[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

251139

 
 

909

 
 

196159

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26317 Download | Alert*

The host is installed with Bamboo CI server 2.4.0 before 2.5.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an issue in the SAML Single Sign On plugin. Successful exploitation could allow locally disabled users to reactivate their accounts just by browsing the affected instance.

A denial of service vulnerability exists when .NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against a .NET Core web application. The vulnerability can be exploited remotely, without authentication. A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the .NE ...

An elevation of privilege vulnerability exists when Azure DevOps Server 2019 does not properly enforce project permissions. An attacker who exploited the vulnerabilty could add GitHub repos to a project without having the proper access granted to their account. To exploit the vulnerability, an attacker with access to a project would need to send a specially crafted request to an affected Azure Dev ...

A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the ...

A remote code execution vulnerability exists in Visual Studio when the C++ compiler improperly handles specific combinations of C++ constructs. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could ...

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0, 12.1.3.0, 12.2.1.3, 12.2.1.4 or 14.1.1.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Console. Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 12.1.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Core Components. Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0, 12.1.3.0, 12.2.1.3, 12.2.1.4 or 14.1.1.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Samples. Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 12.1.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Core Components. Successful exploitation can cause unspecified impact.

The host is installed with Oracle WebLogic Server component in Oracle WebLogic Server through 10.3.6.0, 12.1.3.0, 12.2.1.3, 12.2.1.4 or 14.1.1.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle Core Components. Successful exploitation can cause unspecified impact.


Pages:      Start    2578    2579    2580    2581    2582    2583    2584    2585    2586    2587    2588    2589    2590    2591    ..   2631

© SecPod Technologies