[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195521

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26506 Download | Alert*

The host is installed with Couchbase Server 4.0.0 before 7.0.4 and is prone to a Missing Authorization vulnerability. A flaw is present in the application, which fails to properly handle the network processes. Successful exploitation could allow process requests sent by unauthenticated users to modify indexed data.

The host is installed with Couchbase Server 4.0.0 before 7.0.4 and is prone to a http request vulnerability. A flaw is present in the application, which fails to properly handle the issuess in REST API call to the cluster manager. Successful exploitation could allow attackers to send random HTTP requests which leads to leaked metrics.

The host is installed with Comodo Antivirus 12.2.2.8012 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle an issue in the NTFS directory junction. Successful exploitation could allow attackers to restore a malicious DLL from quarantine into the System32 folder.

Microsoft Office Security Feature Bypass Vulnerability

The host is installed with Couchbase Server 7.1.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to perform a man in the middle attack or decrypting network communication.

The host is installed with Atlassian Bitbucket Server 7.0.0 before 7.6.17, 7.7.0 before 7.17.10, 7.18.0 before 7.21.4, 8.0.0 before 8.0.3, 8.1.0 before 8.1.3, and 8.2.0 before 8.2.2 or 8.3.0 before 8.3.1 and is prone to a command injection vulnerability. A flaw is present in the application, which fails to handle an issue in multiple API endpoints. Successful exploitation allows remote attackers w ...

The host is installed with RealVNC VNC Server before 6.11.0 or VNC Viewer before 6.22.826 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle MSI installer repair mode. Successful exploitation could allow attackers to gain local privilege.

The host is installed with Google Chrome before 106.0.5249.61 and is prone to an insufficient validation of untrusted vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 106.0.5249.61 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 107.0.5304.62 and is prone to an inappropriate implementation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    1688    1689    1690    1691    1692    1693    1694    1695    1696    1697    1698    1699    1700    1701    ..   2650

© SecPod Technologies