[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31456 Download | Alert*

The host is installed with Atlassian Confluence Server before 7.4.17, 7.5.0 before 7.13.7, 7.14.0 before 7.14.3, 7.15.0 before 7.15.2, 7.16.0 before 7.16.4, 7.17.0 before 7.17.4 or 7.18.0 and is prone to a servlet filter bypass vulnerability. A flaw is present in the application which fails to properly handle servlet filter. Successful exploitation allows unauthenticated attackers to cause cross-o ...

The host is installed with Atlassian Confluence Server versions before 6.6.12, 6.7.0 before 6.12.3, 6.13.0 before 6.13.3 or 6.14.0 before 6.14.2 and is prone to a remote code execution vulnerability. A flaw is present in the application which fails to properly handle the widget connector macro. Successful exploitation allows attackers to achieve path traversal and remote code execution on a Conflu ...

The host is installed with Atlassian Confluence Server before version 7.0.5 or 7.1.0 before 7.1.1 and is prone to a DLL hijacking vulnerability. A flaw is present in the application which fails to properly handle the usage of Tomcat in Confluence. Successful exploitation allows local system attackers who have permission to write a dll file in a directory in the global path environmental variable v ...

The host is installed with Atlassian Confluence Server versions 2.x before 6.6.13, 6.7.0 before 6.12.4, 6.13.0 before 6.13.4 or 6.14.0 before 6.14.3 or 6.15.0 before 6.15.2 and is prone to a path traversal vulnerability. A flaw is present in the application which fails to properly handle the downloadallattachments resource. Successful exploitation allows attackers to achieve path traversal and rem ...

The host is installed with Atlassian Confluence Server before 7.4.5 or 7.5.x before 7.5.1 and is prone to an injection vulnerability. A flaw is present in the application which fails to properly handle the usage of custom user macros. Successful exploitation allows remote attackers with system administration permissions to bypass velocity template injection mitigations.

The host is installed with Atlassian Confluence Server before 7.5.2 and is prone to a cross-site scripting vulnerability. A flaw is present in the application which fails to properly handle the usage of user macro parameters. Successful exploitation allows remote attackers to inject arbitrary HTML or JavaScript.

The host is installed with WebSphere Application Server Network Deployment 7.0.x through 7.0.0.25 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issues in validation of input in the administrative console. Successful exploitation could allows attacker to obtain sensitive information.

The host is installed with WebSphere Application Server Network Deployment 7.0.x through 7.0.0.29 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in an unspecified impact. Successful exploitation could allow a remote attacker to obtain sensitive information when the WebSphere Application Server is configured to us ...

The host is installed with Ruby on Rails before 3.0.14, 3.1.x before 3.1.6 or 3.2.x before 3.2.6 and is prone to SQL-injection vulnerability. A flaw is present in the application, which fails to properly implement the passing of request data to a where method in an ActiveRecord class. Successful exploitation allows attackers to compromise the application, access or modify data, or exploit latent v ...

Skype for Business and Lync Remote Code Execution Vulnerability


Pages:      Start    2082    2083    2084    2085    2086    2087    2088    2089    2090    2091    2092    2093    2094    2095    ..   3145

© SecPod Technologies