[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15249 Download | Alert*

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Centralized Thirdparty Jars (jackson-databind). Successful exploitation can cause unspecified impact.

The host is installed with samba version 4.x and is prone to a denial of service vulnerability. A flaw is present in samba which fails to handle character conversion at log level 3 or above. An unauthenticated attacker could use this flaw to cause samba to crash.

There is an issue in all samba 4.11.x versions before 4.11.5, all samba 4.10.x versions before 4.10.12 and all samba 4.9.x versions before 4.9.18, where the removal of the right to create or modify a subtree would not automatically be taken away on all domain controllers.

The host is installed with samba version 4.x and is prone to a denial of service vulnerability. A flaw is present in samba which fails to handle character conversion at log level 3 or above. An unauthenticated attacker could use this flaw to cause samba to crash.

The host is installed with samba version 4.x and is prone to a use after free vulnerability. A flaw is present in samba which fails to handle an issue in DNS zone scavenging. An unauthenticated attacker could read memory after it has been freed.

FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.

Netlogon RPC Elevation of Privilege Vulnerability.

The host is installed with kibana before 5.6.15 or 6.x before 6.6.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a issue in the timelion visualizer. Successful exploitation allows attackers to execute arbitrary commands with permissions of the kibana process on the host system.

The host is installed with kibana before 5.6.15 or 6.x before 6.6.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a issue in the timelion visualizer. Successful exploitation allows attackers to execute arbitrary commands with permissions of the kibana process on the host system.

The host is installed with Atlassian Jira Server before 8.13.15, or 8.14.0 before 8.20.3 and is prone to a remote code execution vulnerability. A flaw is present in the application which fails to properly handle the Email Templates feature. Successful exploitation could allow remote attackers with administrator privileges to execute arbitrary code.


Pages:      Start    974    975    976    977    978    979    980    981    982    983    984    985    986    987    ..   1524

© SecPod Technologies