The host is installed with Foxit PDF Reader through 12.1.3.15356 or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.7.53812, 12.x through 12.1.3.15356 or 2023.1.0.15510 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation could allow attackers to execute remote code or disclose i ...
The host is installed with Apple iTunes before 12.12.9 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle the logic issue. On successful exploitation, an app may be able to elevate privileges.
The host is installed with Apple iTunes before 12.12.9 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle the logic issue. On successful exploitation, an app may be able to elevate privileges.
The host is installed with Apple iTunes before 12.12.9 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle the logic issue. On successful exploitation, an app may be able to elevate privileges.
The host is installed with Apple iTunes before 12.12.9 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle the logic issue. On successful exploitation, an app may be able to elevate privileges.
The host is installed with Apple iTunes before 12.12.9 and is prone to a dynamic library loading vulnerability. A flaw is present in the applications, which fail to properly handle a path searching issue. On successful exploitation, an app may be able to gain elevated privileges.
The host is installed with Cacti 1.2.25 and is prone to an SQL injection vulnerability. A flaw is present in the application, which fails to properly handle the form_actions() function in the managers.php function. Successful exploitation allows a remote attacker to obtain sensitive information.
Improper initialization in the Intel(R) TXT SINIT ACM for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Out-of-bounds read in firmware for the Intel(R) Integrated Sensor Solution before versions 5.4.2.4579v3, 5.4.1.4479 and 5.0.0.4143 may allow a privileged user to potentially enable denial of service via local access.
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.