Page 193 of 54191 results (0.068 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

17 Sep 2024 — This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. ... An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. An attacker can leverage this in conjunction with other vulnerabilities to execut... • https://www.zerodayinitiative.com/advisories/ZDI-24-1259 • CWE-125: Out-of-bounds Read •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

17 Sep 2024 — This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. ... An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. An attacker can leverage this in conjunction with other vulnerabilities to execut... • https://www.zerodayinitiative.com/advisories/ZDI-24-1269 • CWE-125: Out-of-bounds Read •

CVSS: 8.4EPSS: 0%CPEs: 2EXPL: 0

17 Sep 2024 — Please note: an attacker must first obtain the ability to execute high-privileged code (admin user rights) on the target system in order to exploit this vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Trend Micro Deep Discovery Inspector. • https://success.trendmicro.com/en-US/solution/KA-0017793 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

17 Sep 2024 — PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. ... An attacker can leverage this vulnerability to execute code in the context of the current... • https://www.zerodayinitiative.com/advisories/ZDI-24-1249 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

17 Sep 2024 — PDF-XChange Editor U3D File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. ... An attacker can leverage this vulnerability to execute code in the context of the curren... • https://www.zerodayinitiative.com/advisories/ZDI-24-1236 • CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

17 Sep 2024 — This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. ... An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. An attacker can leverage this in conjunction with other vulnerabilities to execut... • https://www.zerodayinitiative.com/advisories/ZDI-24-1262 • CWE-125: Out-of-bounds Read •

CVSS: 10.0EPSS: 0%CPEs: -EXPL: 0

17 Sep 2024 — Cohesive Networks VNS3 Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cohesive Networks VNS3. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cohesive Networks VNS3. ... An attacker can leverage this vulnerability to execute code in the context of root. An attacker... • https://cohesive.net/support/security-responses • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

16 Sep 2024 — This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. ... An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current user. macOS Sequoia 15 addresses buffer overflow, bypass, cross site scripting, integer overflow, out of bounds access, out of bounds read, out of bounds write, and spoofing vulnerabilities. • https://support.apple.com/en-us/121238 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

16 Sep 2024 — This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. ... An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current user. macOS Sequoia 15 addresses buffer overflow, bypass, cross site scripting, integer overflow, out of bounds access, out of bounds read, out of bounds write, and spoofing vulnerabilities. • https://support.apple.com/en-us/121238 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

16 Sep 2024 — This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. ... An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current user. macOS Sequoia 15 addresses buffer overflow, bypass, cross site scripting, integer overflow, out of bounds access, out of bounds read, out of bounds write, and spoofing vulnerabilities. • https://support.apple.com/en-us/121238 •