[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15124 Download | Alert*

Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier allows remote authenticated users to affect availability via vectors related to DML.

An authenticated remote attacker can execute arbitrary code in Firebird SQL Server versions 2.5.7 and 3.0.2 by executing a malformed SQL statement.

The gig::Instrument::UpdateRegionKeyTable function in gig.cpp in libgig-dev 4.0.0 allows remote attackers to cause a denial of service via a crafted gig file.

The "process-execute" and "process-spawn" procedures did not free memory correctly when the execve call failed, resulting in a memory leak. This could be abused by an attacker to cause resource exhaustion or a denial of service. This affects all releases of CHICKEN up to and including 4.11 .

The REPL server in GNU Guile 2.0.12 allows an attacker to execute arbitrary code via an HTTP inter-protocol attack.

The gig::DimensionRegion::CreateVelocityTable function in gig.cpp in libgig-dev 4.0.0 allows remote attackers to cause a denial of service via a crafted gig file.

In Moodle 3.3, the course overview block reveals activities in hidden courses.

An issue was discovered in the Security component in Symfony 2.7.x before 2.7.48, 2.8.x before 2.8.41, 3.3.x before 3.3.17, 3.4.x before 3.4.11, and 4.0.x before 4.0.11. A session fixation vulnerability within the "Guard" login feature may allow an attacker to impersonate a victim towards the web application if the session id value was previously known to the attacker.

Cross-site scripting vulnerability in the media_handle_upload function in wp-admin/includes/media.php in WordPress before 4.6.1 might allow remote attackers to inject arbitrary web script or HTML by tricking an administrator into uploading an image file that has a crafted filename.

lib/Config/Model.pm in Config-Model before 2.102 allows local users to gain privileges via a crafted model in the current working directory, related to use of . with the INC array.


Pages:      Start    547    548    549    550    551    552    553    554    555    556    557    558    559    560    ..   1512

© SecPod Technologies