[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15139 Download | Alert*

The host is installed with Elasticsearch 6.2.0 before 6.2.3 and is prone to a path traversal vulnerability. A flaw is present in the application, which allows attackers to make use of the SAML Identity Provider to impersonate a legitimate user. On successful exploitation, an attacker might be able to register an account with an identifier that shares a suffix with a legitimate account.

The host is installed with Elasticsearch 6.2.0 before 6.2.3 and is prone to a path traversal vulnerability. A flaw is present in the application, which allows attackers to make use of the SAML Identity Provider to impersonate a legitimate user. On successful exploitation, an attacker might be able to register an account with an identifier that shares a suffix with a legitimate account.

moinejf abcm2ps 8.13.20 is affected by: Incorrect Access Control. The impact is: Allows attackers to cause a denial of service attack via a crafted file. The component is: front.c, function txt_add. The fixed version is: after commit commit 08aef597656d065e86075f3d53fda89765845eae.

The host is installed with IBM DB2 9.7 through FP11, 10.1 through FP6, 10.5 through FP10 or 11.1 before FP5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the boundary checks issue. Successful exploitation allows an authenticated local attacker to execute arbitrary code on the system as root.

The host is installed with kibana before 6.8.2 or 7.x before 7.2.1 and is prone to a server side request forgery vulnerability. A flaw is present in the application, which fails to handle a issue in the graphite integration for timelion visualizer. Successful exploitation allows attackers to access external URL resources as the kibana process on the host system.

The host is installed with kibana before 6.8.2 or 7.x before 7.2.1 and is prone to a server side request forgery vulnerability. A flaw is present in the application, which fails to handle a issue in the graphite integration for timelion visualizer. Successful exploitation allows attackers to access external URL resources as the kibana process on the host system.

ruby-grape ruby gem suffers from a cross-site scripting vulnerability via "format" parameter.

An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception.

BWA before 2019-01-23 has a stack-based buffer overflow in the bns_restore function in bntseq.c via a long sequence name in a .alt file.

In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a stack-based buffer overflow in the function SVGStartElement of coders/svg.c, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a quoted font family value.


Pages:      Start    1065    1066    1067    1068    1069    1070    1071    1072    1073    1074    1075    1076    1077    1078    ..   1513

© SecPod Technologies