[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26850 Download | Alert*

The host is installed with OpenSSH through 8.3p1 and is prone to a command injection vulnerability. A flaw is present in the application, which fails to properly handle an issue in the scp.c toremote function. Successful exploitation could allow remote attackers to pass a backtick enabled payload as file name and when local scp command is executed, local shell will also execute backtick enabled pa ...

The host is installed with Flask-Caching extension for Flask through 1.10.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a cache storage system. Successful exploitation allow attackers to gain access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and e ...

The host is installed with Axiosys Bento4 through 1.6.0-639 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the applications which fails to properly handle an issue in some unknown functionality of the component mp42aac. Successful exploitation allows remote attackers to cause unspecified impact.

The host is installed with SaltStack Salt through 3003 and is prone to a buffer overflow vulnerability. A flaw exists exists within the application, which fails to properly handle the func variable in salt/salt/modules/status.py file. Successful exploitation allows attacker to execute arbitrary code.

The host is installed with Oracle Database Server 19c, or 21c and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle an issue in the Oracle Database Fleet Patching and Provisioning (jackson-databind). Successful exploitation allows attackers to cause a denial of service or other unspecified impact via a crafted object that uses cyclic dependencies ...

The host is installed with Python through 3.11.4, or Oracle Database Server 21c and is prone to a buffer overflow vulnerability. The flaw is present in the application, which fails to properly handle the legacy email.utils.parseaddr function. Successful exploitation allows attackers to trigger "RecursionError: maximum recursion depth exceeded while calling a Python object" via a crafted argument.

The host is installed with PostgreSQL 12.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the repeatedly sent SIGHUP signals. Successful exploitation allows attackers to cause denial of service.

The host is installed with Notepad++ through 8.1 and is prone to an uncontrolled search path element vulnerability. A flaw is present in the application, which fails to properly handle an issue in the file dbghelp.exe. Successful exploitation could allow attackers to lead to an uncontrolled search path.

The host is installed with OpenSSH before 9.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in destination constraints. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Oracle MySQL Server through 8.2.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Optimizer. Successful exploitation allows attackers to affect Availability.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   2684

© SecPod Technologies