[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8683 Download | Alert*

.NET Framework Information Disclosure Vulnerability.

The host is missing a security update 5032337

Updates available for Google Chrome.

Updates available for Google Chrome.

Updates available for Google Chrome.

The host is installed with LibreOffice 7.4.7.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in the crafted .ppt file. Successful exploitation allows a remote attacker to cause a denial of service.

The host is installed with Foxit PDF Reader through 2023.3.0.23028, or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.8.53842, 12.x through 12.1.4.15400, 13.x through 13.0.1.21693, 2023.x 2023.3.0.23028 and is prone to a local privilege escalation vulnerability. A flaw is present in the applications which fails to properly handle an issue in the permissions on the folder in which the up ...

The host is installed with Foxit PDF Reader through 2023.3.0.23028 or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.8.53842, 12.x through 12.1.4.15400, 13.x through 13.0.1.21693, 2023.x 2023.3.0.23028 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation could allow at ...

The host is installed with Jenkins rolling release 2.335 through 2.355 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to handle an unauthorized view fragment access issue. Successful exploitation could allow attackers to bypass a protection mechanism, thereby directly accessing some view fragments containing sensitive information.

The host is installed with Jenkins LTS through 2.332.3 or Jenkins rolling release through 2.355 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle an observable timing discrepancy on the login form issue. Successful exploitation could allow attackers to distinguish between login attempts with an invalid username, and login attempts wit ...


Pages:      Start    219    220    221    222    223    224    225    226    227    228    229    230    231    232    ..   868

© SecPod Technologies