[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

124222

 
 

909

 
 

106938

 
 

150

 
 
Paid content will be excluded from the download.

Filter
Matches : 13304 Download | Alert*

The host is installed with Apache HTTP Server 2.4.17 through 2.4.34 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle maximum-size SETTINGS frames for an ongoing HTTP/2 connection. Successful exploitation could allow remote attackers to denial of service (DoS) condition on a targeted system.

The host is installed with Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 or 7.0.23 to 7.0.90 and is prone to an open redirection vulnerability. A flaw is present in the application which fails to handle the issue in default servlet which returned a redirect to a directory. Successful exploitation allows attackers to pass a specially crafted URL to cause the redirect to be generated to ...

The host is installed with OpenSSL 1.1.0 through 1.1.0i, 1.0.2 through 1.0.2p or 1.1.1 and is prone to a timing side channel attack vulnerability. A flaw is present in the DSA algorithm. On successful exploitation, an attacker could use variations in the signing algorithm to recover the private key.

The host is installed with Apache Tomcat 8.5.x before 8.5.16 or 9.x before 9.0.0.M22 and is prone to a bypass directory traversal vulnerability. A flaw is present in the application which fails to handle a specially crafted URL. Successful exploitation allows attackers to bypass security constraints using a specially crafted URL.

The host is installed with oracle webLogic server 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle specially crafted binary payloads. Successful exploitation allows an attacker to execute arbitrary code in the context of the logger application.

The host is installed with oracle fusion middleware mapViewer 12.2.1.2 or 12.2.1.3 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle the install (Apache Log4j) component issue. Successful exploitation allows an attacker to execute arbitrary code in the context of the affected application.

The host is installed with OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, or 1.0.2 before 1.0.2d and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted ServerKeyExchange message. Successful exploitation allows remote attackers to crash the service.

The host is installed with Oracle MySQL 5.5.x through 5.5.43 or MySQL 5.6.x through 5.6.24 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to GIS. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with Putty before 0.71 and is prone to an application hijack vulnerability. A flaw is present in the application, which fails to properly handle a malicious help file. Successful exploitation could allow attackers to hijack the application.

Mozilla Firefox 66, Mozilla Firefox ESR 60.6 : A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1330

© SecPod Technologies