[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26803 Download | Alert*

The host is installed with Atlassian Jira Server before 8.6.0, 8.7.0 before 8.13.12, or 8.14.0 before 8.20.1 and is prone to an improper authorization vulnerability. A flaw is present in the application which fails to properly handle an issue in the 'ReplicationSettings!default.jspa' endpoint. Successful exploitation could allow authenticated yet non-administrator remote attackers to edit the File ...

The host is installed with Atlassian Jira Server before 8.13.12, or 8.14.0 before 8.20.2 and is prone to a cross-site scripting vulnerability. A flaw is present in the application which fails to properly handle the /secure/admin/ImporterFinishedPage.jspa error message. Successful exploitation could allow remote attackers to inject arbitrary html or JavaScript via a Cross-Site Scripting (XSS) vulne ...

The host is installed with Cisco Jabber version 10.0 and is prone to a cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle executing arbitrary javascript. Successful exploitation allow remote attackers to conduct a cross-site scripting (xss) attack and access sensitive client-based information.

The host is installed with Cisco Jabber version 11.9 and is prone to a cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle embedding media in instant messages. Successful exploitation allow remote attackers to conduct a cross-site scripting (xss) attack.

The host is installed with Cisco Jabber version 11.9 and is prone to a cross-site scripting vulnerability. A flaw is present in the applications which fails to properly handle executing arbitrary javascript. Successful exploitation allow remote attackers to conduct a cross-site scripting (xss) attack and perform remote code execution.

The host is installed with Microsoft Teams before 1.3.00.362 and is prone to an application directory DLL planting vulnerability. A flaw is present in the application, which fails to properly handle an issue with the DLL search path. Successful exploitation allows the attackers to execute arbitrary code in the context of the currently logged-in user.

The host is installed with ActivePresenter 6.1.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an unknown vector. Successful exploitation may result in a denial of service (DoS) or arbitrary code execution.

The host is installed with XnView Classic version 2.40 and is prone to a remote code execution vulnerability. A flaw is present in the applications which fails to properly handle a crafted .bie file. Successful exploitation allows remote attackers to execute code.

The host is installed with XnView Classic version 2.40 and is prone to a denial of service vulnerability. A flaw is present in the applications which fails to properly handle a crafted .fpx file. Successful exploitation allows attackers to cause denial of service and other unspecified impact.

The host is installed with XnView Classic version 2.40 and is prone to a denial of service vulnerability. A flaw is present in the applications which fails to properly handle a crafted .fpx file. Successful exploitation allows attackers to cause denial of service and other unspecified impact.


Pages:      Start    1715    1716    1717    1718    1719    1720    1721    1722    1723    1724    1725    1726    1727    1728    ..   2680

© SecPod Technologies