[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

111017

 
 

909

 
 

86402

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 12778 Download | Alert*

The host is installed with Ruby on Rails before 3.0.13, 3.1.x before 3.1.5 or 3.2.x before 3.2.4 and is prone to SQL-injection vulnerability. A flaw is present in the application, which fails to properly consider differences in parameter handling between the Active Record component and the Rack interface. Successful exploitation allows attackers to compromise the application, access or modify data ...

The host is installed with Ruby on Rails before 3.0.14, 3.1.x before 3.1.6 or 3.2.x before 3.2.6 and is prone to unsafe SQL query generation vulnerability. A flaw is present in the application, which fails to properly consider differences in parameter handling between the Active Record component and the Rack interface. Successful exploitation allows bypass intended database-query restrictions and ...

The host is installed with Ruby on Rails before 3.0.14, 3.1.x before 3.1.6 or 3.2.x before 3.2.6 and is prone to SQL-injection vulnerability. A flaw is present in the application, which fails to properly implement the passing of request data to a where method in an ActiveRecord class. Successful exploitation allows attackers to compromise the application, access or modify data, or exploit latent v ...

The host is installed with Google Chrome before 10.0.648.204 and is prone to denial of service vulnerability. A flaw is present in the application which does not properly handle Cascading Style Sheets (CSS) token sequences. Successful exploitation allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer".

The host is installed with WellinTech KingView 6.53 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to properly handle a crafted HTTP request. Successful exploitation allows remote attackers to read arbitrary files.

The host is installed with Google Chrome before 20.0.1132.43 and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to handle Metro DLL. Successful exploitation allows local users to gain privileges via a Trojan horse Metro DLL in the current working directory.

The host is installed with Google Chrome before 20.0.1132.43 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted data in the Matroska container format. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Google Chrome before 20.0.1132.43 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle JS API. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Google Chrome before 20.0.1132.43 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to initialize an unspecified pointer. Successful exploitation allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document.

The host is installed with Google Chrome before 20.0.1132.43 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly set array values. Successful exploitation allows remote attackers to cause incorrect pointer use.


Pages:      Start    1131    1132    1133    1134    1135    1136    1137    1138    1139    1140    1141    1142    1143    1144    ..   1277

© SecPod Technologies