The host is installed with PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9 or 8.4.x before 8.4.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a table with crafted index functions by functions that modify (1) search_path or (2) a prepared statement. Success ...
The host is installed with PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9 or 8.4.x before 8.4.2 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate. Successful exploitation all ...
The host is installed with PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11 or 8.4 before 8.4.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle (1) ALTER USER or (2) ALTER DATABASE statement. Successful exploitation allows remote authenticated users to remove arbitrary ...
The host is installed with PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11 or 8.4 before 8.4.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle pltcl_modules table. Successful exploitation allows remote authenticated users, with database-creation privileges, to execute ...
The host is installed with PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11 or 8.4 before 8.4.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a crafted script, related to the Safe module (aka Safe.pm) for Perl. Successful exploitation allows remote authenticated user ...
The host is installed with Adobe Illustrator CS4 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle memory. Successful exploitation allows attackers to execute arbitrary code.
The host is installed with Adobe Illustrator CS4 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle memory. Successful exploitation allows attackers to execute arbitrary code.
The host is installed with Adobe Illustrator CC 2019 before 24.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to execute arbitrary code.
The host is installed with Adobe Illustrator CC 2019 before 24.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to execute arbitrary code.
The host is installed with Adobe Illustrator CC 2019 before 24.0 and is prone to an insecure library loading (DLL hijacking) vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to perform privilege escalation.