[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15249 Download | Alert*

The function Object::isName in Object.h in Xpdf 4.00 allows remote attackers to cause a denial of service via a crafted pdf file, as demonstrated by pdftoppm.

CCITTFaxStream::readRow in Stream.cc in Xpdf 4.00 allows remote attackers to cause a denial of service via a crafted pdf file, as demonstrated by pdftoppm.

The host is installed with Google Chrome before 100.0.4896.88 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 100.0.4896.88 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with vm2 before 3.9.17 and is prone to a sandbox escape vulnerability. A flaw is present in the application, which fails to properly handle issues in exception sanitization. Successful exploitation could allow attackers to raise an unsanitized host exception inside 'handleException()' which can be used to escape the sandbox and run arbitrary code in host context.

The host is installed with vm2 before 3.9.16 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle issues in source code transformer. Successful exploitation could allow attackers to bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.

The host is installed with vm2 before 3.9.15 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle issue in the sandbox protections. Successful exploitation could allow attackers to bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.

The host is installed with Wazuh Agent through 4.1.5 and is prone to an integer underflow vulnerability. A flaw is present in the application, which fails to handle a crafted message sent from an authenticated agent to the Wazuh manager. Successful exploitation could allow attackers to cause denial of service.

The host is installed with Wazuh Agent through 4.1.5 and is prone to an integer underflow vulnerability. A flaw is present in the application, which fails to handle a crafted message sent from an authenticated agent to the Wazuh manager. Successful exploitation could allow attackers to cause denial of service.

The host is installed with Oracle Java SE through 8u301, 11.0.12 or 17 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Libraries. Successful exploitation allows attackers to affect Confidentiality.


Pages:      Start    671    672    673    674    675    676    677    678    679    680    681    682    683    684    ..   1524

© SecPod Technologies