[Forgot Password]
Login  Register Subscribe

23631

 
 

124076

 
 

98503

 
 

909

 
 

79321

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11886 Download | Alert*

The host is installed with Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, or SeaMonkey before 2.8 and is prone to a CRLF injection vulnerability. A flaw is present in the applications, which fail to handle crafted HTTP headers. Successful exploitation could allow attackers to bypass intended Content Security Polic ...

The host is installed with Apache HTTP Server 2.2.x before 2.2.34 and 2.4.x before 2.4.27 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle mod_mime. Successful exploitation could allow remote attackers to leak confidential information, and a segfault in other cases resulting in denial of service.

The host is installed with Oracle MySQL Server through 5.5.56, 5.6.36 or 5.7.18 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Client mysqldump. Successful exploitation allows attackers to affect Integrity.

The host is installed with Oracle MySQL Server through 5.5.56, 5.6.36 or 5.7.18 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: DDL. Successful exploitation allows attackers to affect Confidentiality and Integrity.

The host is installed with Oracle MySQL Server through 5.5.56, 5.6.36 or 5.7.18 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: DDL. Successful exploitation allows attackers to affect Integrity.

The host is installed with Oracle MySQL Server through 5.5.56, 5.6.36 or 5.7.18 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: DML. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 5.6.36 or 5.7.18 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Replication. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 5.5.56, 5.6.36 or 5.7.18 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Charsets. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 5.6.36 or 5.7.18 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Replication. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 5.6.36 or 5.7.18 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: DML. Successful exploitation allows attackers to affect Availability.


Pages:      Start    7    8    9    10    11    12    13    14    15    16    17    18    19    20    ..   1188

© 2013 SecPod Technologies