[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252097

 
 

909

 
 

196747

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26661 Download | Alert*

The host is installed with Oracle MySQL through 5.5.46, through 5.6.27 or 5.7.9 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails unknown vectors related to Optimizer. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with Oracle MySQL through 5.5.46 or through 5.6.27 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails vectors related to DML. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with Oracle MySQL through 5.5.46 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails unknown vectors related to Optimizer. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with SaltStack Salt before 2019.2.4 or 3000.x before 3000.2 and is prone to an authentication vulnerability. A flaw exists exists within the application, which fails to properly handle an issue in the ClearFuncs class. Successful exploitation could allow remote attackers to gain root-equivalent access to the salt master and trigger minions to run arbitrary commands.

The host is installed with SaltStack Salt before 2019.2.4 or 3000.x before 3000.2 and is prone to a directory traversal vulnerability. A flaw exists exists within the application, which fails to properly handle an issue in the wheel module. Successful exploitation could allow remote attackers to read files outside of the intended directory.

The host is installed with SaltStack Salt before 2019.2.7 or 3000.x before 3000.4 and is prone to an authentication bypass vulnerability. A flaw exists exists within the application, which fails to properly handle improper validation of eauth credentials and tokens. Successful exploitation would allow a user to bypass authentication and make calls to Salt SSH.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0, 12.1.3.0, or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Console (Apache Log4j). Successful exploitation can cause unspecified impact.

The host is installed with oracle webLogic server 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle specially crafted binary payloads. Successful exploitation allows an attacker to execute arbitrary code in the context of the logger application.

The host is installed with oracle fusion middleware mapViewer 12.2.1.2 or 12.2.1.3 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle the install (Apache Log4j) component issue. Successful exploitation allows an attacker to execute arbitrary code in the context of the affected application.

Microsoft SharePoint Server Remote Code Execution Vulnerability


Pages:      Start    1103    1104    1105    1106    1107    1108    1109    1110    1111    1112    1113    1114    1115    1116    ..   2666

© SecPod Technologies