The host is installed with Google Chrome before 75.0.3770.80 and is prone to a cross-origin vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Google Chrome before 75.0.3770.80 and is prone to an overly permissive tab access vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Google Chrome before 75.0.3770.80 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Google Chrome before 75.0.3770.80 and is prone to a popup blocker bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Google Chrome before 75.0.3770.90 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with Google Chrome before 75.0.3770.90 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.
The host is installed with WebSphere Application Server Network Deployment 9.x through 9.0.5.5, 8.5.x through 8.5.5.17, 8.0.x through 8.0.0.15 or 7.0.x through 7.0.0.45 and is prone to an XML external entity injection vulnerability. A flaw is present in the application, which fails to handle XML data. Successful exploitation allows remote attacker to disclose sensitive information.
The host is installed with Atlassian Confluence Server before 6.13.23, 6.14.0 before 7.4.11, 7.5.0 before 7.11.6, 7.12.0 before 7.12.5 and is prone to Code Injection vulnerability. A flaw is present in the application which fails to properly handle an OGNL payload. Successful exploitation allows users with a valid account on a Confluence Data Center instance to execute arbitrary Java code or run a ...
The host is installed with Atlassian Confluence Server before 7.4.5, 7.5.0 before 7.6.3, 7.7.0 before 7.7.4 and is prone to Cross-site Scripting vulnerability. A flaw is present in the application which fails to properly handle page excerpt functionality. Successful exploitation allows remote attackers with permission to edit a page or blog to inject arbitrary HTML or JavaScript.
The host is installed with oracle WebLogic through 10.3.6.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle the core components issue. Successful exploitation allows an unauthenticated attacker to cause unspecified impact.