[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195419 Download | Alert*

The host is installed with Zoom Client before 5.15.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation may allow an authenticated user to conduct a denial of service via network access.

The host is installed with Zoom Client before 5.15.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation may allow an authenticated user to conduct a denial of service via network access.

The host is installed with PaperCut NG 20.0.0 before 20.1.9 or 21.0.0 before 21.2.13 or 22.0.0 before 22.1.3 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle issues in application servers. Successful exploitation could allow path traversal, enabling attackers to upload, read, or delete arbitrary files.

The host is installed with Artifex Ghostscript before 10.02.0 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle the pcl/pl/plfont.c:418 in pl_glyph_name function. Successful exploitation allows attackers to cause a denial of service via transforming a crafted PCL file to PDF format.

The host is installed with Adobe Bridge through 12.0.4 or 13.x through 13.0.3 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause memory leak.

The host is missing a critical security update according to Adobe advisory, APSB23-09. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause arbitrary code execution or memory leak.

The host is installed with Adobe Bridge through 12.0.4 or 13.x through 13.0.3 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause memory leak.

dotnet6: dotNET CLI tools and runtime - dotnet7: dotNET CLI tools and runtime Details: USN-6278-1 fixed several vulnerabilities in .NET. This update provides the corresponding updates for Linux Mint 21.x LTS. Original advisory Several security issues were fixed in .NET.

.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.121 and .NET Runtime 6.0.21. Security Fix: * dotnet: RCE under dotnet commands * dotnet: Kestrel vulnerability to slow read attacks lea ...

.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.110 and .NET Runtime 7.0.10. Security Fix: * dotnet: RCE under dotnet commands * dotnet: Kestrel vulnerability to slow read attacks lea ...


Pages:      Start    10451    10452    10453    10454    10455    10456    10457    10458    10459    10460    10461    10462    10463    10464    ..   19541

© SecPod Technologies