[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 10958 Download | Alert*

The host is installed with hivex before 1.3.11 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a small hive files, which triggers an out-of-bounds read or write. Successful exploitation allows local users to execute arbitrary code and gain privileges.

The host is installed with Google Chrome before 19.0.1084.46 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly mitigate an unspecified flaw in an NVIDIA driver. Successful exploitation has unknown impact and attack vectors.

The host is installed with Google Chrome before 19.0.1084.46 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly mitigate an unspecified flaw in an NVIDIA driver. Successful exploitation has unknown impact and attack vectors.

The host is installed with Atlassian Jira Server before 8.5.14, 8.6.0 before 8.13.6 or 8.14.0 before 8.16.1 and is prone to a cross-site scripting vulnerability. A flaw is present in the application which fails to properly handle an issue in the EditWorkflowScheme.jspa component. Successful exploitation could allow attackers to inject arbitrary HTML or JavaScript.

The host is installed with Atlassian Jira Server before 7.13.16, 8.0.0 before 8.5.7, 8.6.0 before 8.9.2 or 8.10.0 before 8.10.1 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to properly handle an issue in the Administration Permission Helper. Successful exploitation could allow remote attackers to view titles of a private project via an I ...

The host is installed with Atlassian Jira Server before 8.7.0 and is prone to a cross site scripting vulnerability. A flaw is present in the application which fails to properly handle an issues in the tomcat. Successful exploitation could allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the Add Field module.

The host is installed with Atlassian Jira Server before before before 8.5.5 or 8.6.0 before 8.7.2 and is prone to a DLL hijacking vulnerability. A flaw is present in the application which fails to properly handle an issues in the tomcat. Successful exploitation could allow remote attackers to to execute arbitrary code via a DLL hijacking vulnerability in Tomcat.

The host is installed with Atlassian Jira Server before 7.13.17, 7.14.0 before 8.5.8 or 8.6.0 before 8.12.0 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to properly handle an issue in the /browse.PROJECTKEY endpoint. Successful exploitation could allow remote attackers to enumerate project keys.

The host is installed with Atlassian Jira Server before 8.5.8 or 8.6.0 before 8.11.1 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to properly handle an issue in the /secure/QueryComponent!Default.jspa endpoint. Successful exploitation could allow unauthenticated attackers to view custom field names and custom SLA names.

The host is installed with Atlassian Jira Server before 7.13.18, 8.0.0 before 8.5.9 or 8.6.0 before 8.12.2 and is prone to an improper authentication vulnerability. A flaw is present in the application which fails to properly handle an issue in the permissions checks. Successful exploitation could allow remote unauthenticated attackers to enumerate issue keys via a missing permissions check in the ...


Pages:      Start    655    656    657    658    659    660    661    662    663    664    665    666    667    668    ..   1095

© SecPod Technologies