[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196303 Download | Alert*

The host is installed with Adobe ColdFusion 2021 before update 12 or 2023 before update 6 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could leads to arbitrary code execution.

The host is installed with Adobe ColdFusion 2021 before update 12 or 2023 before update 6 and is prone to deserialization of untrusted data. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could leads to arbitrary code execution.

The host is installed with Adobe ColdFusion 2021 before update 12 or 2023 before update 6 and is prone to deserialization of untrusted data. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could leads to arbitrary code execution.

The host is installed with Adobe ColdFusion 2021 before update 12 or 2023 before update 6 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could leads to arbitrary code execution.

The host is missing an critical security update according to Adobe security bulletin, APSB23-52. The update is required to fix multiple vulnerabilities. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could lead to security feature bypass or arbitrary code execution.

The host is installed with Apache Tomcat 7.x through 7.0.105 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not properly handle issues in partial HTTP requests. Successful exploitation allows attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris.

The Plexus project provides a full software stack for creating and executing software projects. Based on the Plexus container, the applications can utilise component-oriented programming to build modular, reusable components that can easily be assembled and reused. The plexus-archiver component provides functions to create and extract archives. Security Fix(es): * plexus-archiver: Arbitrary File C ...

Updates available for Inkscape.

Several remote vulnerabilities have been discovered in the Wireshark network traffic analyzer, which may lead to the execution of arbitrary code or denial of service. The Common Vulnerabilities and Exposures project identifies the following problems: A NULL pointer dereference was found in the RADIUS dissector. A NULL pointer dereference was found in the DCERP/NT dissector. An integer overflow was ...

Vulnerabilities have been discovered and corrected in wireshark, affecting DCERPC/NT dissector, which allows remote attackers to cause a denial of service via a file that records a malformed packet trace ; and in wiretap/erf.c which allows remote attackers to execute arbitrary code or cause a denial of service via a crafted erf file . The wireshark package has been updated to fix these vulnerabi ...


Pages:      Start    8534    8535    8536    8537    8538    8539    8540    8541    8542    8543    8544    8545    8546    8547    ..   19630

© SecPod Technologies