[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194074 Download | Alert*

The host is installed with GIMP 2.8.22 and is prone to a heap-based buffer over-read vulnerability. A flaw is present in the application, which fails to properly handle an issue in read_creator_block. Successful exploitation could allow attackers to read sensitive information from other memory locations or cause a crash.

The host is installed with GIMP 2.8.22 and is prone to a stack-based buffer over-read vulnerability. A flaw is present in the application, which fails to properly handle an issue in xcf_load_stream. Successful exploitation could allow attackers to read sensitive information from other memory locations or cause a crash.

The host is installed with GIMP 2.8.22 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in read_channel_data in plug-ins/common/file-psp.c file. Successful exploitation could allow attackers to execute arbitrary code, alter the intended control flow, read sensitive information, or cause the system to crash.

The host is installed with GIMP through 2.10.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue in the way GIMP makes g_get_tmp_dir calls to establish temporary filenames. Successful exploitation could allow attackers to overwrite files or read file content that was intended to be private.

GIMP through 2.10.2 makes g_get_tmp_dir calls to establish temporary filenames, which may result in a filename that already exists, as demonstrated by the gimp_write_and_read_file function in app/tests/test-xcf.c. This might be leveraged by attackers to overwrite files or read file content that was intended to be private.

The host is installed with Apache CouchDB before 1.7.0 or 2.x before 2.1.1 and is prone to a remote privilege escalation vulnerability. A flaw is present in the application, which fails to handle differences issue in Erlang-based JSON parser and JavaScript-based JSON parser. Successful exploitation could allow attackers to bypass certain restrictions and gain elevated privileges.

The host is installed with Apache CouchDB before 1.7.0 or 2.x before 2.1.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle an issue in configuration options that include paths for operating system-level binaries. Successful exploitation could allow attackers to execute arbitrary shell commands as the CouchDB user, including downloa ...

The host is installed with Apache CouchDB before 1.7.2 or 2.x before 2.1.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the validation issue in administrator-supplied configuration settings. Successful exploitation could allow attackers to escalate their privileges to that of the operating system's user under which CouchDB runs, ...

The host is installed with Apache CouchDB 1.x before 2.2.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the validation issue in administrator-supplied configuration settings. Successful exploitation could allow attackers to escalate their privileges to that of the operating system's user under which CouchDB runs, by bypassing the ...

Apache CouchDB is a distributed, fault-tolerant and schema-free document-oriented database accessible via a RESTful HTTP/JSON API. Among other features, it provides robust, incremental replication with bi-directional conflict detection and resolution, and is queryable and indexable using a table-oriented view engine with JavaScript acting as the default view definition language.


Pages:      Start    7847    7848    7849    7850    7851    7852    7853    7854    7855    7856    7857    7858    7859    7860    ..   19407

© SecPod Technologies