[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26186 Download | Alert*

The host is installed with PostgreSQL 11.x before 11.12, 12.x before 12.7 or 13.x before 13.3 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to handle the UPDATE ... RETURNING command on a purpose-crafted table. Successful exploitation allows attackers to make an authenticated database user to read arbitrary bytes of server memory.

The host is installed with PostgreSQL 11.x before 11.11, 12.x before 12.6 or 13.x before 13.2 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to handle a user having UPDATE permission but not SELECT permission. Successful exploitation allows attackers to obtain information stored in a column they are allowed to write but not read.

The host is installed with Apache Tomcat 10.0.0-M1 through 10.0.5, 9.0.0.M1 through 9.0.45 ,8.5.0 through 8.5.65 or 7.0.0 through 7.0.108 and is prone to an improperauthentication vulnerability. A flaw is present in application, which fails to properly handle issues in JNDI Realm of Apache Tomcat. Successful exploitation could allow an attacker to authenticate using variations of a valid user name ...

The host is installed with Apache Log4j 2.0.x through 2.15.0 (excluding security releases 2.3.1, 2.12.2 and 2.12.3) and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle issue in the logging configuration when it uses a non-default Pattern Layout with a Context Lookup. Successful exploitation could allow attackers with control o ...

The host is installed with Apache Log4j 2.0.x through 2.16.0 (excluding security releases 2.3.1 and 2.12.3) and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issue in the logging configuration when it uses a non-default Pattern Layout with a Context Lookup. Successful exploitation could allow attackers to craft malicious input d ...

The host is installed with PostgreSQL 11.x before 11.13, 12.x before 12.8 or 13.x before 13.4 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to handle a purpose-crafted query. Successful exploitation allows attackers to read arbitrary bytes of server memory.

The host is installed with Avast Antivirus 19.3.3084 and is prone to a cross site scripting vulnerability. A flaw exists in the application. which fails to handle unspecified vector. Successful exploitation allows attackers to execute JavaScript code via an SSID Name.

The host is installed with VideoLAN VLC Media Player before 0.8.6f and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted MP4 file. Successful exploitation allows attackers to cause a denial of service.

The host is installed with OpenSSL 0.9.8f or 0.9.8g and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a TLS handshake that omits the Server Key Exchange message and uses "particular cipher suites," which triggers a NULL pointer dereference. Successful exploitation could allow remote attackers to cause a denial of service (crash).

The host is installed with OpenSSL 0.9.8i and earlier and is prone to signature verification vulnerability. A flaw is present in the application, which does not properly check the return value from the EVP_VerifyFinal function. Successful exploitation could allow remote attackers to bypass validation of the certificate chain.


Pages:      Start    1605    1606    1607    1608    1609    1610    1611    1612    1613    1614    1615    1616    1617    1618    ..   2618

© SecPod Technologies