificates or keys, its memory usage to expand without bounds and the process to be ...


Pages:      Start    1210    1211    1212    1213    1214    1215    1216    1217    1218    1219    1220    1221    1222    1223    ..   2603

© SecPod Technologies