[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 10937 Download | Alert*

The host is installed with freeradius2 or freeradius 2.x through 2.2.3 or 3.x through 3.0.1 and is prone to a stack-based buffer overflow vulnerability. The flaws are present in the applications, which fail to properly handle a long password hash, as demonstrated by an SSHA hash. Successful exploitation might allow attackers to cause a denial of service (crash).

The host is installed with hivex before 1.3.11 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a small hive files, which triggers an out-of-bounds read or write. Successful exploitation allows local users to execute arbitrary code and gain privileges.

The host is installed with Google Chrome before 19.0.1084.46 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly mitigate an unspecified flaw in an NVIDIA driver. Successful exploitation has unknown impact and attack vectors.

The host is installed with Google Chrome before 19.0.1084.46 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly mitigate an unspecified flaw in an NVIDIA driver. Successful exploitation has unknown impact and attack vectors.

The host is installed with Atlassian Jira Server before 8.5.14, 8.6.0 before 8.13.6 or 8.14.0 before 8.16.1 and is prone to a cross-site scripting vulnerability. A flaw is present in the application which fails to properly handle an issue in the EditWorkflowScheme.jspa component. Successful exploitation could allow attackers to inject arbitrary HTML or JavaScript.

The host is installed with Atlassian Jira Server before 7.13.16, 8.0.0 before 8.5.7, 8.6.0 before 8.9.2 or 8.10.0 before 8.10.1 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to properly handle an issue in the Administration Permission Helper. Successful exploitation could allow remote attackers to view titles of a private project via an I ...

The host is installed with Atlassian Jira Server before 8.7.0 and is prone to a cross site scripting vulnerability. A flaw is present in the application which fails to properly handle an issues in the tomcat. Successful exploitation could allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the Add Field module.

The host is installed with Atlassian Jira Server before before before 8.5.5 or 8.6.0 before 8.7.2 and is prone to a DLL hijacking vulnerability. A flaw is present in the application which fails to properly handle an issues in the tomcat. Successful exploitation could allow remote attackers to to execute arbitrary code via a DLL hijacking vulnerability in Tomcat.

The host is installed with Atlassian Jira Server before 7.13.17, 7.14.0 before 8.5.8 or 8.6.0 before 8.12.0 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to properly handle an issue in the /browse.PROJECTKEY endpoint. Successful exploitation could allow remote attackers to enumerate project keys.

The host is installed with Atlassian Jira Server before 8.5.8 or 8.6.0 before 8.11.1 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/QueryComponent!Default.jspa endpoint. Successful exploitation could allow unauthenticated attackers to view custom field names and custom SLA names.


Pages:      Start    648    649    650    651    652    653    654    655    656    657    658    659    660    661    ..   1093

© SecPod Technologies