Wireshark RTP parser DoS Vulnerability (CVE-2014-6422)
Release date:Updated on:
Affected Systems:Wireshark 1.12.0Description:Bugtraq id: 69856CVE (CAN) ID: CVE-2014-6422
Wireshark is the most popular network protocol parser.
Wireshark 1.12.0 has
Linux Kernel ceph/auth_x.c Buffer Overflow Vulnerability
Release date:Updated on:
Affected Systems:Linux kernelDescription:Bugtraq id: 69805
Linux Kernel is the Kernel of the Linux operating system.
Linux kernel has a buffer overflow
CacheGuard OS Cross-Site Request Forgery (CVE-2014-4865)
Release date:Updated on:
Affected Systems:CacheGuard OS 5.7.7Description:Bugtraq id: 69731CVE (CAN) ID: CVE-2014-4865
CacheGuard OS is a web traffic management solution.
CacheGuard OS v5.7.
Empty frame information leakage in Cisco Cloud Portal
Release date:Updated on:
Affected Systems:Cisco Cloud Portal 9.xDescription:CVE (CAN) ID: CVE-2014-3352
Cisco Cloud Portal is a Cloud Portal for data center services.
Cisco Cloud Portal 9.x
WordPress Trinity Theme 'download. php' Arbitrary File download Vulnerability
Release date:Updated on:
Affected Systems:WordPress TrinityDescription:Bugtraq id: 69759
WordPress Trinity is a business theme with four different la S.
The WordPress
OroCRM HTML Injection Vulnerability
Release date:Updated on:
Affected Systems:OroCRM orocrmDescription:Bugtraq id: 69760CVE (CAN) ID: CVE-2014-3077
OroCRM is an open source CRM solution.
OroCRM has the HTML injection vulnerability. Attackers can
GNU Automake insecure temporary File Processing Vulnerability
Release date:Updated on:
Affected Systems:GNU AutomakeDescription:Bugtraq id: 69777
GNU Automake is a tool that automatically generates 'makefile. in' files that comply with the GNU
The flying fish star router command can be run as ROOT to control the route
It was first found that the fat paper that @ wants to lose weight exists. The version found by this user exists. However, in the later versions, feiyuxing has fixed the
Chatting and chatting, I will be on you ...... Yes (both vulnerabilities can hijack logon)
Chatting and chatting, I will be on you ...... Yes (both vulnerabilities can hijack logon)I. Hijacking of mac Client Login
The following is the request for
D-Link a route has file inclusion, causing password Leakage
You do not need to log on and read it directly ..DIR-320 1.21
File Inclusion Vulnerability (directly read the Logon account password ):
Http: // address: 1080/model/_ show_info.php?
ZTE-T103H unauthorized access to wifi password and other information
ZTE-T103H unauthorized access to mac, wifi password, dns configuration, Routing hardware information and other information
Directly obtain the route configuration file without
A shell script that gently restarts the Centos ProcessThe main purpose is to restart important processes in the background. If killall-9 is used to force kill, the problem may occur. For example, the database process. The Code is as follows:#!
Ecmall second injection fourth bomb
20140618Although anti-injection is added in 20140618, it can be barely bypassed.
First register a member and then apply to open a shop.Change the store nameYu ', user (), 1 and extractvalue (1, concat (0x5c, (user
Cmseasy latest SQL injection (ignore 360 webscan for outgoing data)
It's really not targeted. Don't mind the manufacturers. Please check the other two. Thank you!Ignore 360 webscan.Version: 20140605
The vulnerability is repackaged with WooYun:
General SQL injection vulnerability of shigrui Education School Platform
Dr. Shi is a leading smart education solution provider in China. It is committed to providing competitive smart education solutions and services for primary and secondary
Web Application Management backend SQL injection can cause full-site Trojans
Http://appgame.candou.com
Admin 'or '1' = '1Admin 'or '1' = '1Go directly to the background
If I directly edit and add a game ~~ What do you know about Trojans... Your
DiscuzX Arbitrary File Operation Vulnerability
DiscuzX Arbitrary File Operation VulnerabilityThe vulnerability is actually caused by the deletion of arbitrary files. However, the deletion function is easy to locate and therefore cannot be written in
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.