[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31090 Download | Alert*

The host is installed with Cacti before 1.2.25 and is prone to an authenticated sql injection vulnerability and sql injection vulnerability. A flaw is present in the application, which fails to handle the 'graphs.php' file. Successful exploitation allows authenticated attackers to exploit the SQL injection vulnerability to perform privilege escalation and remote code execution.

The host is installed with Cacti 1.2.0 before 1.2.25 and is prone to a stored cross-site-scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle a malicious device name and the `data_sources.php` script. Successful exploitation allows an authenticated attacker to poison data stored in the cacti's database, which will be viewed by administrative cacti accounts and ...

The host is installed with Cacti before 1.2.25 and is prone to a stored cross-site-scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle a malicious device name and a maliciously altered device name. Successful exploitation allows an authenticated attacker to poison data stored in the cacti's database, which will be viewed by administrative cacti accounts and e ...

The host is installed with Cacti before 1.2.25 and is prone to a stored cross-site-scripting (XSS) vulnerability, data source path and stored xss attack against any user of the same (or broader) privileges vulnerability. A flaw is present in the application, which fails to handle a malicious device name. Successful exploitation allows an authenticated attacker to poison data stored in the cacti's ...

The host is installed with Cacti before 1.2.25 and is prone to a stored cross-site-scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle a data-source template with malicious code appended in the data-source name or a device with a malicious payload injected in the device name. Successful exploitation allows an authenticated attacker to poison data stored in th ...

The host is installed with Cacti before 1.2.25 and is prone to a cross-site-scripting vulnerability. A flaw is present in the application, which fails to handle a malicious device name, related to a graph attached to a report. Successful exploitation allows an authenticated attacker to poison data stored in the _cacti_'s database, which will be viewed by administrative _cacti_ accounts and execute ...

The host is installed with Adobe InCopy through 16.4.2 or 17.x through 17.3 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to cause memory leak.

The host is installed with Adobe InCopy through 16.4.2 or 17.x through 17.3 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to cause memory leak.

The host is installed with Adobe InCopy through 16.4.2 or 17.x through 17.3 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe InCopy through 16.4.2 or 17.x through 17.3 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.


Pages:      Start    1401    1402    1403    1404    1405    1406    1407    1408    1409    1410    1411    1412    1413    1414    ..   3108

© SecPod Technologies