[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251951

 
 

909

 
 

196667

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26859 Download | Alert*

The host is installed with WSO2 API Manager version before 2.6.0 and is prone to a cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle a crafted filename to the file-upload feature of the event simulator component. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with WSO2 API Manager version 2.1.0 or 2.6.0 and is prone to a reflected cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle the carbon part of the product. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with WSO2 API Manager version 2.1.0 or 2.6.0 and is prone to a cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle the store part of the product. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with OpenVPN through 2.4.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in control channel. Successful exploitation could allow remote attackers to cause a denial of service via crafted reset packet.

The host is installed with Cacti 1.2.21 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle a crafted POST request to graphs_new.php. Successful exploitation allows an attacker to improperly neutralize the input during web page generation.

The host is installed with Apache Couchdb versions equals 3.0.0 and is prone to a missing authentication for critical function vulnerability. A flaw is present in the applications which fails to properly handle the off-by-default setting. Successful exploitation allow remote attackers to cause unspecified impact.

The host is installed with Telegram Desktop through 2.0.1 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle punycode in a public url. Successful exploitation allows attackers to cause an IDN Homograph attack.

The host is installed with Irfanview 4.57 and is prone to a buffer overflow vulnerability. A flaw is present in the applications which fails to properly handle a crafted wpg file. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Irfanview 4.57 and is prone to a buffer overflow vulnerability. A flaw is present in the applications which fails to properly handle a crafted RLE file. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Irfanview 4.57 and is prone to a denial of service vulnerability. A flaw is present in the applications which fails to properly handle a crafted BMP file. Successful exploitation allows attackers to denial of service.


Pages:      Start    1716    1717    1718    1719    1720    1721    1722    1723    1724    1725    1726    1727    1728    1729    ..   2685

© SecPod Technologies