[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31394 Download | Alert*

The host is installed with Atlassian Confluence Server versions before 6.6.12, 6.7.0 before 6.12.3, 6.13.0 before 6.13.3 or 6.14.0 before 6.14.2 and is prone to a remote code execution vulnerability. A flaw is present in the application which fails to properly handle the widget connector macro. Successful exploitation allows attackers to achieve path traversal and remote code execution on a Conflu ...

The host is installed with Atlassian Confluence Server before version 7.0.5 or 7.1.0 before 7.1.1 and is prone to a DLL hijacking vulnerability. A flaw is present in the application which fails to properly handle the usage of Tomcat in Confluence. Successful exploitation allows local system attackers who have permission to write a dll file in a directory in the global path environmental variable v ...

The host is installed with Atlassian Confluence Server versions 2.x before 6.6.13, 6.7.0 before 6.12.4, 6.13.0 before 6.13.4 or 6.14.0 before 6.14.3 or 6.15.0 before 6.15.2 and is prone to a path traversal vulnerability. A flaw is present in the application which fails to properly handle the downloadallattachments resource. Successful exploitation allows attackers to achieve path traversal and rem ...

The host is installed with Atlassian Confluence Server before 7.4.5 or 7.5.x before 7.5.1 and is prone to an injection vulnerability. A flaw is present in the application which fails to properly handle the usage of custom user macros. Successful exploitation allows remote attackers with system administration permissions to bypass velocity template injection mitigations.

The host is installed with Atlassian Confluence Server before 7.5.2 and is prone to a cross-site scripting vulnerability. A flaw is present in the application which fails to properly handle the usage of user macro parameters. Successful exploitation allows remote attackers to inject arbitrary HTML or JavaScript.

The host is installed with WebSphere Application Server Network Deployment 7.0.x through 7.0.0.25 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issues in validation of input in the administrative console. Successful exploitation could allows attacker to obtain sensitive information.

The host is installed with WebSphere Application Server Network Deployment 7.0.x through 7.0.0.29 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in an unspecified impact. Successful exploitation could allow a remote attacker to obtain sensitive information when the WebSphere Application Server is configured to us ...

The host is installed with IBM MQ 8.0.0.0 through 8.0.0.10 or 9.0.0 through 9.0.0.5 or 9.1.0.0 through 9.1.0.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the TLS key renegotiation functions. Successful exploitation could allow an attacker to execute a denial of service attack against an IBM MQ queue manager.

The host is installed with IBM MQ 8.0.0.0 through 8.0.0.11 or 9.0.0 through 9.0.0.5 or 9.1.0.0 through 9.1.0.1 and is prone to a code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow a local non privileged user to execute code as an administrator due to incorrect permissions set on MQ installation director ...

The host is installed with IBM MQ 8.0.0.0 through 8.0.0.10 or 9.0.0 through 9.0.0.5 or 9.1.0.0 through 9.1.0.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow an authenticated attacker to escalate their privileges when using multiplexed channels.


Pages:      Start    2061    2062    2063    2064    2065    2066    2067    2068    2069    2070    2071    2072    2073    2074    ..   3139

© SecPod Technologies