[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15151 Download | Alert*

The Gentoo net-im/jabberd2 package through 2.6.1 sets the ownership of /var/run/jabber to the jabber account, which might allow local users to kill arbitrary processes by leveraging access to this account for PID file modification before a root script executes a "kill -TERM `cat /var/run/jabber/filename.pid`" command.

Doorkeeper version 4.2.0 and later contains a Incorrect Access Control vulnerability in Token revocation API"s authorized method that can result in Access tokens are not revoked for public OAuth apps, leaking access until expiry.

shadow 4.8, in certain circumstances affecting at least Gentoo, Arch Linux, and Void Linux, allows local users to obtain root access because setuid programs are misconfigured. Specifically, this affects shadow 4.8 when compiled using --with-libpam but without explicitly passing --disable-account-tools-setuid, and without a PAM configuration suitable for use with setuid account management tools. Th ...

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle issues related to Application Container - JavaEE. Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle issues related to WLS Core Components. Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle issues related to EJB Container. Successful exploitation can cause unspecified impact.

The host is installed with IBM DB2 11.5 before 11.5.6 and is prone to an arbitrary file write vulnerability. A flaw is present in the application which fails to handle improper group permissions. Successful exploitation could allow an authenticated user to overwrite arbitrary files.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle issues related to Web Services. Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle issues related to Web Services. Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server 10.3.6.0, 12.1.3.0 or 12.2.1.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle issues related to Web Services. Successful exploitation can cause unspecified impact.


Pages:      Start    1487    1488    1489    1490    1491    1492    1493    1494    1495    1496    1497    1498    1499    1500    ..   1515

© SecPod Technologies