[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255227

 
 

909

 
 

198741

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26813 Download | Alert*

Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability. To exploit this vulnerability, an attacker would need to send a specially crafted malicious MSMQ packet to a MSMQ server. This could result in remote code execution on the server side.

The host is installed with Apache Tomcat 11.0.0-M1 through 11.0.0-M16, 10.1.0-M1 through 10.1.18, 9.0.0-M1 through 9.0.85, or 8.5.0 through 8.5.98 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle cleanup. Successful exploitation allows WebSocket clients to keep WebSocket connections open leading to increased resource consumptio ...

The host is installed with Apache Tomcat 11.0.0-M1 through 11.0.0-M16, 10.1.0-M1 through 10.1.18, 9.0.0-M1 through 9.0.85, or 8.5.0 through 8.5.98 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle input validation for HTTP/2 requests. Successful exploitation could lead to denial of service.

The host is installed with PHP 8.1.x before 8.1.28, 8.2.x before 8.2.18, or 8.3.x before 8.3.5 and is prone to an improper encoding or escaping of output vulnerability. A flaw is present in the application, which fails to handle issues in proc_open. Successful exploitation allows an attacker to cause arbitrary code execution.

The host is installed with Zoom Client before 5.17.11 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an authenticated user to conduct a denial of service via network access.

The host is installed with Zoom Client before 5.17.11 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an authenticated user to conduct a denial of service via network access.

The host is installed with Zoom Client before 5.17.11 and is prone to a divide by zero vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an authenticated user to conduct a denial of service via network access.

Mozilla Firefox 127 : Memory safety bugs present in Firefox 126. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

Mozilla Firefox 127 : In violation of spec, cookie prefixes such as __Secure were being ignored if they were not correctly capitalized - by spec they should be checked with a case-insensitive comparison. This could have resulted in the browser not correctly honoring the behaviors specified by the prefix.

Mozilla Firefox 127 : By manipulating the fullscreen feature while opening a data-list, an attacker could have overlaid a text box over the address bar. This could have led to user confusion and possible spoofing attacks.


Pages:      Start    13    14    15    16    17    18    19    20    21    22    23    24    25    26    ..   2681

© SecPod Technologies