[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26831 Download | Alert*

The host is installed with Apache Commons JXPath through 1.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to interpret XPath. Successful exploitation allows attackers to supply content that causes the parser to crash by stackoverflow.

The host is installed with Grails framework 3.3.10 before 3.3.15, 4.x before 4.1.1, 5.x before 5.1.9 or 5.2.0 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle a Grails data-binding logic issue. Successful exploitation could allows attackers to remotely execute code within a Grails application runtime by issuing a specially ...

The host is installed with SpringSource Spring Framework before 5.2.20 or 5.3.0 before 5.3.18 and is prone to a remote code execution (Spring4Shell) vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted request to a vulnerable server. Successful exploitation could allows an unauthenticated attacker to execute arbitrary code on the target system.

The host is installed with SpringSource Spring Framework 2.5.x before 2.5.6, 2.5.7 or 3.0.x before 3.0.3 and is prone to an arbitrary execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted .jar file. Successful exploitation could allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed ...

The host is installed with Apache Jena through 4.1.0 and is prone to an XML external entity (XXE) vulnerability. A flaw is present in the application, which fails to properly handle an XML processing issue. Successful exploitation could allow attackers to execute XML External Entities (XXE), including exposing the contents of local files to a remote server.

The host is installed with Apache Cassandra 3.0.x before 3.0.26, 3.11.x before 3.11.12 or 4.0.x before 4.0.2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle configuration of user defined functions. Successful exploitation allows attacker to execute arbitrary code on the host.

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.13, 8.5.x through 8.5.5.22, 8.0.x through 8.0.0.15 or 7.0.x through 7.0.0.45 and is prone to a server-side request forgery vulnerability. A flaw is present in the application, which fails to HTTP request. Successful exploitation allow attackers to obtain sensitive data.

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.14, 8.5.x through 8.5.5.23, 8.0.x through 8.0.0.15 or 7.0.x through 7.0.0.45 and is prone to a SOAPAction spoofing vulnerability. A flaw is present in the application, which fails to handle JAX-WS Web Services requests. Successful exploitation allow a man-in-the-middle attacker to conduct SOAPAction spoofi ...

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.11, 8.5.x through 8.5.5.21, 8.0.x through 8.0.0.15 or 7.0.x through 7.0.0.45 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle an issue in the Dojo library used by IBM WebSphere Application Server traditional in the Admin Console. Successful ...

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.15, 8.5.x through 8.5.5.23, 8.0.x through 8.0.0.15 or 7.0.x through 7.0.0.45 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle Web Server Plug-ins for IBM WebSphere Application Server. Successful exploitation allows attackers to obtain sensitive data.


Pages:      Start    1792    1793    1794    1795    1796    1797    1798    1799    1800    1801    1802    1803    1804    1805    ..   2683

© SecPod Technologies