[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31188 Download | Alert*

The host is installed with Atlassian Jira Server before 8.13.15, or 8.14.0 before 8.20.3 and is prone to a reflected cross-site scripting (xss) vulnerability. A flaw is present in the application which fails to properly handle the /rest/collectors/1.0/template/custom endpoint. Successful exploitation could allow remote attackers to inject arbitrary html or JavaScript by tricking a user into visiti ...

The host is installed with Atlassian Jira Server before 8.6.0, 8.7.0 before 8.13.12, or 8.14.0 before 8.20.1 and is prone to an improper authorization vulnerability. A flaw is present in the application which fails to properly handle an issue in the 'ReplicationSettings!default.jspa' endpoint. Successful exploitation could allow authenticated yet non-administrator remote attackers to edit the File ...

The host is installed with Atlassian Jira Server before 8.13.12, or 8.14.0 before 8.20.2 and is prone to a cross-site scripting vulnerability. A flaw is present in the application which fails to properly handle the /secure/admin/ImporterFinishedPage.jspa error message. Successful exploitation could allow remote attackers to inject arbitrary html or JavaScript via a Cross-Site Scripting (XSS) vulne ...

The host is installed with Cisco Jabber version 10.0 and is prone to a cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle executing arbitrary javascript. Successful exploitation allow remote attackers to conduct a cross-site scripting (xss) attack and access sensitive client-based information.

The host is installed with Cisco Jabber version 11.9 and is prone to a cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle embedding media in instant messages. Successful exploitation allow remote attackers to conduct a cross-site scripting (xss) attack.

The host is installed with Cisco Jabber version 11.9 and is prone to a cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle executing arbitrary javascript. Successful exploitation allow remote attackers to conduct a cross-site scripting (xss) attack and perform remote code execution.

The host is installed with Microsoft Teams before 1.3.00.362 and is prone to an application directory DLL planting vulnerability. A flaw is present in the application, which fails to properly handle an issue with the DLL search path. Successful exploitation allows the attackers to execute arbitrary code in the context of the currently logged-in user.

The host is installed with ActivePresenter 6.1.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an unknown vector. Successful exploitation may result in a denial of service (DoS) or arbitrary code execution.

The host is installed with XnView Classic version 2.40 and is prone to a remote code execution vulnerability. A flaw is present in the applications which fails to properly handle a crafted .bie file. Successful exploitation allows remote attackers to execute code.

The host is installed with XnView Classic version 2.40 and is prone to a denial of service vulnerability. A flaw is present in the applications which fails to properly handle a crafted .fpx file. Successful exploitation allows attackers to cause denial of service and other unspecified impact.


Pages:      Start    1942    1943    1944    1945    1946    1947    1948    1949    1950    1951    1952    1953    1954    1955    ..   3118

© SecPod Technologies