| Latest Exploits |
| Showing 'Latest Exploits' from 41 to 50|
| |QRadar Community Edition 188.8.131.52 Insecure File Permissions QRadar Community Edition version 184.108.40.206 suffers from a local privilege escalation due to insecure file permissions with run-result-reader.sh.
| |QRadar Community Edition 220.127.116.11 Cross Site Scripting QRadar Community Edition version 18.104.22.168 suffers from a reflective cross site scripting vulnerability in the Forensics link analysis page.
| |QRadar Community Edition 22.214.171.124 CSRF / Weak Access Control QRadar Community Edition version 126.96.36.199 suffers from cross site request forgery and weak access control vulnerabilities.
| |QRadar Community Edition 188.8.131.52 Server Side Request Forgery QRadar Community Edition version 184.108.40.206 has an issue where the RssFeedItem class of the QRadar web application is used to fetch and parse RSS feeds. No validation is performed on the user-supplied RSS feed URL. Due to the lack of URL validation...
| |QRadar Community Edition 220.127.116.11 Default Credentials QRadar Community Edition version 18.104.22.168 is deployed with a default password for the ConfigServices account. Using this default password it is possible to download configuration sets containing sensitive information, including (encrypted)...
| |Sky File 2.1.0 Cross Site Scripting / Directory Traversal Sky File version 2.1.0 for iOS suffers from cross site scripting and directory traversal vulnerabilities.
| |Mahara 19.10.2 Cross Site Scripting Mahara version 19.10.2 suffers from a persistent cross site scripting vulnerability.
| |Haproxy Hpack-tbl.c Out-Of-Bounds Write The haproxy hpack implementation in hpack-tbl.c handles 0-length HTTP headers incorrectly. This can lead to a fully controlled relative out-of-bounds write when processing a malicious HTTP2 request (or response).
| |Neowise CarbonFTP 1.4 Insecure Proprietary Password Encryption Neowise CarbonFTP version 1.4 suffers from an insecure proprietary password encryption implementation. Second version of this exploit that is updated to work with Python 3.
| |P5 FNIP-8x16A/FNIP-4xSH CSRF / Cross Site Scripting P5 FNIP-8x16A / FNIP-4xSH versions 1.0.20 and 1.0.11 suffer from cross site request forgery and cross site scripting vulnerabilities.
| « Newer 1 2 3 4 5 6 7 8 9 10 Older » |