[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15249 Download | Alert*

A Spectre gadget was found in the Linux kernel's implementation of system interrupts. An attacker with local access could use this information to reveal private data through a Spectre like side channel.

MediaWiki PandocUpload Extension Remote Code Execution Vulnerability. An authenticated attacker could exploit this vulnerability by uploading a file with the destination name as a malicious payload due to shell arguments not being properly escaped. When successfully exploited this could allow the malicious actor to perform remote code execution.

The host is installed with Microsoft Identity Linux Broker before 1.6.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle a malicious file. Successful exploitation allows attackers to compromise files that they were allowed access to as part of their initial privilege.

The host is installed with Open Management Infrastructure before 1.7.1-0 and is prone to an information disclosure vulnerability. Successful exploitation of this vulnerability could allow an attacker to access credentials of privileged accounts stored in trace logs on the machine being monitored by SCOM. Successful exploitation of this vulnerability requires an attacker be an authenticated user wi ...

The host is installed with Open Management Infrastructure before 1.7.1.0 and is prone to an information disclosure vulnerability. Successful exploitation of this vulnerability could allow an attacker to access credentials of privileged accounts stored in trace logs on the machine being monitored by SCOM. Successful exploitation of this vulnerability requires an attacker be an authenticated user wi ...

The host is installed with GitLab CE/EE 16.7.7 before 16.8.6, 16.9.0 before 16.9.4 or 16.10.0 before 16.10.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. On successful exploitation, an attacker may spike the gitLab instance resources usage resulting in service degradation via chat integration feature.

The host is installed with GitLab CE/EE 16.7.7 before 16.8.6, 16.9.0 before 16.9.4 or 16.10.0 before 16.10.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. On successful exploitation, an attacker may spike the gitLab instance resources usage resulting in service degradation via chat integration feature.

The host is installed with GitLab CE/EE before 16.8.6, 16.9.0 before 16.9.4 or 16.10.0 before 16.10.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. On successful exploitation, an attacker may cause a denial of service using malicious crafted content in a junit test report file.

The host is installed with GitLab CE/EE before 16.8.6, 16.9.0 before 16.9.4 or 16.10.0 before 16.10.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. On successful exploitation, an attacker may cause a denial of service using malicious crafted content in a junit test report file.

The host is installed with GitLab CE/EE 16.7 before 16.8.6, 16.9.0 before 16.9.4 or 16.10.0 before 16.10.2 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. On successful exploitation, an attacker may perform arbitrary actions on behalf of victims.


Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   1524

© SecPod Technologies