[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26850 Download | Alert*

The host is installed with Cacti before 1.2.27 and is prone to a SQL injection vulnerability. A flaw is present in the application, which fails to handle file inclusion issues in create_all_header_nodes function. Successful exploitation allows an attacker to modify the contents of the Cacti database.

The host is installed with Cacti before 1.2.27 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle file inclusion issues in api_plugin_hook function. Successful exploitation allows an attacker to cause remote code execution.

The host is installed with Cacti before 1.2.27 and is prone to a SQL injection vulnerability. A flaw is present in the application, which fails to handle issues in form_save function. Successful exploitation allows an attacker to cause unspecified impact.

The host is installed with Cacti before 1.2.27 and is prone to a SQL injection vulnerability. A flaw is present in the application, which fails to handle issues in automation_get_new_graphs_sql function. Successful exploitation allows an attacker to cause privilege escalation and remote code execution.

The host is installed with Cacti before 1.2.27 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle issues in automation_tree_rules_form_save function. Successful exploitation allows an attacker to cause unspecified impact.

The host is installed with Cacti before 1.2.27 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle issues in form_save function. Successful exploitation allows an attacker to cause unspecified impact.

The host is installed with Cacti before 1.2.27 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle issues in raise_message_javascript function. Successful exploitation allows an attacker to cause unspecified impact.

The host is installed with Cacti before 1.2.27 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle issues in unspecified vectors. Successful exploitation allows an attacker to cause unspecified impact.

The host is installed with Cacti before 1.2.27 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle issues in Package Import feature. Successful exploitation allows an authenticated users having the Import Templates permission to execute arbitrary PHP code on the web server.

The host is installed with Mattermost version 8.1.x before 8.1.9, 9.2.x before 9.2.5, 9.3.0, and 9.4.x before 9.4.2 and is prone to an uncontrolled resource consumption vulnerability. A flaw is present in the applications which fails to limit the number of role names requested from the API. Successful exploitation allows an authenticated attacker to cause the server to run out of memory and crash ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   2684

© SecPod Technologies