[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 1214 Download | Alert*

Umbraco workflow provides workflows for the Umbraco content management system. Prior to versions 10.3.9, 12.2.6, and 13.0.6, an Umbraco Backoffice user can modify requests to a particular API endpoint to include SQL, which will be executed by the server. Umbraco Workflow versions 10.3.9, 12.2.6, 13.0.6, as well as Umbraco Plumber version 10.1.2, contain a patch for this issue.

Cross-Site Request Forgery (CSRF) vulnerability in AlumniOnline Web Services LLC WP ADA Compliance Check Basic.This issue affects WP ADA Compliance Check Basic: from n/a through 3.1.3.

Cross-Site Request Forgery (CSRF) vulnerability in Giorgos Sarigiannidis Slash Admin allows Cross-Site Scripting (XSS).This issue affects Slash Admin: from n/a through 3.8.1.

A vulnerability classified as critical has been found in Tenda TX9 22.03.02.10. This affects the function sub_42CB94 of the file /goform/SetVirtualServerCfg. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-2 ...

A vulnerability classified as critical was found in Tenda TX9 22.03.02.10. This vulnerability affects the function sub_42D4DC of the file /goform/SetSysTimeCfg. The manipulation of the argument time leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261856. NOTE: The v ...

A vulnerability, which was classified as critical, has been found in Tenda TX9 22.03.02.10. This issue affects the function sub_42C014 of the file /goform/PowerSaveSet. The manipulation of the argument time leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261857 was assigned to this vulnerab ...

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.19, 8.5.x through 8.5.5.25 and is prone to an use of a broken or risky cryptographic algorithm vulnerability. A flaw is present in the application, which fails to properly handle an issue in the outbound TLS connections. Successful exploitation allows attackers to have unspecified impact.

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.19, 8.5.x through 8.5.5.25 and is prone to a server-side request forgery vulnerability. A flaw is present in the application, which fails to properly handle an issue in the crafted requests. Successful exploitation allows attackers to have unspecified impact.

The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.19, 8.5.x through 8.5.5.25 and is prone to a XML External Entity (XXE) injection vulnerability. A flaw is present in the application, which fails to properly handle an issue in the processing XML data. Successful exploitation could leads to expose sensitive information, consume memory resources, or to cond ...

The host is installed with VideoLAN VLC media player through 3.0.20 and is prone to an integer underflow vulnerability. A flaw is present in the application, which fails to properly handle issues in incorrect offset read. Successful exploitation could leads to an incorrect packet length.


Pages:      Start    9    10    11    12    13    14    15    16    17    18    19    20    21    22    ..   121

© SecPod Technologies