[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253390

 
 

909

 
 

197257

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26687 Download | Alert*

The host is installed with Apache Struts 2.0.x before 2.5.33, or 6.0.x before 6.3.0.2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle issue in the file upload params. Successful exploitation could allow attackers to manipulate file upload params to enable path traversal and under some circumstances this can lead to uploadi ...

ASP.NET Core - Security Feature Bypass Vulnerability. An unauthenticated attacker could bypass validations on Blazor Server forms. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then trigger an event that could exploit the vulnerability to save an invalid state to a database or trigger other unintended actions, depending on what functionality ...

The host is installed with Artifex Ghostscript 9.50 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted PDF file. Successful exploitation could allow remote attackers to cause a denial of service.

The host is installed with Python before 3.6.13, 3.7.x before 3.7.10, 3.8.x before 3.8.7, or 3.9.x before 3.9.1 and is prone to a timing attack vulnerability. A flaw is present in the application, which fails to properly handle an issue in compare_digest in Lib/hmac.py. Successful exploitation allows attackers to lead to constant-time-defeating optimisations in the accumulator variable in hmac.com ...

The host is installed with Python before 3.6.13, 3.7.x before 3.7.10, 3.8.x before 3.8.7, or 3.9.x before 3.9.1 and is prone to an XML external entity (XXE) vulnerability. A flaw is present in the application, which fails to properly handle the plistlib module when entity declarations are made. Successful exploitation allows attackers to cause XML vulnerabilities.

The host is installed with SaltStack Salt before 3005.2 or 3006.0 before 3006.2 and is prone to a denial of service vulnerability. A flaw exists exists within the application, which fails to properly handle the minion return. On successful exploitation, after receiving several bad packets on the request server equal to the number of worker threads, the master will become unresponsive to return req ...

The host is installed with SaltStack Salt before 3005.2 or 3006.0 before 3006.2 and is prone to an information disclosure vulnerability. A flaw exists exists within the application, which fails to properly handle unspecified vectors. Successful exploitation can lead to wrongful data disclosure, wrongful executions, data corruption and/or crash.

The host is installed with Oracle VM VirtualBox 7.x before 7.0.12 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect confidentiality, integrity and availability.

The host is installed with Oracle VM VirtualBox 7.x before 7.0.12 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect confidentiality, integrity and availability.

The host is installed with Oracle VM VirtualBox 7.x before 7.0.12 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect confidentiality and availability.


Pages:      Start    1098    1099    1100    1101    1102    1103    1104    1105    1106    1107    1108    1109    1110    1111    ..   2668

© SecPod Technologies