[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31071 Download | Alert*

The host is installed with Apache Tomcat 10.0.0-M1 through 10.0.0, 9.0.0.M1 through 9.0.41, 7.0.x through 7.0.107 or 8.5.x through 8.5.61 and is prone to a remote code execution vulnerability. A flaw is present in application, which fails to properly handle issues in PersistenceManager. On successful exploitation, attacker will be able to trigger remote code execution via deserialization of the fi ...

The host is installed with Apache Tomcat 7.0.79 before 7.0.83, 8.5.16 before 8.5.24, 8.0.45 before 8.0.48 or 9.0.0.M22 before 9.0.2 and is prone to a CGI search algorithm vulnerability. A flaw is present in an updated description of the search algorithm used by the CGI Servlet to identify which script to execute. Successful exploitation may cause some scripts to fail execution as expected and othe ...

The host is installed with Apache Tomcat versions 9.0.0.M1 to 9.0.14 or 8.5.0 to 8.5.37 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to handle the issue during the HTTP/2 implementation. Successful exploitation allows attackers to cause server-side threads to block eventually leading to thread exhaustion and a DoS.

The host is installed with Apache Tomcat versions 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 or 7.0.0 to 7.0.93 and is prone to a remote code execution vulnerability. A flaw is present in the application which fails to handle the issue in CGI servlet. Successful exploitation allows a remote attacker to execute arbitrary code on the Windows OS.

The host is installed with Apache Tomcat 9.0.0.M9 through 9.0.9, 8.5.x through 8.5.31 and is prone to an information disclosure vulnerability. A flaw is present in application, which fails to properly handle async requests. Successful exploitation could result in a user seeing a response intended for another user.

The host is installed with Apache Tomcat versions 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 or 7.0.0 to 7.0.93 and is prone to a cross-site scripting vulnerability. A flaw is present in the application which fails to handle the issue in SSI printenv. Successful exploitation allows an attacker to perform cross-site scripting.

The host is installed with Notepad++ 6.5 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle an issue in the file called msimg32.dll. Successful exploitation allows attackers to gain elevated privileges.

The host is installed with Atlassian Confluence Server with vulnerable log4j.properties, IBM webSphere application server 8.5.x before 8.5.5.21 or 9.0.x before 9.0.5.11 or Apache Log4j 2.0.x before 2.17.0 (excluding security releases 2.3.1, and 2.12.3) and is prone to a remote code execution vulnerability. A flaw is present in the application which fails to properly handle the issue in Log4j confi ...

The host is installed with Nvidia Geforce Experience before 3.10.0.55 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the dnsmasq. Successful exploitation allows remote attackers to cause a denial of service or execute arbitrary code via a crafted DNS response.

The host is installed with Nvidia Geforce Experience versions less than 3.19 and is prone to a DLL preloading vulnerability. A flaw is present in the application, which fails to properly handle the Windows system DLLs. Successful exploitation may lead to escalation of privileges through code execution.


Pages:      Start    1398    1399    1400    1401    1402    1403    1404    1405    1406    1407    1408    1409    1410    1411    ..   3107

© SecPod Technologies