[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252416

 
 

909

 
 

196839

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26350 Download | Alert*

The host is installed with Trellix Agent through 5.7.8 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an issue in unspecified vectors. Successful exploitation could allows a local users, during install/upgrade workflow, to replace one of the Agent's executables before it can be executed.

The host is installed with Adobe Media Encoder before 15.4.3 or 22.0 before 22.1.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause arbitrary code execution.

The host is installed with Cacti 1.2.6 and is prone to an insecure direct object reference vulnerability. A flaw is present in the application, which fails to properly handle a modified local_graph_id parameter. Successful exploitation allows an attacker to access sensitive information or perform unauthorized actions by manipulating object references.

The host is installed with Adobe ColdFusion 2018 before update 12 or 2021 before update 2 and is prone to a use of inherently dangerous function vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could allow attackers to bypass the security feature.

The host is installed with Artifex Ghostscript through 10.01.2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to have unspecified impact.

The host is installed with Google Chrome before 54.0.2840.99 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 16.0.912.75 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle vectors involving animation frames. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 16.0.912.75 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle vectors related to glyph handling. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 54.0.2840.59 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 54.0.2840.59 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    1609    1610    1611    1612    1613    1614    1615    1616    1617    1618    1619    1620    1621    1622    ..   2634

© SecPod Technologies