[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251625

 
 

909

 
 

196370

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195632 Download | Alert*

The host is installed with vm2 before 3.9.15 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle issue in the sandbox protections. Successful exploitation could allow attackers to bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.

The host is installed with Docker Desktop 4.17.x and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the Artifactory Integration falling back to sending registry credentials over plain HTTP instead of HTTPS. Successful exploitation could allow attackers to perform a targeted network sniffing attack which can lead to a disclosure of s ...

The host is installed with Docker Desktop 4.17.x and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the Artifactory Integration falling back to sending registry credentials over plain HTTP instead of HTTPS. Successful exploitation could allow attackers to perform a targeted network sniffing attack which can lead to a disclosure of s ...

The host is installed with 3CX DesktopApp 18.11.1213, 18.12.402, 18.12.407, or 18.12.416 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an embedded malicious code. Successful exploitation could allow attackers to run a complex supply chain attack and pick who would be downloading the next stages of the malware.

The host is installed with 3CX DesktopApp 18.12.407 or 18.12.416 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an embedded malicious code. Successful exploitation could allow attackers to run a complex supply chain attack and pick who would be downloading the next stages of the malware.

The host is installed with JetBrains IntelliJ IDEA before 2022.3 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to perform a DYLIB injection on macOS.

The host is installed with JetBrains IntelliJ IDEA before 2022.2.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle the fsnotifier daemon on macOS. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Oracle VM VirtualBox before 5.1.30 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core (OpenSSL). Successful exploitation allows attackers to affect Confidentiality.

The host is installed with Oracle VM VirtualBox before 5.1.30 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality, Integrity and Availability.

The host is installed with Oracle VM VirtualBox before 5.1.30 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality, Integrity and Availability.


Pages:      Start    8031    8032    8033    8034    8035    8036    8037    8038    8039    8040    8041    8042    8043    8044    ..   19563

© SecPod Technologies