[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Adobe Illustrator CC 2019 before 24.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to execute arbitrary code.

The host is installed with Adobe Illustrator CC 2019 before 24.0 and is prone to an insecure library loading (DLL hijacking) vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to perform privilege escalation.

The host is installed with Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.58 or 8.x before 8.0.16 and is prone to a security bypass vulnerability. A flaw is present in the Expression Language (EL) implementation, which does not properly consider the possibility of an accessible interface implemented by an inaccessible class. Successful exploitation allows remote attackers to bypass a SecurityMana ...

The host is installed with Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55 or 8.x before 8.0.9 and is prone to a denial of service vulnerability. A flaw is present in application, which does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body. Successful exploitation allows remote attackers to cause a denial of service (memory consumpti ...

The host is installed with Apache Tomcat 8.x before 8.0.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a "Content-Length: 0" AJP request to trigger a hang in request processing. Successful exploitation allows remote attackers to cause a denial of service (thread consumption).

The host is installed with Apache Tomcat 7.x before 7.0.22 and is prone to privilege escalation vulnerability. A flaw is present in the application, which does not properly restrict ContainerServlets in the Manager application. Successful exploitation allows remote attackers to gain privileges by using an untrusted web application to access the Manager application's functionality.

The host is installed with Apache Tomcat 6.0.0 through 6.0.15 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails handle the parameter processing. Successful exploitation allows remote attackers to obtain sensitive information.

The host is installed with Apache Tomcat 7.x before 7.0.40 and is prone to unrestricted file upload vulnerability. A flaw is present in the application, which fails to properly handle outdated java.io.File code and a custom JMX configuration. Successful exploitation allows remote attackers to execute arbitrary code by uploading and accessing a JSP file.

The host is installed with Apache Tomcat 7.x before 7.0.40 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the throwing of a RuntimeException in an AsyncListener in an application. Successful exploitation allows attackers to obtain sensitive request information intended for other applications in opportunistic circumstances ...

The host is installed with OpenSSH and is prone to information disclosure vulnerability. A flaw is present in key_certify function which fails to properly generate legacy certificates using the -t command-line option in ssh-keygen and does not initialize the nonce field. Successful exploitation could allow an attacker to obtain sensitive stack memory contents or make it easier to conduct hash coll ...


Pages:      Start    1403    1404    1405    1406    1407    1408    1409    1410    1411    1412    1413    1414    1415    1416    ..   1516

© SecPod Technologies