[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26530 Download | Alert*

The host is installed with Apache Jena through 4.1.0 and is prone to an XML external entity (XXE) vulnerability. A flaw is present in the application, which fails to properly handle an XML processing issue. Successful exploitation could allow attackers to execute XML External Entities (XXE), including exposing the contents of local files to a remote server.

The host is installed with Apache Cassandra 3.0.x before 3.0.26, 3.11.x before 3.11.12 or 4.0.x before 4.0.2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle configuration of user defined functions. Successful exploitation allows attacker to execute arbitrary code on the host.

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.13, 8.5.x through 8.5.5.22, 8.0.x through 8.0.0.15 or 7.0.x through 7.0.0.45 and is prone to a server-side request forgery vulnerability. A flaw is present in the application, which fails to HTTP request. Successful exploitation allow attackers to obtain sensitive data.

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.14, 8.5.x through 8.5.5.23, 8.0.x through 8.0.0.15 or 7.0.x through 7.0.0.45 and is prone to a SOAPAction spoofing vulnerability. A flaw is present in the application, which fails to handle JAX-WS Web Services requests. Successful exploitation allow a man-in-the-middle attacker to conduct SOAPAction spoofi ...

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.11, 8.5.x through 8.5.5.21, 8.0.x through 8.0.0.15 or 7.0.x through 7.0.0.45 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle an issue in the Dojo library used by IBM WebSphere Application Server traditional in the Admin Console. Successful ...

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.15, 8.5.x through 8.5.5.23, 8.0.x through 8.0.0.15 or 7.0.x through 7.0.0.45 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle Web Server Plug-ins for IBM WebSphere Application Server. Successful exploitation allows attackers to obtain sensitive data.

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.0.10 or 8.5.x through 8.5.5.14 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle an arbitrary JavaScript code in the Web UI. Successful exploitation could allow remote attackers to disclose credentials within a trusted session.

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.0.10 or 8.5.x through 8.5.5.15 and is prone to an uncontrolled resource consumption vulnerability. A flaw is present in the application, which fails to handle request headers. Successful exploitation could allow remote attackers to cause the consumption of memory or denial of service.

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.0.10 or 8.5.x through 8.5.5.15 and is prone to an uncontrolled resource consumption vulnerability. A flaw is present in the application, which fails to handle an improper parameter parsing. Successful exploitation could allow remote attackers to cause denial of service or consume all available CPU resources.

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.0 or 8.5.x through 8.5.5.16 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to handle a specially-crafted URL. Successful exploitation could allow remote attackers to view arbitrary files on the system.


Pages:      Start    1753    1754    1755    1756    1757    1758    1759    1760    1761    1762    1763    1764    1765    1766    ..   2652

© SecPod Technologies