[Forgot Password]
Login  Register Subscribe

25354

 
 

132811

 
 

146396

 
 

909

 
 

117043

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 17159 Download | Alert*

The host is installed with Apache Tomcat 10.x before 10.0.0-M5, 9.x before 9.0.35, 7.x before 7.0.104 or 8.5.x before 8.5.55 and is prone to a remote code execution vulnerability. A flaw is present in application, which fails to properly handle issues in PersistenceManager. Successful exploitation allows remote attackers to execute code.

The host is installed with Oracle MySQL Server through 5.6.47, 5.7.28 or 8.0.18 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to InnoDB. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 5.6.47, 5.7.29 or 8.0.19 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Stored Procedure. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 5.7.29 or 8.0.19 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to InnoDB. Successful exploitation allows attackers to affect Integrity and Availability.

The host is installed with Apache Tomcat 9.x before 9.0.31, 7.x before 7.0.100 or 8.5.x before 8.5.51 and is prone to an AJP request injection vulnerability. A flaw is present in application, which fails to properly handle a regression introduced due to refactoring. Successful exploitation allows remote attackers to execute code.

The host is installed with LibreOffice 6.4.x before 6.4.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle remote graphic links loaded from docx documents were not in stealth mode by default. Successful exploitation could leak sensitive data.

The host is installed with LibreOffice 6.4.x before 6.4.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle Form Handler component. Successful exploitation could lead to privilege escalation.

An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.To exploit this vulnerabil ...

Mozilla Firefox 72 : After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored.

The host is installed with Fortinet FortiClient through 6.0.4 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle improper file parsing. Successful exploitation allows attacker to execute unauthorized code.


Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   1715

© SecPod Technologies