[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26631 Download | Alert*

The host is installed with Artifex Ghostscript before 9.24 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle the .setdistillerkeys PostScript command. Successful exploitation could allow attackers to supply crafted postScript files to crash the interpreter or potentially execute code.

The host is installed with Oracle Java SE through 7u221, 8u212, 11.0.3 or 12.0.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to AWT (libpng). Successful exploitation allows attackers to affect integrity and availability.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 12.1.3.0, 12.2.1.3, 12.2.1.4 or 14.1.1.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Console (jQuery). Successful exploitation can cause unspecified impact.

The host is installed with OpenSSH through 8.3p1 and is prone to a command injection vulnerability. A flaw is present in the application, which fails to properly handle an issue in the scp.c toremote function. Successful exploitation could allow remote attackers to pass a backtick enabled payload as file name and when local scp command is executed, local shell will also execute backtick enabled pa ...

The host is installed with Flask-Caching extension for Flask through 1.10.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a cache storage system. Successful exploitation allow attackers to gain access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and e ...

The host is installed with Axiosys Bento4 through 1.6.0-639 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the applications which fails to properly handle an issue in some unknown functionality of the component mp42aac. Successful exploitation allows remote attackers to cause unspecified impact.

The host is installed with SaltStack Salt through 3003 and is prone to a buffer overflow vulnerability. A flaw exists exists within the application, which fails to properly handle the func variable in salt/salt/modules/status.py file. Successful exploitation allows attacker to execute arbitrary code.

The host is installed with Oracle Database Server 19c, or 21c and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle an issue in the Oracle Database Fleet Patching and Provisioning (jackson-databind). Successful exploitation allows attackers to cause a denial of service or other unspecified impact via a crafted object that uses cyclic dependencies ...

The host is installed with Python through 3.11.4, or Oracle Database Server 21c and is prone to a buffer overflow vulnerability. The flaw is present in the application, which fails to properly handle the legacy email.utils.parseaddr function. Successful exploitation allows attackers to trigger "RecursionError: maximum recursion depth exceeded while calling a Python object" via a crafted argument.

The host is installed with PostgreSQL 12.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the repeatedly sent SIGHUP signals. Successful exploitation allows attackers to cause denial of service.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   2663

© SecPod Technologies