[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26719 Download | Alert*

The host is installed with Microsoft XML Core Services 3.0 or Microsoft XML Core Services 6.0 on Microsoft Windows Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, 8.1, Server 2012 or Server 2012 R2 or Microsoft XML Core Services 5.0 on Microsoft Office 2007 SP2, SP3 or Microsoft InfoPath 2007 SP3 and is prone to an information disclosure vulnerability. A flaw is present i ...

The host is installed with OpenAFS 1.6.0 before 1.6.1300 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted commands. Successful exploitation allows local users to read kernel memory.

The host is installed with OpenAFS before 1.6.1300 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle stack data. Successful exploitation allows remote attackers to obtain stack data by sniffing the network.

An information disclosure vulnerability exists in Lync 2013. An attacker who exploited it could read arbitrary files on the victim's machine. To exploit the vulnerability, an attacker needs to instantiate a conference and modify the meeting link with malicious content and send the link to a victim. The update addresses the vulnerability by changing how the URL is being resolved.

Host is installed with Kaspersky Anti-Virus 2019 before Patch F and is prone to an Information exposure vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted webpage. Successful exploitation allows an attacker to potentially disclose unique Product ID.

The host is installed with Pro-face WinGP PC Runtime 3.01.100 or earlier and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted packet with a certain opcode. Successful exploitation could allow remote attackers to obtain sensitive information from daemon memory crash.

The host is installed with IBM Rational ClearQuest 7.1.1 before 7.1.1.9 or 7.1.2 before 7.1.2.6 and is prone to SQL injection vulnerability. A flaw is present in the application, which fails to handle certain fields in the Maintenance tool. Successful exploitation allows remote attackers to execute arbitrary SQL commands by leveraging an error in the user-database upgrade feature.

The host is installed with Bamboo CI server before 7.2.2 and is prone to a sensitive data exposure vulnerability. A flaw is present in the application, which fails to properly handle an issue in the /chart endpoint. Successful exploitation could allow an unauthenticated remote attacker to view a stack trace that may reveal the path for the home directory in disk and if certain files exists on the ...

The host is installed with OpenSSH before 5.8p2 and is prone to a exposure of sensitive information to an unauthorized actor vulnerability. A flaw is present in the application, which is due to ssh-keysign.c in ssh-keysign which on certain platforms executes ssh-rand-helper with unintended open file descriptors. Successful exploitation could allow remote attackers to obtain sensitive key informati ...

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle issues related to Application Container - JavaEE. Successful exploitation can cause unspecified impact.


Pages:      Start    2628    2629    2630    2631    2632    2633    2634    2635    2636    2637    2638    2639    2640    2641    ..   2671

© SecPod Technologies