[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 10965 Download | Alert*

The host is installed with Apache Tomcat 8.x before 8.0.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a "Content-Length: 0" AJP request to trigger a hang in request processing. Successful exploitation allows remote attackers to cause a denial of service (thread consumption).

The host is installed with Apache Tomcat 6.0.x before 6.0.40, 7.x before 7.0.53 or 8.x before 8.0.4 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not properly restrict XSLT stylesheets. Successful exploitation allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides ...

The host is installed with Apache Tomcat 6.0.x before 6.0.40, 7.x before 7.0.53 or 8.x before 8.0.4 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted Content-Length HTTP header. Successful exploitation allows remote attackers to conduct HTTP request smuggling attacks.

The host is installed with Apache Tomcat 6.0.33 before 6.0.38 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted URL. Successful exploitation allows remote attackers to conduct session fixation attacks.

The host is installed with Apache Tomcat 6.0.x before 6.0.39, 7.x before 7.0.50 or 8.x before 8.0.0-RC10 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to handle an untrusted web application. Successful exploitation allows remote attackers to obtain "Tomcat internals" information by leveraging the presence of an untrusted web application wit ...

The host is installed with Apache Tomcat 6.0.x before 6.0.39, 7.x before 7.0.50 or 8.x before 8.0.0-RC10 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly handle (1) a large total amount of chunked data or (2) whitespace characters in an HTTP header value within a trailer field. Successful exploitation allows remote attackers to denial o ...

The host is installed with Apache Tomcat 6.0.x before 6.0.39, 7.x before 7.0.47 or 8.x before 8.0.0-RC3 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not properly handle certain inconsistent HTTP request headers. Successful exploitation allows remote attackers to trigger incorrect identification of a request's length and conduct request-smug ...

The host is installed with OpenSSL 1.0.0 before 1.0.0m or 1.0.1 before 1.0.1h and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an SSL connection in a multithreaded environment. Successful exploitation allows remote attackers to inject data across sessions or cause a denial of service.

The host is installed with Skype 7.2, 7.35, 7.36 before 7.37 and is prone to a stack buffer overflow vulnerability. The flaws are present in the MSFTEDIT.DLL file, which fails to handle a remote RDP clipboard content within the message box. Successful exploitation could allow local users to have unspecified impact.

The host is installed with Apache HTTP Server 2.2.x before 2.2.34 and 2.4.x before 2.4.27 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle mod_mime. Successful exploitation could allow remote attackers to leak confidential information, and a segfault in other cases resulting in denial of service.


Pages:      Start    2    3    4    5    6    7    8    9    10    11    12    13    14    15    ..   1096

© 2013 SecPod Technologies