[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31160 Download | Alert*

The host is installed with Apache Log4j 2.0.x through 2.16.0 (excluding security releases 2.3.1 and 2.12.3) and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issue in the logging configuration when it uses a non-default Pattern Layout with a Context Lookup. Successful exploitation could allow attackers to craft malicious input d ...

The host is installed with PostgreSQL 11.x before 11.13, 12.x before 12.8 or 13.x before 13.4 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to handle a purpose-crafted query. Successful exploitation allows attackers to read arbitrary bytes of server memory.

The host is installed with Avast Antivirus 19.3.3084 and is prone to a cross site scripting vulnerability. A flaw exists in the application. which fails to handle unspecified vector. Successful exploitation allows attackers to execute JavaScript code via an SSID Name.

Buffer overflow in Microsoft Internet Explorer and Explorer on Windows XP SP1, WIndows 2000, Windows 98, and Windows Me may allow remote malicious servers to cause a denial of service (application crash) and possibly execute arbitrary code via long share names, as demonstrated using Samba.

Buffer overflow in Microsoft Internet Explorer and Explorer on Windows XP SP1, WIndows 2000, Windows 98, and Windows Me may allow remote malicious servers to cause a denial of service (application crash) and possibly execute arbitrary code via long share names, as demonstrated using Samba.

The host is installed with VideoLAN VLC Media Player before 0.8.6f and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted MP4 file. Successful exploitation allows attackers to cause a denial of service.

The host is installed with OpenSSL 0.9.8f or 0.9.8g and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a TLS handshake that omits the Server Key Exchange message and uses "particular cipher suites," which triggers a NULL pointer dereference. Successful exploitation could allow remote attackers to cause a denial of service (crash).

The host is installed with OpenSSL 0.9.8i and earlier and is prone to signature verification vulnerability. A flaw is present in the application, which does not properly check the return value from the EVP_VerifyFinal function. Successful exploitation could allow remote attackers to bypass validation of the certificate chain.

The host is installed with Apache Tomcat 5.5.0 through 5.5.26 or 6.0.0 through 6.0.16 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails handle the cookie in an https session. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is installed with Apache Tomcat 5.5.0 through 5.5.26 or 6.0.0 through 6.0.16 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails handle the name parameter to host-manager/html/add. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.


Pages:      Start    1853    1854    1855    1856    1857    1858    1859    1860    1861    1862    1863    1864    1865    1866    ..   3115

© SecPod Technologies