[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195521

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26706 Download | Alert*

The host is installed with PHP 8.1.x before 8.1.28, 8.2.x before 8.2.18, or 8.3.x before 8.3.5 and is prone to an improper encoding or escaping of output vulnerability. A flaw is present in the application, which fails to handle issues in proc_open. Successful exploitation allows an attacker to cause arbitrary code execution.

The host is installed with PHP 8.3.x before 8.3.5 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to handle issues in function mb_encode_mimeheader. Successful exploitation allows an attacker to cause a potential DoS attack.

The host is installed with PHP 8.1.x before 8.1.28, 8.2.x before 8.2.18, or 8.3.x before 8.3.5 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to handle issues in password verification via password_verify. Successful exploitation allows an attacker to compromise the victim's account.

The host is installed with Oracle Database Server 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c or 19c and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the ORDS issue. Successful exploitation allows unauthorized update, insert or delete access to some of ORDS (jQuery) accessible data as well as unauthorized read access to a subset of ORDS (jQuer ...

The host is installed with Python through 3.11.4, or Oracle Database Server 21c and is prone to a buffer overflow vulnerability. The flaw is present in the application, which fails to properly handle the legacy email.utils.parseaddr function. Successful exploitation allows attackers to trigger "RecursionError: maximum recursion depth exceeded while calling a Python object" via a crafted argument.

The host is installed with Oracle MySQL Server through 8.0.36 or through 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Thread Pooling. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL Server through 8.0.36 or through 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Client: mysqldump. Successful exploitation allows attackers to affect confidentiality, integrity and availability.

The host is installed with Oracle MySQL Server through 8.0.36 or through 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Group Replication Plugin. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL Server through 8.0.36 or through 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: DDL. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL Server through 8.0.36 or through 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Optimizer. Successful exploitation allows attackers to affect availability.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   2670

© SecPod Technologies