[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15266 Download | Alert*

The host is installed with Opera Browser before 11.62 and is prone to address spoofing vulnerability. A flaw is present in the application, which fails to properly handle the reloads and redirects. Successful exploitation allows remote attackers to spoof the address field by triggering a page reload followed by a redirect to a different domain.

The host is installed with Opera Browser before 11.62 and is prone to address spoofing vulnerability. A flaw is present in the application, which fails to properly handle the reloads and redirects. Successful exploitation allows remote attackers to spoof the address field by triggering a page reload followed by a redirect to a different domain.

The host is installed with Apache Cassandra 3.0.x before 3.0.26, 3.11.x before 3.11.12 or 4.0.x before 4.0.2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle configuration of user defined functions. Successful exploitation allows attacker to execute arbitrary code on the host.

The host is installed with Apache Cassandra 2.1.x through 2.1.22, 2.2.x through 2.2.19, 3.0.x through 3.0.23 or 3.11.x through 3.11.9 and is prone to an authentication spoofing bypass vulnerability. A flaw is present in the application, which fails to properly handle an issue the 'dc' or 'rack' internode_encryption setting. Successful exploitation allows attacker to use the unencrypted connection ...

The host is installed with Apache Cassandra 2.1.x through 2.1.22, 2.2.x through 2.2.19, 3.0.x through 3.0.23 or 3.11.x through 3.11.9 and is prone to an authentication spoofing bypass vulnerability. A flaw is present in the application, which fails to properly handle an issue the 'dc' or 'rack' internode_encryption setting. Successful exploitation allows attacker to use the unencrypted connection ...

The host is installed with Google Chrome before 108.0.5359.124 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 108.0.5359.124 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 108.0.5359.124 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 108.0.5359.124 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 108.0.5359.124 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    669    670    671    672    673    674    675    676    677    678    679    680    681    682    ..   1526

© SecPod Technologies