[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 7345 Download | Alert*

The host is installed with IBM SPSS SamplePower 3.0 before 3.0-IM-S3SAMPC-WIN32-FP001 and is prone to a unspecified vulnerability. A flaw is present in the application, which fails to handle a crafted application. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with BitZipper 2013 before Update 1 and is prone to memory corruption vulnerability. A flaw is present in the application, whicb fails to handle a crafted ZIP archive. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is installed with WSO2 API Manager 2.6.0 and is prone to an SSRF attack vulnerability. A flaw is present in the application, which fails to properly handle an issue caused by the existence of the file:// wrapper. Successful exploitation could allow attackers to force the application to perform requests to workstation or enumerate files.

The host is installed with Bamboo CI server 2.4.0 before 2.5.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an issue in the SAML Single Sign On plugin. Successful exploitation could allow locally disabled users to reactivate their accounts just by browsing the affected instance.

The host is installed with AWStats and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to validate input. Successful exploitation could allow remote attackers to to have an unspecified impact via a crafted LoadPlugin directory.

The host is installed with Microsys Promotic before 8.1.5 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle a crafted application. Successful exploitation could allow attackers to read arbitrary file.

The host is installed with Apache Subversion 1.8.0 before 1.8.2 and is prone to a FSFS repository corruption vulnerability. A flaw is present in the application, which fails to proper edit revision properties. Successful exploitation could allow wrong file to get deleted.

The host is installed with Sybase EAServer 6.3.1 Developer Edition and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle a particular sequence in a path. Successful exploitation could allow attackers to traverse directories and read arbitrary files.

The host is installed with Serv-U FTP Server before 11.1.0.5 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to properly validate the given input. Successful exploitation allows remote attackers to disclose potentially sensitive information and manipulate certain data.

The host is installed with zFTPServer Suite 6.0.0.52 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle a a crafted RMD (aka rmdir) command. Successful exploitation could allow attackers to to delete arbitrary directories.


Pages:      Start    679    680    681    682    683    684    685    686    687    688    689    690    691    692    ..   734

© SecPod Technologies