[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

111017

 
 

909

 
 

86402

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 12357 Download | Alert*

The host is installed with Adobe Coldfusion and is prone to unspecified vulnerability. A flaw is present in the application 8.0 through 9.0.1 caused by an error in the ColdFusion administrator console. Successful exploitation allows attackers to obtain sensitive information via unknown vectors.

The host is installed with Google Chrome before 18.0.1025.168 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly validate messages. Successful exploitation has unspecified impact and attack vectors.

The host is installed with Google Chrome before 18.0.1025.168 and is prone to security bypass vulnerability. A flaw is present in the application, which is caused due to race condition in the Inter-process Communication (IPC) implementation. Successful exploitation allows attackers to bypass intended sandbox restrictions via unspecified vectors.

The host is installed with Adobe Coldfusion and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application 8.0 through 9.0.1 where it fails to properly validate user-supplied input. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via the cfform tag.

The host is installed with Adobe Coldfusion and is prone to session fixation vulnerability. A flaw is present in the application 8.0 through 9.0.1 caused by an unspecified error which will persuade a victim to visit a specially-crafted link and log into the application. Successful exploitation allow remote attackers to hijack web sessions via unspecified vectors.

The host is installed with IBM Web Experience Factory 7.0 or 7.0.1 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to properly sanitize user-supplied input. Successful exploitation allows remote attackers to inject arbitrary web script or HTML

The host is installed with OpenSSL and is prone to OCSP stapling vulnerability. A flaw is present in the application, which fails to correctly parse malformed ClientHello handshake messages. Successful exploitation could allow remote attackers to obtain contents of parsed OCSP (Online Certificate Status Protocol) extensions and cause denial of service by triggering invalid memory accesses.

The host is installed with PHP and is prone to SQL injection vulnerability. A flaw is present in the set_magic_quotes_runtime function in PHP 5.3.2 and 5.3.3. When the MySQLi extension is used, there is no proper interaction with the use of mysqli_fetch_assoc function. Successful exploitation could allow an attacker to execute arbitrary SQL queries and gain unauthorized access.

The host is installed with Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, or SeaMonkey before 2.9 and is prone to address bar spoofing vulnerability. A flaw is present in the applications, which fail to properly load RSS and Atom feed content. Successful exploitation could allow attackers to spoof the address bar.

The host is installed with Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, or SeaMonkey before 2.9 and is prone to remote code execution vulnerability. A flaw is present in the applications, which fail to handle the texImage2D implementation. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1108    1109    1110    1111    1112    1113    1114    1115    1116    1117    1118    1119    1120    1121    ..   1235

© SecPod Technologies