[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 1538 Download | Alert*

In the Linux kernel, the following vulnerability has been resolved:netfilter: nftables: exthdr: fix 4-byte stack OOB writeIf priv->len is a multiple of 4, then dst[len / 4] can write pastthe destination array which leads to stack corruption.This construct is necessary to clean the remainder of the registerin case ->len is NOT a multiple of the register size, so make itconditional just like n ...

An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.2, 3.11.8, 3.10.13, 3.9.18, and 3.8.18 and prior.The tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potentially able to modify permissions of files referenced by symlinks in some circumstance ...

nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it a ...

An issue was discovered in some DNS recursive resolvers that allows remote attackers to cause a denial of service using a maliciously designed authority and response amplification

The host is installed with Atlassian Confluence Server before 7.19.22 or 7.20.0 before 8.5.9 and is prone to a sql injection vulnerability vulnerability. A flaw is present in the application which fails to properly handle an issue in org.postgresql:postgresql dependency. Successful exploitation allows an unauthenticated attacker to expose assets in your environment susceptible to exploitation whic ...

The host is installed with Atlassian Confluence Server before 7.19.22 or 7.20.0 before 8.5.9 and is prone to a remote code execution vulnerability. A flaw is present in the application which fails to properly handle an issue in unspecified vectors. Successful exploitation allows an authenticated attacker to execute arbitrary code.

The host is installed with Atlassian Confluence Server before 7.19.22 or 7.20.0 before 8.5.9 and is prone to a remote code execution vulnerability. A flaw is present in the application which fails to properly handle an issue in unspecified vectors. Successful exploitation allows an authenticated attacker to execute arbitrary code.

The host is installed with Atlassian Confluence Server before 7.19.22 or 7.20.0 before 8.5.9 and is prone to a remote code execution vulnerability. A flaw is present in the application which fails to properly handle an issue in unspecified vectors. Successful exploitation allows an authenticated attacker to execute arbitrary code.

The host is installed with Papercut NG before 21.2.x before 21.2.12, or 22.x before 22.1.1 and is prone to a path traversal vulnerability. A flaw is present in the applications which fails to properly handle an issue in the Application Server and Site Server. Successful exploitation could allow an attacker to access the read-only server's file system.

The host is installed with Papercut NG before 22.1.1 and is prone to a remote code execution vulnerability. A flaw is present in the applications which fails to properly handle an issue in the External User Lookup functionality. Successful exploitation could allow a remote attackers to execute arbitrary code on affected installations of PaperCut NG.


Pages:      Start    97    98    99    100    101    102    103    104    105    106    107    108    109    110    ..   153

© SecPod Technologies