[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15145 Download | Alert*

This CVE is missing description

In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor ...

A buffer overflow vulnerability in LibRaw version

In ImageMagick 7.0.9, an out-of-bounds read vulnerability exists within the ReadHEICImageByID function in coders\heic.c. It can be triggered via an image with a width or height value that exceeds the actual size of the image.

vm/opcodes.c in JerryScript 2.2.0 allows attackers to hijack the flow of control by controlling a register.

jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] . Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.

The host is installed with Adobe Flash Player 11.x through 11.1.102.55 or before 10.3.183.15 versions and is prone to type confusion memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Flash Player 11.x through 11.1.102.55 or before 10.3.183.15 versions and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted MP4 data. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Flash Player 11.x through 11.1.102.55 or before 10.3.183.15 versions and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Flash Player 11.x through 11.1.102.55 or before 10.3.183.15 versions and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly validate user inputs. Successful exploitation allows attackers to execute arbitrary code.


Pages:      Start    1078    1079    1080    1081    1082    1083    1084    1085    1086    1087    1088    1089    1090    1091    ..   1514

© SecPod Technologies