[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26684 Download | Alert*

An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scriptin ...

The host is installed with Apache CouchDB before 1.0.4, 1.1.x before 1.1.2 or 1.2.x before 1.2.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle differences issue in Erlang-based JSON parser and JavaScript-based JSON parser. Successful exploitation could allow attackers to bypass certain restrictions and gain elevated privilege ...

The host is installed with Apache CouchDB before 1.0.4, 1.1.x before 1.1.2 or 1.2.x before 1.2.1 and is prone to a cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle a issue in Futon UI. Successful exploitation could allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to the browser-based test suite.

The host is installed with Bamboo CI server before 6.2.3 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in the plan configure branches resource. Successful exploitation could allow attackers to inject arbitrary HTML or JavaScript via a cross site scripting vulnerability through the name of a branch.

The host is installed with Internet Explorer 6 through 9 and is prone to an asynchronous null object access remote code execution vulnerability. A flaw is present in the application, which fails to handle deleted objects in memory. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Internet Explorer 6 and 7 and is prone to a layout memory corruption vulnerability. A flaw is present in the application, which fails to handle deleted objects in memory. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Internet Explorer 6 through 9 and is prone to a virtual function table corruption vulnerability. A flaw is present in the application, which fails to handle deleted objects in memory. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Zoho ManageEngine ADSelfService Plus before build 6104 and is prone to a stored XSS vulnerability. A flaw is present in the application, which does not properly handle the e-mail address field. Successful exploitation allows stored XSS on the /webclient/index.html#/directory-search user search page.

The host is installed with IBM DB2 11.1 before 11.1.4FP6 or 11.5 before 11.5.5FP1 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to handle a specifically crafted select statement. Successful exploitation allows an attacker to terminate the server abnormally.

The host is installed with IBM Lotus Domino 8.5.x through 8.5.3 and is prone to cross-site scripting vulnerability. A flaw is present in the application, which fails to sufficiently sanitize user-supplied input. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.


Pages:      Start    2636    2637    2638    2639    2640    2641    2642    2643    2644    2645    2646    2647    2648    2649    ..   2668

© SecPod Technologies