[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26713 Download | Alert*

The host is installed with Irfanview 4.54 and is prone to a denial of service vulnerability. A flaw is present in the applications which fails to properly handle a crafted .cr2 file. Successful exploitation allows attackers to cause denial of service and other unspecified impacts.

The host is installed with Irfanview 4.54 and is prone to a denial of service vulnerability. A flaw is present in the applications which fails to properly handle a crafted xbm file. Successful exploitation allows attackers to cause denial of service and other unspecified impacts.

The host is installed with Irfanview 4.54 and is prone to a write access violation vulnerability. A flaw is present in the applications which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to cause user mode write access violations.

The host is installed with Irfanview 4.54 and is prone to a write access violation vulnerability. A flaw is present in the applications which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to cause user mode write access violations.

The host is installed with Irfanview 4.54 and is prone to a write access violation vulnerability. A flaw is present in the applications which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to cause user mode write access violations.

The host is installed with Papercut NG before 18.3.6 and is prone to a script injection vulnerability. A flaw is present in the applications which fails to properly handle user interface, aka PC-15163. Successful exploitation allow remote attackers to cause script injection.

The host is installed with Papercut NG through 18.3.8 or Papercut NG 19.0.1 through 19.0.3 and is prone to a unspecified vulnerability vulnerability. A flaw is present in the applications which fails to properly handle unspecified vectors. Successful exploitation could allow a remote attackers to execute arbitrary code.

The host is installed with Keepass 2.48 and is prone to exposure of sensitive information to an unauthorized actor vulnerability. A flaw is present in the application, which fails to properly handle logging the plain text passwords in system log. Successful exploitation allows attackers to interact and read sensitive passwords and logs.

The host is installed with Atlassian Jira Server before 8.13.15, or 8.14.0 before 8.20.3 and is prone to a remote code execution vulnerability. A flaw is present in the application which fails to properly handle the Email Templates feature. Successful exploitation could allow remote attackers with administrator privileges to execute arbitrary code.

The host is installed with Atlassian Jira Server before 8.20.3 and is prone to a stored cross-site scripting (xss) vulnerability. A flaw is present in the application which fails to properly handle the /rest/collectors/1.0/template/custom endpoint. Successful exploitation could allow remote attackers to inject arbitrary html or JavaScript by tricking a user into visiting a malicious website.


Pages:      Start    1690    1691    1692    1693    1694    1695    1696    1697    1698    1699    1700    1701    1702    1703    ..   2671

© SecPod Technologies