[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

111017

 
 

909

 
 

86402

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 12357 Download | Alert*

The host is installed with MySQL 5.1.60 or earlier or 5.5.19 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server DML. Successful exploitation could allow remote authenticated users to affect availability.

The host is installed with MySQL 5.1.61 or earlier or 5.5.21 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server DML. Successful exploitation could allow remote authenticated users to affect availability.

The host is installed with MySQL 5.1.61 or earlier or 5.5.21 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server Optimizer. Successful exploitation could allow remote authenticated users to affect availability.

The host is installed with 5.5.19 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server Optimizer. Successful exploitation could allow remote authenticated users to affect availability.

The host is installed with 5.5.21 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Partition. Successful exploitation could allow remote authenticated users to affect availability.

The host is installed with MySQL 5.1.61 or earlier or 5.5.21 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server Optimizer. Successful exploitation could allow remote authenticated users to affect availability.

The host is installed with IrfanView FlashPix PlugIn before 4.3.4.0 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted FlashPix image during decompression. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Coldfusion and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are in the application 8.0 through 9.0.1 which is caused by improper validation of user-supplied input by multiple scripts. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

The host is installed with WellinTech KingView 6.53 and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle the DLL files. Successful exploitation allows attackers to gain privileges via a Trojan horse DLL in the current working directory.

The host is installed with Adobe Coldfusion and is prone to multiple CRLF injection vulnerabilities. The flaws are present in the application 8.0 through 9.0.1 caused by improper validation of user-supplied input which will persuade a victim to click on a specially-crafted URL link containing CRLF character sequences. Successful exploitation allows remote attackers to inject arbitrary HTTP headers ...


Pages:      Start    1107    1108    1109    1110    1111    1112    1113    1114    1115    1116    1117    1118    1119    1120    ..   1235

© SecPod Technologies