[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 27003 Download | Alert*

In PHP versions 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while using mb_strtolower() function with UTF-32LE encoding, certain invalid strings could cause PHP to overwrite stack-allocated buffer. This could lead to memory corruption, crashes and potentially code execution.

The host is installed with Docker before 19.03.9 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to handle an issue in util/binfmt_misc/check.go in Builder. Successful exploitation could allow attackers to access arbitrary directories.

The host is installed with Microsoft Windows Server 2003 SP2, Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, 8.1, Server 2012 or Server 2012 R2 and is prone to a security feature bypass vulnerability. A flaw is present in the application, which fails to properly validate and enforce impersonation levels. An attacker could exploit this vulnerability by convincing a user t ...

The host is installed with PostgreSQL 11.x before 11.3 and is prone to an information disclosure vulnerability. A flaw is present in the application fails to handle a purpose-crafted insert to a partitioned table. Successful exploitation allows attackers to read arbitrary bytes of server memory.

The host is installed with PostgreSQL 9.6.x before 9.6.22, 10.x before 10.17, 11.x before 11.12, 12.x before 12.7 or 13.x before 13.3 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to handle the INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table. Successful exploitation allows attackers to make an authenticated databas ...

The host is installed with PostgreSQL 11.x before 11.12, 12.x before 12.7 or 13.x before 13.3 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to handle the UPDATE ... RETURNING command on a purpose-crafted table. Successful exploitation allows attackers to make an authenticated database user to read arbitrary bytes of server memory.

The host is installed with PostgreSQL 11.x before 11.11, 12.x before 12.6 or 13.x before 13.2 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to handle a user having UPDATE permission but not SELECT permission. Successful exploitation allows attackers to obtain information stored in a column they are allowed to write but not read.

The host is installed with Apache Tomcat 10.0.0-M1 through 10.0.5, 9.0.0.M1 through 9.0.45 ,8.5.0 through 8.5.65 or 7.0.0 through 7.0.108 and is prone to an improperauthentication vulnerability. A flaw is present in application, which fails to properly handle issues in JNDI Realm of Apache Tomcat. Successful exploitation could allow an attacker to authenticate using variations of a valid user name ...

The host is installed with Apache Log4j 2.0.x through 2.15.0 (excluding security releases 2.3.1, 2.12.2 and 2.12.3) and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle issue in the logging configuration when it uses a non-default Pattern Layout with a Context Lookup. Successful exploitation could allow attackers with control o ...

The host is installed with Apache Log4j 2.0.x through 2.16.0 (excluding security releases 2.3.1 and 2.12.3) and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issue in the logging configuration when it uses a non-default Pattern Layout with a Context Lookup. Successful exploitation could allow attackers to craft malicious input d ...


Pages:      Start    1671    1672    1673    1674    1675    1676    1677    1678    1679    1680    1681    1682    1683    1684    ..   2700

© SecPod Technologies