[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 27003 Download | Alert*

The host is installed with Artifex Ghostscript before 10.02.0 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle the pcl/pl/plfont.c:418 in pl_glyph_name function. Successful exploitation allows attackers to cause a denial of service via transforming a crafted PCL file to PDF format.

The host is installed with Adobe Bridge through 12.0.4 or 13.x through 13.0.3 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause memory leak.

The host is installed with Adobe Bridge through 12.0.4 or 13.x through 13.0.3 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause memory leak.

The host is installed with Visual Studio code before 1.82.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified handle. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with PaperCut NG 20.0.0 before 20.1.9 or 21.0.0 before 21.2.13 or 22.0.0 before 22.1.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in application servers. Successful exploitation could allow an unauthenticated attacker with direct server IP access to upload arbitrary files into a target directo ...

The host is installed with VMware Workstation 17.x before 17.5 or or VMware Player 17.x before 17.5 and is prone to an information disclosure read vulnerability. A flaw is present in the application, which fails to properly handle issues in the functionality for sharing host Bluetooth devices. Successful exploitation could allow attackers with local administrative privileges on a virtual machine t ...

The host is installed with Adobe Photoshop 2022 through 23.5.5, or 2023 before 24.7.1 and is prone to an access of uninitialized pointer vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause arbitrary code execution.

The host is installed with Adobe Creative Cloud before 5.10 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Teamviewer 15.41 before 15.42.8 and is prone to an improper authorisation vulnerability. A flaw is present in the application, which fails to handle the local device settings. Successful exploitation allows an unprivileged user to change basic local device settings even though the options were locked.

The host is installed with Docker Desktop before 4.12.0 and is prone to an argument injection vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to gain local privilege.


Pages:      Start    1691    1692    1693    1694    1695    1696    1697    1698    1699    1700    1701    1702    1703    1704    ..   2700

© SecPod Technologies