[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26186 Download | Alert*

The host is installed with Cisco AnyConnect Secure Mobility Client before 4.9.06037 is prone to a windows upgrade DLL hijacking vulnerability. A flaw is present in the application which fails to handle a temporary file with insecure permissions that is created during the upgrade process. Successful exploitation could allows attackers to execute arbitrary code on the affected device with SYSTEM pri ...

The host is installed with Cisco AnyConnect Secure Mobility Client before 4.10.00093 is prone to a windows upgrade executable hijacking vulnerability. A flaw is present in the application which fails to handle a temporary file with insecure permissions that is created during the upgrade process. Successful exploitation could allows attackers to execute arbitrary code on an affected device with SYS ...

The host is installed with Cisco AnyConnect Secure Mobility Client before 4.9.03022 is prone to a windows install executable hijacking vulnerability. A flaw is present in the application which fails to loads an executable file from a user-writable directory. Successful exploitation could allows attackers to execute arbitrary code on the affected device with SYSTEM privileges.

The host is installed with Cisco AnyConnect Secure Mobility Client before 4.10.00093 is prone to an improper input validation vulnerability. A flaw is present in the application which fails to handle a crafted IPC message sent to the AnyConnect process. Successful exploitation could allows attackers to overwrite VPN profiles on an affected device.

The host is installed with PostgreSQL 9.6.x before 9.6.22, 10.x before 10.17, 11.x before 11.12, 12.x before 12.7 or 13.x before 13.3 and is prone to an integer overflow vulnerability. A flaw is present in the application which fails to handle bounds checks issue while modifying certain SQL array values. Successful exploitation allows attackers to make the authenticated database users write arbitr ...

The host is installed with Apache HTTP Server 2.4.6 through 2.4.46 and is prone to a HTTP request smuggling vulnerability. A flaw is present in the application, which fails to properly handle an issue in mod_proxy_wstunnel. Successful exploitation could allow attackers to cause subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possi ...

The host is installed with Apache HTTP Server 2.4.0 through 2.4.46 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle insufficient privileges. Successful exploitation could allow unprivileged attackers to stop httpd.

The host is installed with Apache HTTP Server 2.4.41 through 2.4.46 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle specially crafted requests using both Content-Length and Transfer-Encoding headers. Successful exploitation could allow unprivileged attackers to cause mod_proxy_http to crash, leading to a denial of servi ...

Apache HTTP Server 2.4.39 to 2.4.46: Unexpected URL matching with MergeSlashes OFF.

The host is installed with Apache HTTP Server 2.4.6 through 2.4.46 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle an issue in the HTTP/2 protocol handler. Successful exploitation could allow attackers to cause denial of service on the server.


Pages:      Start    1543    1544    1545    1546    1547    1548    1549    1550    1551    1552    1553    1554    1555    1556    ..   2618

© SecPod Technologies