[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254202

 
 

909

 
 

198060

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26428 Download | Alert*

The host is installed with Malwarebytes before 4.5.22.236 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the symbolic link. Successful exploitation could allow an attacker to delete any arbitrary file on the system by exploiting the local quarantine system.

The host is installed with Couchbase Server 2.x through 6.6.6, 7.x through 7.0.5 and 7.1.0 through 7.1.2 and is prone to a sensitive information disclosure vulnerability. A flaw is present in the application, which fails to redacte field messages from the logged validation messages. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.15, 8.5.x through 8.5.5.23 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in the Admin Console. Successful exploitation allows attackers to embed arbitrary JavaScript code in the Web UI thus altering the intended functiona ...

The host is installed with Citrix Workspace App before 2212, 2203 LTSR before CU2 or 1912 LTSR before CU7 Hotfix 2 and is prone to an improper access control vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. On successful exploitation, a malicious user can cause log files to be written to a directory that they do not have permission to write to.

The host is installed with Citrix Workspace App before 2212, 2203 LTSR before CU2 or 1912 LTSR before CU7 Hotfix 2 and is prone to an improper access control vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. On successful exploitation, privilege escalation on the system running a vulnerable version of Citrix Workspace app for Windows.

The host is installed with IrfanView 4.60 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to handle a issues in the PDF.dll plugin. Successful exploitation could allow attackers to execute arbitrary code via opening a crafted PDF file.

The host is installed with Visual Studio 2017 or 2019 or 2022 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attacker to gain the rights of the user that is running the affected application.

The host is installed with Atlassian Confluence Server 8.0.0 before 8.3.2 and is prone to a remote code execution vulnerability. A flaw is present in the application which fails to properly handle issue in unspecified vectors. Successful exploitation allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availab ...

The host is installed with Atlassian Bamboo CI server before 9.2.3 or 9.3.0 through 9.3.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle an issue in the unspecified vectors. Successful exploitation could allows an authenticated attacker to modify the actions taken by a system call.

The host is installed with Atlassian Confluence Server before 7.13.17, 7.14.0 before 7.19.9, or 7.20.0 before 8.2.2 and is prone to a broken access control vulnerability. A flaw is present in the application which fails to properly handle attatchments feature. Successful exploitation allows remote attackers who have read permissions to a page, but not write permissions, to upload attachments.


Pages:      Start    1656    1657    1658    1659    1660    1661    1662    1663    1664    1665    1666    1667    1668    1669    ..   2642

© SecPod Technologies