[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26616 Download | Alert*

The host is installed with Keepass 2.48 and is prone to exposure of sensitive information to an unauthorized actor vulnerability. A flaw is present in the application, which fails to properly handle logging the plain text passwords in system log. Successful exploitation allows attackers to interact and read sensitive passwords and logs.

The host is installed with Atlassian Jira Server before 8.13.15, or 8.14.0 before 8.20.3 and is prone to a remote code execution vulnerability. A flaw is present in the application which fails to properly handle the Email Templates feature. Successful exploitation could allow remote attackers with administrator privileges to execute arbitrary code.

The host is installed with Atlassian Jira Server before 8.20.3 and is prone to a stored cross-site scripting (xss) vulnerability. A flaw is present in the application which fails to properly handle the /rest/collectors/1.0/template/custom endpoint. Successful exploitation could allow remote attackers to inject arbitrary html or JavaScript by tricking a user into visiting a malicious website.

The host is installed with Atlassian Jira Server before 8.13.15, or 8.14.0 before 8.20.3 and is prone to a reflected cross-site scripting (xss) vulnerability. A flaw is present in the application which fails to properly handle the /rest/collectors/1.0/template/custom endpoint. Successful exploitation could allow remote attackers to inject arbitrary html or JavaScript by tricking a user into visiti ...

The host is installed with Atlassian Jira Server before 8.6.0, 8.7.0 before 8.13.12, or 8.14.0 before 8.20.1 and is prone to an improper authorization vulnerability. A flaw is present in the application which fails to properly handle an issue in the 'ReplicationSettings!default.jspa' endpoint. Successful exploitation could allow authenticated yet non-administrator remote attackers to edit the File ...

The host is installed with Atlassian Jira Server before 8.13.12, or 8.14.0 before 8.20.2 and is prone to a cross-site scripting vulnerability. A flaw is present in the application which fails to properly handle the /secure/admin/ImporterFinishedPage.jspa error message. Successful exploitation could allow remote attackers to inject arbitrary html or JavaScript via a Cross-Site Scripting (XSS) vulne ...

The host is installed with Cisco Jabber version 10.0 and is prone to a cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle executing arbitrary javascript. Successful exploitation allow remote attackers to conduct a cross-site scripting (xss) attack and access sensitive client-based information.

The host is installed with Cisco Jabber version 11.9 and is prone to a cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle embedding media in instant messages. Successful exploitation allow remote attackers to conduct a cross-site scripting (xss) attack.

The host is installed with Cisco Jabber version 11.9 and is prone to a cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle executing arbitrary javascript. Successful exploitation allow remote attackers to conduct a cross-site scripting (xss) attack and perform remote code execution.

The host is installed with Microsoft Teams before 1.3.00.362 and is prone to an application directory DLL planting vulnerability. A flaw is present in the application, which fails to properly handle an issue with the DLL search path. Successful exploitation allows the attackers to execute arbitrary code in the context of the currently logged-in user.


Pages:      Start    1680    1681    1682    1683    1684    1685    1686    1687    1688    1689    1690    1691    1692    1693    ..   2661

© SecPod Technologies