[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

111017

 
 

909

 
 

86402

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 13210 Download | Alert*

The host is installed with Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.58 or 8.x before 8.0.16 and is prone to a security bypass vulnerability. A flaw is present in the Expression Language (EL) implementation, which does not properly consider the possibility of an accessible interface implemented by an inaccessible class. Successful exploitation allows remote attackers to bypass a SecurityMana ...

The host is installed with Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55 or 8.x before 8.0.9 and is prone to a denial of service vulnerability. A flaw is present in application, which does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body. Successful exploitation allows remote attackers to cause a denial of service (memory consumpti ...

The host is installed with OpenSSH before 6.6 and is prone to a security bypass vulnerability. A flaw is present in sshd, which fails to properly support wildcards on AcceptEnv lines in sshd_config. Successful exploitation allows remote attackers to bypass intended environment restrictions.

The host is installed with Oracle Weblogic Server 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unauthenticated network access via HTTP. Successful exploitation allows an attacker to take over Oracle WebLogic Server.

An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on ...

The host is installed with oracle webLogic server 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle specially crafted binary payloads. Successful exploitation allows an attacker to execute arbitrary code in the context of the logger application.

The host is installed with OpenSSL version 1.0.2b to 1.0.2m or Oracle MySQL Server through 5.6.38 or through 5.7.20 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle exceptional conditions. Successful exploitation allows remote attackers to bypass security restrictions and perform unauthorized actions.

The host is installed with Oracle VM VirtualBox before 5.1.32 or 5.2.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core (OpenSSL). Successful exploitation allows attackers to affect Confidentiality.

The host is installed with Oracle MySQL Server through 5.6.36 or 5.7.18 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Memcached. Successful exploitation allows attackers to affect Integrity and Availability.

The host is installed with Oracle Java SE through 6u161, 7u151 or 8u144 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Util (zlib). Successful exploitation allows attackers to affect Integrity.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1320

© SecPod Technologies