[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256488

 
 

909

 
 

199193

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31637 Download | Alert*

The host is installed with Cisco Webex Meetings before 40.6.0 and is prone to an HTML injection vulnerability. A flaw is present in the application, which fails to handle improper checks on parameter values within affected pages. Successful exploitation could allow an unauthenticated, remote attacker to modify a web page in the context of a browser.

The host is installed with Cisco Webex Meetings before 40.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle validation of parameters returned to the application from a web site. Successful exploitation could allow an unauthenticated, remote attacker to obtain restricted information from other Webex users.

The host is installed with Cisco Webex Meetings before 40.6 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle validation of parameters returned to the application from a web site. Successful exploitation could allow an unauthenticated, remote attacker to obtain restricted information from other Webex users.

The host is installed with Cisco Webex Meetings before 40.8 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to handle validation of URL parameters returned to the application from a web site. Successful exploitation could allow an unauthenticated, remote attacker to overwrite arbitrary files on an end-user system.

The host is installed with Cisco Webex Meetings before 40.8.9 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle validation of messages. Successful exploitation could allow the attacker to modify the underlying operating system configuration, which could allow the attacker to execute arbitrary code with the privileges of a targete ...

The host is installed with Cisco Webex Meetings before 40.10 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unsafe usage of shared memory. Successful exploitation could allow an authenticated, local attacker to gain access to sensitive information on an affected system.

The host is installed with Cisco Webex Meetings before 41.4 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unsafe logged off application actions. Successful exploitation could allow an authenticated, local attacker to gain access to sensitive information, including meeting data and recorded meeting transcriptions.

The host is installed with WSO2 API Manager 3.1.0 or prior and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in SOAP service Try-it tool. Successful exploitation could allow attackers to make the browser get redirected to a malicious website, make changes in the UI of the web page, retrieve information from the brows ...

The host is installed with Adobe ColdFusion 2018 before update 17, 2021 before update 7 or 2023 before update 1 and is prone to a deserialization of untrusted data vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could leads to arbitrary code execution.

The host is installed with Adobe ColdFusion 2018 before update 18, 2021 before update 8 or 2023 before update 2 and is prone to a deserialization of untrusted data vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could leads to arbitrary code execution.


Pages:      Start    1325    1326    1327    1328    1329    1330    1331    1332    1333    1334    1335    1336    1337    1338    ..   3163

© SecPod Technologies