[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26803 Download | Alert*

The host is installed with WSO2 API Manager 3.1.0 and is prone to a cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle unspecified vectors. Successful exploitation allows attackers to hijack a logged-in users password and invalidate the session of the victim while the hacker maintains access.

The host is installed with WSO2 API Manager version 2.6.0 and is prone to an unspecified vulnerability. A flaw is present in the applications which fails to properly handle unspecified vectors. Successful exploitation results in uploaded documents for API documentation to be available to an unauthenticated user.

The host is installed with WSO2 API Manager version before 2.6.0 and is prone to a cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle a crafted filename to the file-upload feature of the event simulator component. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with WSO2 API Manager version 2.1.0 or 2.6.0 and is prone to a reflected cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle the carbon part of the product. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with WSO2 API Manager version 2.1.0 or 2.6.0 and is prone to a cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle the store part of the product. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with OpenVPN through 2.4.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in control channel. Successful exploitation could allow remote attackers to cause a denial of service via crafted reset packet.

The host is installed with VMWare Tools 10.x, 11.x or 12.x before 12.1.5 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an issue in the VM3DMP driver. Successfull exploitation allows attackers with local user privileges in the Windows guest OS, where VMware Tools is installed to trigger a PANIC in the VM3DMP driver leading to ...

The host is installed with Cacti 1.2.21 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle a crafted POST request to graphs_new.php. Successful exploitation allows an attacker to improperly neutralize the input during web page generation.

The host is installed with Apache Couchdb versions equals 3.0.0 and is prone to a missing authentication for critical function vulnerability. A flaw is present in the applications which fails to properly handle the off-by-default setting. Successful exploitation allow remote attackers to cause unspecified impact.

The host is installed with Telegram Desktop through 2.0.1 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle punycode in a public url. Successful exploitation allows attackers to cause an IDN Homograph attack.


Pages:      Start    1711    1712    1713    1714    1715    1716    1717    1718    1719    1720    1721    1722    1723    1724    ..   2680

© SecPod Technologies