[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 27003 Download | Alert*

The host is installed with Adobe Premiere Pro before 15.4.3 or 22.0 before 22.1.1 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to gain privileges.

The host is installed with Adobe Premiere Pro before 15.4.3 or 22.0 before 22.1.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to gain privileges.

The host is installed with Adobe Premiere Pro before 15.4.3 or 22.0 before 22.1.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to gain privileges.

The host is installed with Adobe Premiere Pro before 15.4.3 or 22.0 before 22.1.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to gain privileges.

The host is installed with Apple iTunes before 12.10.1 or Apple iCloud before 7.14 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to properly handle buffer overflow. Successful exploitation could allow attackers to execute arbitrary code through a maliciously crafted text file.

The host is installed with OpenSSL 3.0.0 through 3.0.7 and is prone to a denial of service vulnerability. A flaw is present in application which fails to handle issues in policy constraint in X.509 certificate. Successful exploitation could allow an attacker to cause denial of service.

The host is installed with Docker Desktop 4.13.0 before 4.23.0, and is prone to an improper protection of alternate path vulnerability. A flaw is present in the application, which fails to properly handle the debug shell which remains accessible for a short time window after launching docker desktop.. Successful exploitation allows an unprivileged user to bypass enhanced container isolation (eci) ...

The host is installed with Docker Desktop Docker Docker_desktop versions less than 4.23.0 and is prone to an access token theft vulnerability. A flaw is present in the application, which fails to properly handle crafted extension icon URL. Successful exploitation could allow an attacker to cause unspecified impact.

The host is installed with Visual Studio code before 1.81.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle Electron software which is consumed by Visual Studio Code. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with PaperCut NG 20.0.0 before 20.1.9 or 21.0.0 before 21.2.13 or 22.0.0 before 22.1.3 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle issues in application servers. Successful exploitation could allow path traversal, enabling attackers to upload, read, or delete arbitrary files.


Pages:      Start    1690    1691    1692    1693    1694    1695    1696    1697    1698    1699    1700    1701    1702    1703    ..   2700

© SecPod Technologies