The host is installed with Atlassian Jira Server before 8.6.0, 8.7.0 before 8.13.12, or 8.14.0 before 8.20.1 and is prone to an improper authorization vulnerability. A flaw is present in the application which fails to properly handle an issue in the 'ReplicationSettings!default.jspa' endpoint. Successful exploitation could allow authenticated yet non-administrator remote attackers to edit the File ...
The host is installed with Atlassian Jira Server before 8.13.12, or 8.14.0 before 8.20.2 and is prone to a cross-site scripting vulnerability. A flaw is present in the application which fails to properly handle the /secure/admin/ImporterFinishedPage.jspa error message. Successful exploitation could allow remote attackers to inject arbitrary html or JavaScript via a Cross-Site Scripting (XSS) vulne ...
The host is installed with Cisco Jabber version 10.0 and is prone to a cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle executing arbitrary javascript. Successful exploitation allow remote attackers to conduct a cross-site scripting (xss) attack and access sensitive client-based information.
The host is installed with Cisco Jabber version 11.9 and is prone to a cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle embedding media in instant messages. Successful exploitation allow remote attackers to conduct a cross-site scripting (xss) attack.
The host is installed with Cisco Jabber version 11.9 and is prone to a cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle executing arbitrary javascript. Successful exploitation allow remote attackers to conduct a cross-site scripting (xss) attack and perform remote code execution.
The host is installed with Microsoft Teams before 1.3.00.362 and is prone to an application directory DLL planting vulnerability. A flaw is present in the application, which fails to properly handle an issue with the DLL search path. Successful exploitation allows the attackers to execute arbitrary code in the context of the currently logged-in user.
The host is installed with ActivePresenter 6.1.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an unknown vector. Successful exploitation may result in a denial of service (DoS) or arbitrary code execution.
The host is installed with XnView Classic version 2.40 and is prone to a remote code execution vulnerability. A flaw is present in the applications which fails to properly handle a crafted .bie file. Successful exploitation allows remote attackers to execute code.
The host is installed with XnView Classic version 2.40 and is prone to a denial of service vulnerability. A flaw is present in the applications which fails to properly handle a crafted .fpx file. Successful exploitation allows attackers to cause denial of service and other unspecified impact.
The host is installed with XnView Classic version 2.40 and is prone to a denial of service vulnerability. A flaw is present in the applications which fails to properly handle a crafted .fpx file. Successful exploitation allows attackers to cause denial of service and other unspecified impact.