[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 25941 Download | Alert*

The host is installed with Apache Tomcat 8.5.x before 8.5.5, 8.0.x before 8.0.37, 6.x before 6.0.46, 7.x before 7.0.71 or 9.x before 9.0.0.M10 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to handle supplied password if the supplied user name did not exist. Successful exploitation allows attackers to obtain sensitive information that may ...

The host is installed with Apache Tomcat 8.5.x before 8.5.5, 8.0.x before 8.0.37, 6.x before 6.0.46, 7.x before 7.0.71 or 9.x before 9.0.0.M10 and is prone to a security bypass vulnerability. A flaw is present in the application which fails to handle the system property replacement feature for configuration files. Successful exploitation allows attackers to bypass the SecurityManager and read sys ...

The host is installed with Apache Tomcat 8.5.x before 8.5.5, 8.0.x before 8.0.37, 6.x before 6.0.46, 7.x before 7.0.71 or 9.x before 9.0.0.M10 and is prone to a security bypass vulnerability. A flaw is present in the application which fails to handle the configured SecurityManager. Successful exploitation allows attackers to bypass a configured SecurityManager via a Tomcat utility method that was ...

The host is installed with Apache Tomcat 8.5.x before 8.5.5, 8.0.x before 8.0.37, 6.x before 6.0.46, 7.x before 7.0.71 or 9.x before 9.0.0.M10 and is prone to a security bypass vulnerability. A flaw is present in the application which fails to handle the web application access to global JNDI resources to those resources explicitly linked to the web application. Successful exploitation allows atta ...

The host is installed with Apache Tomcat 8.5.x before 8.5.5, 8.0.x before 8.0.37, 6.x before 6.0.46, 7.x before 7.0.71 or 9.x before 9.0.0.M10 and is prone to a security bypass vulnerability. A flaw is present in the application which fails to handle a malicious web application running on Apache Tomcat. Successful exploitation allows attackers to bypass a configured SecurityManager via manipulati ...

The host is installed with Google Chrome before 88.0.4324.96 or Microsoft Edge before 88.0.705.50 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

Mozilla Firefox ESR 78.7, Mozilla Thunderbird 78.7 : When a HTTPS page was embedded in a HTTP page, and there was a service worker registered for the former, the service worker could have intercepted the request for the secure page despite the iframe not being a secure context due to the (insecure) framing.

The host is installed with Microsoft Visual Studio and is prone to a NULL pointer de-reference vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow an unspecified impact.

The host is installed with OpenSSL 1.1.0 through 1.1.0k, 1.0.2 through 1.0.2s or 1.1.1 through 1.1.1c and is prone to a padding Oracle attack vulnerability. A flaw is present in the application which fails to handle the public RSA key. Successful exploitation allows an attacker to recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public ...

The host is installed with OpenSSL 1.1.1 through 1.1.1c and is prone to a fork protection vulnerability. A flaw is present in the application which fails to handle the issue in random number generator (RNG). Successful exploitation allows an attacker to make the parent and child processes share the same RNG state.


Pages:      Start    1080    1081    1082    1083    1084    1085    1086    1087    1088    1089    1090    1091    1092    1093    ..   2594

© SecPod Technologies