[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26443 Download | Alert*

The host is installed with Docker before 19.03.9 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to handle an issue in util/binfmt_misc/check.go in Builder. Successful exploitation could allow attackers to access arbitrary directories.

The host is installed with Microsoft Windows Server 2003 SP2, Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, 8.1, Server 2012 or Server 2012 R2 and is prone to a security feature bypass vulnerability. A flaw is present in the application, which fails to properly validate and enforce impersonation levels. An attacker could exploit this vulnerability by convincing a user t ...

The host is installed with PostgreSQL 11.x before 11.3 and is prone to an information disclosure vulnerability. A flaw is present in the application fails to handle a purpose-crafted insert to a partitioned table. Successful exploitation allows attackers to read arbitrary bytes of server memory.

The host is installed with PostgreSQL 9.6.x before 9.6.22, 10.x before 10.17, 11.x before 11.12, 12.x before 12.7 or 13.x before 13.3 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to handle the INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table. Successful exploitation allows attackers to make an authenticated databas ...

The host is installed with PostgreSQL 11.x before 11.12, 12.x before 12.7 or 13.x before 13.3 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to handle the UPDATE ... RETURNING command on a purpose-crafted table. Successful exploitation allows attackers to make an authenticated database user to read arbitrary bytes of server memory.

The host is installed with PostgreSQL 11.x before 11.11, 12.x before 12.6 or 13.x before 13.2 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to handle a user having UPDATE permission but not SELECT permission. Successful exploitation allows attackers to obtain information stored in a column they are allowed to write but not read.

The host is installed with Apache Tomcat 10.0.0-M1 through 10.0.5, 9.0.0.M1 through 9.0.45 ,8.5.0 through 8.5.65 or 7.0.0 through 7.0.108 and is prone to an improperauthentication vulnerability. A flaw is present in application, which fails to properly handle issues in JNDI Realm of Apache Tomcat. Successful exploitation could allow an attacker to authenticate using variations of a valid user name ...

The host is installed with Apache Log4j 2.0.x through 2.15.0 (excluding security releases 2.3.1, 2.12.2 and 2.12.3) and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle issue in the logging configuration when it uses a non-default Pattern Layout with a Context Lookup. Successful exploitation could allow attackers with control o ...

The host is installed with Apache Log4j 2.0.x through 2.16.0 (excluding security releases 2.3.1 and 2.12.3) and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issue in the logging configuration when it uses a non-default Pattern Layout with a Context Lookup. Successful exploitation could allow attackers to craft malicious input d ...

The host is installed with PostgreSQL 11.x before 11.13, 12.x before 12.8 or 13.x before 13.4 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to handle a purpose-crafted query. Successful exploitation allows attackers to read arbitrary bytes of server memory.


Pages:      Start    1566    1567    1568    1569    1570    1571    1572    1573    1574    1575    1576    1577    1578    1579    ..   2644

© SecPod Technologies