[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26507 Download | Alert*

The host is installed with SolarWinds Dameware Mini Remote Control 12.x before 12.0.3 and is prone to a stack-based buffer overflowvulnerability. A flaw is present in the application, which fails to properly validate the input size of an incoming string before passing it to wsprintfw. Successful exploitation could lead to SYSTEM level privilege on any system running the dwmrcs daemon.

The host is installed with Adobe ColdFusion 9.0, 9.0.1, or 9.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the JRun application server. Successful exploitation allows remote attackers to cause a denial of service via unknown vectors.

The host is installed with JetBrains IntelliJ IDEA before 2022.3.1 and is prone to a server-side template injection vulnerability. A flaw is present in the application, which fails to properly handle issues in code templates. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Adobe InCopy through 16.4 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to cause application denial-of-service.

The host is installed with Adobe InCopy through 16.4 and is prone to an access of memory location after end of buffer vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe InCopy through 16.3 and is prone to an access of memory location after end of buffer vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to perform arbitrary file system write.

The host is installed with Adobe InCopy through 16.3 and is prone to an access of memory location after end of buffer vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Node.js 10.x before 10.23.1, 12.x before 12.20.1, 14.x before 14.15.4 or 15.x before 15.5.1 and is prone to HTTP request smuggling. A flaw is present in the application which fails to handle HTTP requests. Successful exploitation could lead to HTTP request smuggling.

The host is installed with Apache Tomcat 10.1.0-M1 through 10.1.0-M14, 10.0.0.M1 through 10.0.20, 9.0.13 through 9.0.62 or 8.5.38 through 8.5.78 and is prone to a denial service of vulnerability. A flaw is present in application, which fails to handle an issue in EncryptInterceptor which incorrectly stated it enabled Tomcat clustering to run over an untrusted network. Successful exploitation could ...

The host is installed with Apache Tomcat 10.0.0-M5 through 10.0.14, 9.0.35 through 9.0.56 or 8.5.55 through 8.5.73 and is prone to an race condition vulnerability. A flaw is present in application, which fails to handle tomcat persist sessions while using the FileStore. Successful exploitation allows attackers to perform actions with the privileges of the local user.


Pages:      Start    1611    1612    1613    1614    1615    1616    1617    1618    1619    1620    1621    1622    1623    1624    ..   2650

© SecPod Technologies