[Forgot Password]
Login  Register Subscribe












Paid content will be excluded from the download.

Matches : 11923 Download | Alert*

Improper buffer restrictions in some Intel(R) Server Board M10JNP2SB BIOS firmware before version 7.219 may allow a privileged user to potentially enable escalation of privilege via local access.

IBM Sterling B2B Integrator Standard Edition through and through is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 230824.

IBM Cloud Pak for Security (CP4S) through and IBM QRadar Suite Software through allow an authenticated user to obtain sensitive version information that could aid in further attacks against the system. IBM X-Force ID: 233665.

Improper access control for some Intel Unison software may allow a privileged user to potentially enable denial of service via local access.

Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution.�� In details, in ActiveMQ configurations, jetty allows org.jolokia.http.AgentServlet to handler request to /api/jolokia org.jolokia.http.HttpRequestHandler#handlePostRequest is able to create JmxRequest through JSONObject. And calls to org.jolokia.http.HttpRequestHandler#executeRequest. Into deeper ca ...

OroPlatform is a PHP Business Application Platform (BAP) designed to make development of custom business applications easier and faster. Path Traversal is possible in `Oro\Bundle\GaufretteBundle\FileManager::getTemporaryFileName`. With this method, an attacker can pass the path to a non-existent file, which will allow writing the content to a new file that will be available during script execution ...

Remote code execution

Remote code execution

Elevation of privilege

Information disclosure

Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   1192

© SecPod Technologies