[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 9256 Download | Alert*

The host is installed with JetBrains IntelliJ IDEA before 2019.2 and is prone to a local user privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to cause arbitrary code execution.

The host is installed with JetBrains IntelliJ IDEA before 2019.2 and is prone to an MITM attack vulnerability. A flaw is present in the application, which fails to properly handle a cleartext http connection. Successful exploitation could allow attackers to cause an MITM attack.

The host is installed with JetBrains IntelliJ IDEA 2018.1.x and before 2018.1.8, 2018.2.x before 2018.2.8, 2018.3.x before 2018.3.4, or 2018.3.5 before 2018.3.7 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle the run configuration of certain application servers. Successful exploitation could allow attackers to cause remote ...

It was discovered that PDNS Recursor, a resolving name server, was susceptible to denial of service if recursive forwarding is configured.

Charles Fol discovered that the iconv function in the GNU C library is prone to a buffer overflow vulnerability when converting strings to the ISO-2022-CN-EXT character set, which may lead to denial of service or the execution of arbitrary code.

Several vulnerabilities have been discovered in the OpenJDK Java runtime, which may result in denial of service or information disclosure.

Several vulnerabilities have been discovered in the OpenJDK Java runtime, which may result in denial of service or information disclosure.

Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code.

It was discovered that insufficient restriction of unix daemon sockets in the GNU Guix functional package manager could result in sandbox bypass.


Pages:      Start    247    248    249    250    251    252    253    254    255    256    257    258    259    260    ..   925

© SecPod Technologies