[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with Apache Tomcat 7.x before 7.0.40 and is prone to unrestricted file upload vulnerability. A flaw is present in the application, which fails to properly handle outdated java.io.File code and a custom JMX configuration. Successful exploitation allows remote attackers to execute arbitrary code by uploading and accessing a JSP file.

The host is installed with Apache Tomcat 7.x before 7.0.40 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the throwing of a RuntimeException in an AsyncListener in an application. Successful exploitation allows attackers to obtain sensitive request information intended for other applications in opportunistic circumstances ...

The URL parser in Microsoft Internet Information Services (IIS) 5.1 on Windows XP Professional SP2 allows remote attackers to execute arbitrary code via multiple requests to ".dll" followed by arguments such as "~0" through "~9", which causes ntdll.dll to produce a return value that is not correctly handled by IIS, as demonstrated using "/_vti_bin/.dll/*/~0". NOTE: the consequence was originally ...

The host is installed with OpenSSH and is prone to information disclosure vulnerability. A flaw is present in key_certify function which fails to properly generate legacy certificates using the -t command-line option in ssh-keygen and does not initialize the nonce field. Successful exploitation could allow an attacker to obtain sensitive stack memory contents or make it easier to conduct hash coll ...

The host is installed with Cisco AnyConnect Secure Mobility Client before 4.4.02034 is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly validate input of path and file names of a DLL file before it is loaded. Successful exploitation could allow attackers to execute commands on the underlying Microsoft Windows host with privileges equivalen ...

The host is installed with Cisco AnyConnect Secure Mobility Client 4.0.00051 and earlier and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle the crafted IPC messages. successful exploitation could allow attackers to inject arbitrary web script or HTML via vectors.

The host is installed with Cisco AnyConnect Secure Mobility Client 3.0 through 3.0.5080 or 3.1 through 3.1.02043 and is prone to an input validation vulnerability. A flaw is present in the application which fails to properly verify the files. successful exploitation could allow attackers to gain privileges via unspecified vectors.

The host is installed with Cisco AnyConnect Secure Mobility Client 2.0.0343 through 4.1 and is prone to an untrusted search path vulnerability. A flaw is present in the application which fails to properly handle the CMainThread::launchDownloader function in vpndownloader.exe. Successful exploitation could allow attackers to gain privileges via a Trojan horse DLL in the current working directory.

The host is installed with Cisco AnyConnect Secure Mobility Client before 4.2.05015 or 4.3.x before 4.3.02039 is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle the path names. Successful exploitation could allow local users to gain privileges via a crafted INF file.

The host is installed with Cisco AnyConnect Secure Mobility Client 4.3.02039 or 4.3.00748 is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle the path names. Successful exploitation could allow local users to install and execute an arbitrary executable file with privileges equivalent to the Microsoft Windows operating system SYSTEM ...


Pages:      Start    1292    1293    1294    1295    1296    1297    1298    1299    1300    1301    1302    1303    1304    1305    ..   1429

© SecPod Technologies