[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26616 Download | Alert*

The host is installed with WSO2 API Manager version 2.1.0 or 2.6.0 and is prone to a reflected cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle the carbon part of the product. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with WSO2 API Manager version 2.1.0 or 2.6.0 and is prone to a cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle the store part of the product. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with OpenVPN through 2.4.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in control channel. Successful exploitation could allow remote attackers to cause a denial of service via crafted reset packet.

The host is installed with VMWare Tools 10.x, 11.x or 12.x before 12.1.5 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an issue in the VM3DMP driver. Successfull exploitation allows attackers with local user privileges in the Windows guest OS, where VMware Tools is installed to trigger a PANIC in the VM3DMP driver leading to ...

The host is installed with Cacti 1.2.21 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle a crafted POST request to graphs_new.php. Successful exploitation allows an attacker to improperly neutralize the input during web page generation.

The host is installed with Apache Couchdb versions equals 3.0.0 and is prone to a missing authentication for critical function vulnerability. A flaw is present in the applications which fails to properly handle the off-by-default setting. Successful exploitation allow remote attackers to cause unspecified impact.

The host is installed with Telegram Desktop through 2.0.1 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle punycode in a public url. Successful exploitation allows attackers to cause an IDN Homograph attack.

The host is installed with Irfanview 4.57 and is prone to a buffer overflow vulnerability. A flaw is present in the applications which fails to properly handle a crafted wpg file. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Irfanview 4.57 and is prone to a buffer overflow vulnerability. A flaw is present in the applications which fails to properly handle a crafted RLE file. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Irfanview 4.57 and is prone to a denial of service vulnerability. A flaw is present in the applications which fails to properly handle a crafted BMP file. Successful exploitation allows attackers to denial of service.


Pages:      Start    1676    1677    1678    1679    1680    1681    1682    1683    1684    1685    1686    1687    1688    1689    ..   2661

© SecPod Technologies