[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26831 Download | Alert*

Mozilla Firefox 70 : A Content-Security-Policy that blocks in-line scripts could be bypassed using an object tag to execute JavaScript in the protected document (cross-site scripting). This is a separate bypass from CVE-2019-17000.

Mozilla Firefox 70 : If codeupgrade-insecure-requests/code was specified in the Content Security Policy, and a link was dragged and dropped from that page, the link was not upgraded to https.

The host is installed with Apple iTunes before 12.10.3 or Apple iCloud before 7.16 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which fail to properly handle an issue in older versions of expat. Successful exploitation could allow attackers to obtain sensitive information via a crafted XML file.

The host is installed with 7 zip through 18.01 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly implement the "Large memory pages" option. Successful exploitation could allow remote attackers to bypass intended access restrictions.

The host is installed with Artifex Ghostscript before 9.24 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle the .setdistillerkeys PostScript command. Successful exploitation could allow attackers to supply crafted postScript files to crash the interpreter or potentially execute code.

The host is installed with Oracle Java SE through 7u221, 8u212, 11.0.3 or 12.0.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to AWT (libpng). Successful exploitation allows attackers to affect integrity and availability.

The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle Console(jQuery) component issue. Successful exploitation could result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a sub ...

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 12.1.3.0, 12.2.1.3, 12.2.1.4 or 14.1.1.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Console (jQuery). Successful exploitation can cause unspecified impact.

The host is installed with OpenSSH through 8.3p1 and is prone to a command injection vulnerability. A flaw is present in the application, which fails to properly handle an issue in the scp.c toremote function. Successful exploitation could allow remote attackers to pass a backtick enabled payload as file name and when local scp command is executed, local shell will also execute backtick enabled pa ...

The host is installed with Flask-Caching extension for Flask through 1.10.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a cache storage system. Successful exploitation allow attackers to gain access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and e ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   2683

© SecPod Technologies