Adobe Reader and Acrobat Memory Corruption Vulnerability (CVE-2014-0563)

Adobe Reader and Acrobat Memory Corruption Vulnerability (CVE-2014-0563) Release date:Updated on: Affected Systems:Adobe Reader 11.xAdobe Reader 10.xDescription:Bugtraq id: 69826CVE (CAN) ID: CVE-2014-0563 Adobe Reader (also known as Acrobat Reader)

Wireshark RTP parser DoS Vulnerability (CVE-2014-6422)

Wireshark RTP parser DoS Vulnerability (CVE-2014-6422) Release date:Updated on: Affected Systems:Wireshark 1.12.0Description:Bugtraq id: 69856CVE (CAN) ID: CVE-2014-6422 Wireshark is the most popular network protocol parser. Wireshark 1.12.0 has

Joomla! Spider Contacts 'index. php' SQL Injection Vulnerability

Joomla! Spider Contacts 'index. php' SQL Injection Vulnerability Release date:Updated on: Affected Systems:Joomla! Spider Contacts Description:Bugtraq id: 69757 Joomla! Spider Contacts is Joomla! To facilitate the management of contact

Linux Kernel ceph/auth_x.c Buffer Overflow Vulnerability

Linux Kernel ceph/auth_x.c Buffer Overflow Vulnerability Release date:Updated on: Affected Systems:Linux kernelDescription:Bugtraq id: 69805 Linux Kernel is the Kernel of the Linux operating system. Linux kernel has a buffer overflow

CacheGuard OS Cross-Site Request Forgery (CVE-2014-4865)

cve

CacheGuard OS Cross-Site Request Forgery (CVE-2014-4865) Release date:Updated on: Affected Systems:CacheGuard OS 5.7.7Description:Bugtraq id: 69731CVE (CAN) ID: CVE-2014-4865 CacheGuard OS is a web traffic management solution. CacheGuard OS v5.7.

Empty frame information leakage in Cisco Cloud Portal

cve

Empty frame information leakage in Cisco Cloud Portal Release date:Updated on: Affected Systems:Cisco Cloud Portal 9.xDescription:CVE (CAN) ID: CVE-2014-3352 Cisco Cloud Portal is a Cloud Portal for data center services. Cisco Cloud Portal 9.x

WordPress Trinity Theme 'download. php' Arbitrary File download Vulnerability

WordPress Trinity Theme 'download. php' Arbitrary File download Vulnerability Release date:Updated on: Affected Systems:WordPress TrinityDescription:Bugtraq id: 69759 WordPress Trinity is a business theme with four different la S. The WordPress

OroCRM HTML Injection Vulnerability

OroCRM HTML Injection Vulnerability Release date:Updated on: Affected Systems:OroCRM orocrmDescription:Bugtraq id: 69760CVE (CAN) ID: CVE-2014-3077 OroCRM is an open source CRM solution. OroCRM has the HTML injection vulnerability. Attackers can

GNU Automake insecure temporary File Processing Vulnerability

GNU Automake insecure temporary File Processing Vulnerability Release date:Updated on: Affected Systems:GNU AutomakeDescription:Bugtraq id: 69777 GNU Automake is a tool that automatically generates 'makefile. in' files that comply with the GNU

The flying fish star router command can be run as ROOT to control the route

The flying fish star router command can be run as ROOT to control the route It was first found that the fat paper that @ wants to lose weight exists. The version found by this user exists. However, in the later versions, feiyuxing has fixed the

Chatting and chatting, I will be on you ...... WeChat (the WeChat logon vulnerability can be hijacked in both cases)

Chatting and chatting, I will be on you ...... Yes (both vulnerabilities can hijack logon) Chatting and chatting, I will be on you ...... Yes (both vulnerabilities can hijack logon)I. Hijacking of mac Client Login The following is the request for

D-Link a route has file inclusion, causing password Leakage

D-Link a route has file inclusion, causing password Leakage You do not need to log on and read it directly ..DIR-320 1.21 File Inclusion Vulnerability (directly read the Logon account password ):  Http: // address: 1080/model/_ show_info.php?

ZTE-T103H unauthorized access to wifi password and other information

ZTE-T103H unauthorized access to wifi password and other information ZTE-T103H unauthorized access to mac, wifi password, dns configuration, Routing hardware information and other information Directly obtain the route configuration file without

A shell script that gently restarts the Centos Process

A shell script that gently restarts the Centos ProcessThe main purpose is to restart important processes in the background. If killall-9 is used to force kill, the problem may occur. For example, the database process. The Code is as follows:#!

Ecmall second injection fourth bomb

Ecmall second injection fourth bomb 20140618Although anti-injection is added in 20140618, it can be barely bypassed. First register a member and then apply to open a shop.Change the store nameYu ', user (), 1 and extractvalue (1, concat (0x5c, (user

Cmseasy SQL injection vulnerability 2

Cmseasy SQL injection vulnerability 2 Injection... unlimitedFront_class.php restricts username, but forgets the \ escape character.   If (preg_match ('/(\' | ")/', $ _ POST ['username']) | preg_match ('/(\ '| ")/', $ _ GET ['username']) | preg_match

Cmseasy latest SQL injection (ignore 360 webscan for outgoing data)

Cmseasy latest SQL injection (ignore 360 webscan for outgoing data) It's really not targeted. Don't mind the manufacturers. Please check the other two. Thank you!Ignore 360 webscan.Version: 20140605 The vulnerability is repackaged with WooYun:

General SQL injection vulnerability of shigrui Education School Platform

General SQL injection vulnerability of shigrui Education School Platform Dr. Shi is a leading smart education solution provider in China. It is committed to providing competitive smart education solutions and services for primary and secondary

Web Application Management backend SQL injection can cause full-site Trojans

Web Application Management backend SQL injection can cause full-site Trojans Http://appgame.candou.com Admin 'or '1' = '1Admin 'or '1' = '1Go directly to the background    If I directly edit and add a game ~~ What do you know about Trojans... Your

DiscuzX Arbitrary File Operation Vulnerability

DiscuzX Arbitrary File Operation Vulnerability DiscuzX Arbitrary File Operation VulnerabilityThe vulnerability is actually caused by the deletion of arbitrary files. However, the deletion function is easy to locate and therefore cannot be written in

Total Pages: 1330 1 .... 1156 1157 1158 1159 1160 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.