[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31403 Download | Alert*

Cluster Client Failover (CCF) Elevation of Privilege Vulnerability

Windows DNS Server Information Disclosure Vulnerability

Windows DNS Server Remote Code Execution Vulnerability. Successful exploitation of this vulnerability requires an attacker to win a race condition. In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server.

Windows DNS Server Remote Code Execution Vulnerability. Successful exploitation of this vulnerability requires an attacker to win a race condition. In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server.

The host is installed with Atlassian Jira Server before 8.13.18, 8.14.0 before 8.20.6, or 8.21.0 before 8.22.0 and is prone to an authentication bypass vulnerability. A flaw is present in the application which fails to properly handle a specially crafted HTTP request. Successful exploitation could allows a remote, unauthenticated attacker to bypass authentication.

The host is installed with Brave Browser before 1.34 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle an issue in a Private Window with Tor Connectivity. Successful exploitation allows attackers to leak .onion URLs in Referer and Origin headers.

The host is installed with Atlassian Confluence Server 1.3.0 before 7.4.17, 7.13.0 before 7.13.7, 7.14.0 before 7.14.3, 7.15.0 before 7.15.2, 7.16.0 before 7.16.4, 7.17.0 before 7.17.4, or 7.18.0 before 7.18.1 and is prone to a remote code execution vulnerability. A flaw is present in the application which fails to properly handle unspecified vectors. Successful exploitation allows unauthenticated ...

The host is installed with Couchbase Server before 7.0.4 and is prone to a improper authentication vulnerability. A flaw is present in the application, which fails to properly handle the XDCR internal settings. Successful exploitation could allow attackers to modify XDCR internal settings without any authentication.

The host is installed with Couchbase Server 4.0.0 before 7.0.4 and is prone to a Missing Authorization vulnerability. A flaw is present in the application, which fails to properly handle the network processes. Successful exploitation could allow process requests sent by unauthenticated users to modify indexed data.

The host is installed with Couchbase Server 4.0.0 before 7.0.4 and is prone to a http request vulnerability. A flaw is present in the application, which fails to properly handle the issuess in REST API call to the cluster manager. Successful exploitation could allow attackers to send random HTTP requests which leads to leaked metrics.


Pages:      Start    1991    1992    1993    1994    1995    1996    1997    1998    1999    2000    2001    2002    2003    2004    ..   3140

© SecPod Technologies