[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256148

 
 

909

 
 

199106

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26521 Download | Alert*

The host is installed with Apache Tomcat 9.x before 9.0.29, 7.x before 7.0.99 or 8.5.x before 8.5.49 and is prone to a local privilege escalation vulnerability. A flaw is present in application, which fails to properly handle an issue in Tomcat's JmxRemoteLifecycleListener. Successful exploitation allow attackers without access to the Tomcat process or configuration files to manipulate the RMI reg ...

The host is installed with Apache Tomcat 9.x before 9.0.30, 7.x before 7.0.99 or 8.5.x before 8.5.50 and is prone to a session fixation vulnerability. A flaw is present in application, which fails to properly handle the processing of a from authentication. Successful exploitation allow attackers to perform a session fixation attack.

The host is installed with OpenSSH 6.2 or 8.x before 8.8 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an issue in sshd. Successful exploitation could leads to unspecified impact.

The host is installed with Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74, or 8.5.88 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle an issue when a response did not have any HTTP headers set. Successful exploitation allows attackers to use the response headers from the previous request for the current request leading to an inf ...

The host is installed with Apache Tomcat 11.0.0-M1 through 11.0.0-M11, 10.1.0-M1 through 10.1.13, 9.0.0-M1 through 9.0.80 or 8.5.0 through 8.5.93 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to properly parse HTTP trailer headers. Successful exploitation could cause Tomcat to treat a single request as multiple requests leading to the ...

The host is installed with Apache Tomcat 11.0.0-M1 through 11.0.0-M11, 10.1.0-M1 through 10.1.13, 9.0.0-M1 through 9.0.80 or 8.5.0 through 8.5.93 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified impact. Successful exploitation could cause Tomcat to skip some parts of the recycling process leading to informatio ...

The host is installed with Apache Tomcat 11.0.0-M1 through 11.0.0-M10, 10.1.0-M1 through 10.1.12, 9.0.0-M1 through 9.0.79, or 8.5.0 through 8.5.92 and is prone to an open redirect vulnerability. A flaw is present in the application, which fails to properly handle the ROOT web application which is configured to use FORM authentication. Successful exploitation allows URL Redirection to untrusted sit ...

The host is installed with Oracle Java SE through 11.0.19, 17.0.7 or 20.0.1, or Azul Zulu 11 before 11.65.14, or 17 before 17.43.14 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Networking. Successful exploitation allows attackers to affect Integrity.

The host is installed with Oracle Java SE through 11.0.19, 17.0.7 or 20.0.1, or Azul Zulu 11 before 11.65.14, or 17 before 17.43.14 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Utility. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle Java SE through 11.0.19, 17.0.7 or 20.0.1, or Azul Zulu 11 before 11.65.14, or 17 before 17.43.14 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Hotspot. Successful exploitation allows attackers to affect Confidentiality.


Pages:      Start    1045    1046    1047    1048    1049    1050    1051    1052    1053    1054    1055    1056    1057    1058    ..   2652

© SecPod Technologies