This update adds support for Solaris and Mac OS X platforms
This update adds support for Solaris and Mac OS X platforms
This update adds support for Solaris platform.
The Rhino Script Engine of Oracle Java fails to properly check for permissions on JavaScript error objects. This flaw allows an unprivileged applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user.
This module exploits a local vulnerability in Trend Micro IWSS to gain elevated privileges on the affected computer.
The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the SamrChangePassword function, when the "username map script" smb.conf option is enabled.
e107 CMS is vulnerable to a command injection in its installation script due to a lack of sanitization on the MySQL server parameter.
A backdoor introduced in the source code of MyBB allows remote unauthenticated attackers to execute arbitrary code on systems running vulnerable installations of MyBB.
Eval injection vulnerability in reserve.php in phpScheduleIt 1.2.10 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via the start_date parameter.
This update adds support for the Solaris and FreeBSD platforms.
This update adds support for the Solaris and FreeBSD platforms.
This module exploits a Moodle Tex Filter Remote Code Execution vulnerability installing an agent.
This update adds support for the Solaris platform.
This update adds support for the Solaris platform.
Pagination
- Previous page
- Page 40
- Next page