[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15139 Download | Alert*

An integer overflow vulnerability was found in tiftoimage function in openjpeg 2.1.2, resulting in heap buffer overflow.

The host is installed with Oracle Java SE through 8u231 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JavaFX (libxslt). Successful exploitation allows attackers to affect integrity.

The host is installed with Oracle Java SE through 8u231 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JavaFX (libxslt). Successful exploitation allows attackers to affect integrity.

The host is installed with Control/CentOS Web Panel 7 before 0.9.8.1147 and is prone to an OS command injection vulnerability. A flaw is present in the application, which fails to handle an issue in login/index.php file. Successful exploitation allows remote attackers to execute arbitrary OS commands via shell metacharacters in the login parameter.

The host is installed with IBM Lotus Notes 7.0 or 8.0 before 8.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which stores administrative credentials in cleartext. Successful exploitation could allow attackers to gain sensitive information.

The host is installed with IBM Lotus Notes 7.0 or 8.0 before 8.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which stores administrative credentials in cleartext. Successful exploitation could allow attackers to gain sensitive information.

The host is installed with IBM Lotus Notes 8.x before 8.5.3 FP2 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly validate user supplied input. Successful exploitation allows attackers to execute arbitrary code via a crafted notes:// URL.

The host is installed with IBM Lotus Notes 8.x before 8.5.3 FP2 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly validate user supplied input. Successful exploitation allows attackers to execute arbitrary code via a crafted notes:// URL.

The host is installed with Oracle Database Server 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to an insufficient information vulnerability. A flaw is present in the application, which fails to handle the Data Pump. Successful exploitation allows an attacker to takeover the Data Pump.

The host is installed with Oracle Database Server 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to an insufficient information vulnerability. A flaw is present in the application, which fails to handle the Java VM. Successful exploitation allows an attacker to takeover the Java VM.


Pages:      Start    1062    1063    1064    1065    1066    1067    1068    1069    1070    1071    1072    1073    1074    1075    ..   1513

© SecPod Technologies