[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254802

 
 

909

 
 

198617

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 27000 Download | Alert*

The host is installed with Atlassian Jira Server before 8.5.13, 8.6.0 before 8.13.5 and 8.14.0 before 8.15.1 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to properly handle the membersOf JQL search function. Successful exploitation allows remote anonymous attackers to determine if a group exists and members of groups if they are assigned ...

The host is installed with Atlassian Jira Server before 8.5.13, 8.6.0 before 8.13.5 and 8.14.0 before 8.15.1 and is prone to an incorrect authorization vulnerability. A flaw is present in the application which fails to properly handle missing permissions check. Successful exploitation allows remote anonymous attackers to determine if a username is valid or not.

The host is installed with Atlassian Jira Server before 8.5.11, 8.6.0 before 8.13.3 and 8.14.0 before 8.15.0 and is prone to a cross site scripting vulnerability. A flaw is present in the application which fails to properly handle the ViewWorkflowSchemes.jspa and ListWorkflows.jspa endpoints. Successful exploitation allows remote attackers to inject arbitrary HTML or JavaScript.

The host is installed with Atlassian Jira Server before 8.13.2, 8.14.0 before 8.14.1 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to properly handle the issues in the mobile site view. Successful exploitation could allow unauthenticated remote attackers to view custom field and custom SLA names.

The host is installed with Atlassian Jira Server before 8.5.11, 8.6.0 before 8.13.3 and 8.14.0 before 8.15.0 and is prone to a cross site scripting vulnerability. A flaw is present in the application which fails to properly handle Custom Fields on Screens Modal. Successful exploitation could allow remote attackers to inject arbitrary html and javascript.

An information disclosure vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could obtain information that could be useful for further exploitation. To exploit the vulnerability, a user would have to open a specially crafted file. The security update addresses the vulnerability by correcting how Micr ...

The host is installed with Microsoft Windows Server 2003, Server 2008, Server 2008 R2, Server 2008 R2 IA64, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8 or Windows 8.1 and is prone to an information disclosure vulnerability. A flaw is present which exists when Windows fails to properly handle uninitialized memory when parsing certain, specially crafted PNG image format files. A ...

The host is installed with Microsoft Windows Server 2003, Server 2008, Server 2008 R2, Server 2008 R2 IA64, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8 or Windows 8.1 and is prone to an information disclosure vulnerability. A flaw is present in the Graphics Component, which fails to properly handle uninitialized memory when parsing certain, specially crafted TIFF image format ...

The host is installed with Microsoft Windows Server 2003, Server 2008, Server 2008 R2, Windows Vista, Windows 7, Server 2012, Server 2012 R2, Windows 8 or Windows 8.1 and is prone to an information disclosure vulnerability. A flaw is present in the Graphics Component, which improperly handles the decoding of JPEG images in memory. Successful exploitation allows attackers to use this information di ...

The host is installed with Microsoft Office 2010, 2007, Lync 2010, 2013, SP1, Lync Basic 2013, SP1 or Lync 2010 Attendee and is prone to remote code execution vulnerability. A flaw is present in the applications, which fail to properly validate specially crafted files. Successful exploitation allows attackers to run arbitrary code.


Pages:      Start    1729    1730    1731    1732    1733    1734    1735    1736    1737    1738    1739    1740    1741    1742    ..   2699

© SecPod Technologies