[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 27003 Download | Alert*

The host is installed with Cacti 1.2.25 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle the data_debug.php component. Successful exploitation could lead to arbitrary code execution.

Windows Kerberos Security Feature Bypass Vulnerability. The authentication feature could be bypassed as this vulnerability allows impersonation. An authenticated attacker could exploit this vulnerability by establishing a machine-in-the-middle (MITM) attack or other local network spoofing technique, then sending a malicious Kerberos message to the client victim machine to spoof itself as the Kerbe ...

.NET Core Denial of Service Vulnerability

The host is installed with Microsoft Edge before 120.0.2210.133 and is prone to a security feature bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Atlassian Confluence Server 8.0.0 before 8.5.4 and is prone to a template injection vulnerability. A flaw is present in the application which fails to properly handle unspecified vectors. Successful exploitation could lead to remote code execution.

The host is installed with Microsoft Edge before 121.0.2277.83 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to a full compromise of the browser.

The host is installed with Microsoft Edge before 121.0.2277.83 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Microsoft Edge before 121.0.2277.83 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Microsoft Edge before 121.0.2277.83 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows the attacker to cover and spoof elements of the UI.

The host is installed with Microsoft Edge before 121.0.2277.83 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to a browser sandbox escape.


Pages:      Start    13    14    15    16    17    18    19    20    21    22    23    24    25    26    ..   2700

© SecPod Technologies