[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8692 Download | Alert*

The host is missing a security update according to the Apple advisory and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple issues. Successful exploitation allows attackers to gain root privilege or gain access to sensitive information.

The host is installed with Visual Studio and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause unspecified impact.

git: fast, scalable, distributed revision control system Several security issues were fixed in Git.

The host is installed with Visual Studio 2017 or 2019 or 2022 or Git before 2.30.8, 2.31.x before 2.31.7, 2.32.x before 2.32.6, 2.33.x before 2.33.7, 2.34.x before 2.34.7, 2.35.x before 2.35.7, 2.36.x before 2.36.5, 2.37.x before 2.37.6, 2.38.x before 2.38.4 or 2.39.x before 2.39.2 and is prone to an improper link resolution before file access vulnerability. A flaw is present in the application, w ...

The host is installed with Visual Studio 2017 or 2019 or 2022 or Git before 2.30.8, 2.31.x before 2.31.7, 2.32.x before 2.32.6, 2.33.x before 2.33.7, 2.34.x before 2.34.7, 2.35.x before 2.35.7, 2.36.x before 2.36.5, 2.37.x before 2.37.6, 2.38.x before 2.38.4 or 2.39.x before 2.39.2 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to handle a special ...

A vulnerability was found in Git. Using a specially-crafted repository, Git can be tricked into using its local clone optimization even when using a non-local transport. Though Git will abort local clones whose source $GIT_DIR/objects directory contains symbolic links (CVE-2022-39253), the objects directory may still be a symbolic link.

A vulnerability was found in Git. This security issue occurs when feeding a crafted input to "git apply." A path outside the working tree can be overwritten by the user running "git apply."

The host is installed with GitLab CE/EE 14.1 before 15.6.8, 15.7 before 15.7.7 or 15.8 before 15.8.2 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted input to git apply. Successful exploitation allows attackers to execute arbitrary commands in GitLab installations within GitLab's Gitaly environment.

The host is installed with GitLab CE/EE 14.1 before 15.6.8, 15.7 before 15.7.7 or 15.8 before 15.8.2 and is prone to an improper link resolution before file access vulnerability. A flaw is present in the application, which fails to properly handle a specially-crafted repository. Successful exploitation allows attackers to to trick Git to use its local clone optimization even when using a non-local ...

The host is installed with GitLab CE/EE 14.1 before 15.6.8, 15.7 before 15.7.7 or 15.8 before 15.8.2 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted input to git apply. Successful exploitation allows attackers to execute arbitrary commands in GitLab installations within GitLab's Gitaly environment.


Pages:      Start    460    461    462    463    464    465    466    467    468    469    470    471    472    473    ..   869

© SecPod Technologies