Libre office affected with Unauthorized access vulnerability
LibreOffice was found to be prone to remote code execution vulnerability and also was affected with unauthorised access vulnerability. An attacker can take advantage of…
LibreOffice was found to be prone to remote code execution vulnerability and also was affected with unauthorised access vulnerability. An attacker can take advantage of…
Qualcomm Components was found to be prone to integer -underflow vulnerability. They were failing in validating an integer value. An attacker can exploit this vulnerability…
Jenkins Credential binding plugin was found to be prone information -disclosure vulnerability. An attacker can take advantage of this vulnerability and thereby gain access to…
GNU Binutils 'libiberty' was found to be prone to an integer overflow vulnerability as it fails to properly bound check the user supplied data before…
Exim was found to be prone to a privilege escalation vulnerability. An attacker can make use of this vulnerability to execute programs with root privilege.…
FFmpeg was found to be prone to Security Bypass Vulnerability. An attacker can take advantage of this issue to bypass security restrictions and also to…