[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31252 Download | Alert*

The host is installed with LibreOffice 7.4.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in the crafted .ppt file. Successful exploitation allows a remote attacker to cause a denial of service.

The host is installed with Docker Desktop before 4.27.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an internal file descriptor leak issue in runc. Successful exploitation allows attackers to gain access to the host filesystem by causing a newly-spawned container process (from runc exec) to have a working directory i ...

The host is installed with Apache HTTP Server 2.4.20 through 2.4.43 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle logging statements made on the wrong connections. Successful exploitation could allow attackers to cause a denial of service attack by concurrent use of memory pools.

The host is installed with Apache HTTP Server 2.4.32 through 2.4.43s5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in mod_proxy_uwsgi. Successful exploitation could allow attackers to cause information disclosure and possibly remote code executions.

The host is installed with Apache HTTP Server 2.4.x through 2.4.37 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle the mod_session expiry time check issue. Successful exploitation could allow attackers to ignore session expiry time and gain access to the application.

Windows Remote Desktop Security Feature Bypass Vulnerability

The host is installed with PHP 8.1.x before 8.1.28, 8.2.x before 8.2.18, or 8.3.x before 8.3.5 and is prone to an improper encoding or escaping of output vulnerability. A flaw is present in the application, which fails to handle issues in proc_open. Successful exploitation allows an attacker to cause arbitrary code execution.

The host is installed with PHP 8.3.x before 8.3.5 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to handle issues in function mb_encode_mimeheader. Successful exploitation allows an attacker to cause a potential DoS attack.

The host is installed with PHP 8.1.x before 8.1.28, 8.2.x before 8.2.18, or 8.3.x before 8.3.5 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to handle issues in password verification via password_verify. Successful exploitation allows an attacker to compromise the victim's account.

The host is installed with Oracle Database Server 11.2.0.4, 12.1.0.2 or 12.2.0.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the Oracle SSL API issue. Successful exploitation allows unauthorized access to critical data or complete access to all Oracle SSL API accessible data.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   3125

© SecPod Technologies