· 6 years ago · Jan 16, 2020, 07:56 PM
1######################################################################################################################################
2=======================================================================================================================================
3Hostname tevhididavet.com ISP Medyabim Internet Hizmetleri
4Continent Asia Flag
5TR
6Country Turkey Country Code TR
7Region Unknown Local time 16 Jan 2020 21:18 +03
8City Unknown Postal Code Unknown
9IP Address 93.89.20.20 Latitude 41.021
10 Longitude 28.995
11
12=======================================================================================================================================
13#####################################################################################################################################
14> tevhididavet.com
15Server: 38.132.106.139
16Address: 38.132.106.139#53
17
18Non-authoritative answer:
19Name: tevhididavet.com
20Address: 93.89.20.20
21>
22#####################################################################################################################################
23[+] Target : tevhididavet.com
24
25[+] IP Address : 93.89.20.20
26
27[+] Headers :
28
29[+] Date : Thu, 16 Jan 2020 18:32:11 GMT
30[+] Server : Apache/2
31[+] Upgrade : h2,h2c
32[+] Connection : Upgrade, Keep-Alive
33[+] Link : <http://tevhididavet.com/wp-json/>; rel="https://api.w.org/"
34[+] Vary : Accept-Encoding,User-Agent
35[+] Content-Encoding : gzip
36[+] Content-Length : 14223
37[+] Keep-Alive : timeout=2, max=100
38[+] Content-Type : text/html; charset=UTF-8
39
40[+] SSL Certificate Information :
41
42[+] countryName : US
43[+] stateOrProvinceName : Someprovince
44[+] localityName : Sometown
45[+] organizationName : none
46[+] organizationalUnitName : none
47[+] commonName : localhost
48[+] emailAddress : webmaster@localhost
49[+] countryName : US
50[+] stateOrProvinceName : Someprovince
51[+] localityName : Sometown
52[+] organizationName : none
53[+] organizationalUnitName : none
54[+] commonName : localhost
55[+] emailAddress : webmaster@localhost
56[+] Version : 1
57[+] Serial Number : E4EE01681ADBE253
58[+] Not Before : Jun 15 12:50:24 2017 GMT
59[+] Not After : Oct 30 12:50:24 2044 GMT
60
61[+] Whois Lookup :
62
63[+] NIR : None
64[+] ASN Registry : ripencc
65[+] ASN : 44922
66[+] ASN CIDR : 93.89.20.0/24
67[+] ASN Country Code : TR
68[+] ASN Date : 2008-04-01
69[+] ASN Description : MEDYABIM-AS, TR
70[+] cidr : 93.89.20.0/24
71[+] name : NET-MEDYABIM-DC
72[+] handle : EE762-RIPE
73[+] range : 93.89.20.0 - 93.89.20.255
74[+] description : MEDYABIM DATACENTER I
75[+] country : TR
76[+] state : None
77[+] city : None
78[+] address : Kukurtlu Mah. Oulu Cad. Oylum Gokberk Sit. F Blok K3 D13 BURSA - TURKEY
79[+] postal_code : None
80[+] emails : None
81[+] created : 2012-10-19T15:24:36Z
82[+] updated : 2012-10-19T15:24:36Z
83
84[+] Crawling Target...
85
86[+] Looking for robots.txt........[ Found ]
87[+] Extracting robots Links.......[ 2 ]
88[+] Looking for sitemap.xml.......[ Found ]
89[+] Extracting sitemap Links......[ 65 ]
90[+] Extracting CSS Links..........[ 6 ]
91[+] Extracting Javascript Links...[ 16 ]
92[+] Extracting Internal Links.....[ 54 ]
93[+] Extracting External Links.....[ 5 ]
94[+] Extracting Images.............[ 3 ]
95
96[+] Total Links Extracted : 151
97
98[+] Dumping Links in /opt/FinalRecon/dumps/tevhididavet.com.dump
99[+] Completed!
100#####################################################################################################################################
101[i] Scanning Site: http://tevhididavet.com
102
103
104
105B A S I C I N F O
106====================
107
108
109[+] Site Title: Tevhidi Davet | Tevhide Davet Eder
110[+] IP address: 93.89.20.20
111[+] Web Server: Apache/2
112[+] CMS: WordPress
113[+] Cloudflare: Not Detected
114[+] Robots File: Found
115
116-------------[ contents ]----------------
117User-agent: *
118Disallow: /wp-admin/
119Allow: /wp-admin/admin-ajax.php
120
121Sitemap: http://tevhididavet.com/sitemap.xml
122
123-----------[end of contents]-------------
124
125
126
127W H O I S L O O K U P
128========================
129
130 Domain Name: TEVHIDIDAVET.COM
131 Registry Domain ID: 1707504235_DOMAIN_COM-VRSN
132 Registrar WHOIS Server: whois.PublicDomainRegistry.com
133 Registrar URL: http://www.publicdomainregistry.com
134 Updated Date: 2019-05-08T22:31:42Z
135 Creation Date: 2012-03-16T13:33:15Z
136 Registry Expiry Date: 2021-03-16T13:33:15Z
137 Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com
138 Registrar IANA ID: 303
139 Registrar Abuse Contact Email: abuse-contact@publicdomainregistry.com
140 Registrar Abuse Contact Phone: +1.2013775952
141 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
142 Name Server: NS1.MEDYABIM.COM
143 Name Server: NS2.MEDYABIM.COM
144 DNSSEC: unsigned
145 URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
146>>> Last update of whois database: 2020-01-16T18:32:23Z <<<
147
148For more information on Whois status codes, please visit https://icann.org/epp
149
150
151
152The Registry database contains ONLY .COM, .NET, .EDU domains and
153Registrars.
154
155
156
157
158G E O I P L O O K U P
159=========================
160
161[i] IP Address: 93.89.20.20
162[i] Country: Turkey
163[i] State:
164[i] City:
165[i] Latitude: 41.0214
166[i] Longitude: 28.9948
167
168
169
170
171H T T P H E A D E R S
172=======================
173
174
175[i] HTTP/1.0 200 OK
176[i] Date: Thu, 16 Jan 2020 18:32:44 GMT
177[i] Server: Apache/2
178[i] Upgrade: h2,h2c
179[i] Connection: Upgrade, close
180[i] Link: <http://tevhididavet.com/wp-json/>; rel="https://api.w.org/"
181[i] Vary: Accept-Encoding,User-Agent
182[i] Content-Type: text/html; charset=UTF-8
183
184
185
186
187D N S L O O K U P
188===================
189
190tevhididavet.com. 14399 IN MX 10 mail.tevhididavet.com.
191tevhididavet.com. 14399 IN TXT "v=spf1 a mx ip4:93.89.20.20 ~all"
192tevhididavet.com. 14399 IN A 93.89.20.20
193tevhididavet.com. 14399 IN SOA ns1.medyabim.com. hostmaster.tevhididavet.com. 2018070100 14400 3600 1209600 86400
194tevhididavet.com. 14399 IN NS ns1.medyabim.com.
195tevhididavet.com. 14399 IN NS ns2.medyabim.com.
196
197
198
199
200S U B N E T C A L C U L A T I O N
201====================================
202
203Address = 93.89.20.20
204Network = 93.89.20.20 / 32
205Netmask = 255.255.255.255
206Broadcast = not needed on Point-to-Point links
207Wildcard Mask = 0.0.0.0
208Hosts Bits = 0
209Max. Hosts = 1 (2^0 - 0)
210Host Range = { 93.89.20.20 - 93.89.20.20 }
211
212
213
214N M A P P O R T S C A N
215============================
216
217Starting Nmap 7.70 ( https://nmap.org ) at 2020-01-16 18:32 UTC
218Nmap scan report for tevhididavet.com (93.89.20.20)
219Host is up (0.13s latency).
220rDNS record for 93.89.20.20: 93-89-20-20.static.internetadresi.com
221
222PORT STATE SERVICE
22321/tcp open ftp
22422/tcp filtered ssh
22523/tcp closed telnet
22680/tcp open http
227110/tcp open pop3
228143/tcp open imap
229443/tcp open https
2303389/tcp closed ms-wbt-server
231
232Nmap done: 1 IP address (1 host up) scanned in 1.94 seconds
233
234
235
236S U B - D O M A I N F I N D E R
237==================================
238
239
240[i] Total Subdomains Found : 1
241
242[+] Subdomain: www.tevhididavet.com
243[-] IP: 93.89.20.20
244######################################################################################################################################
245[+] Starting At 2020-01-16 13:32:43.441435
246[+] Collecting Information On: http://tevhididavet.com/
247[#] Status: 200
248--------------------------------------------------
249[#] Web Server Detected: Apache/2
250[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
251- Date: Thu, 16 Jan 2020 18:32:39 GMT
252- Server: Apache/2
253- Upgrade: h2,h2c
254- Connection: Upgrade, Keep-Alive
255- Link: <http://tevhididavet.com/wp-json/>; rel="https://api.w.org/"
256- Vary: Accept-Encoding,User-Agent
257- Content-Encoding: gzip
258- Content-Length: 14223
259- Keep-Alive: timeout=2, max=100
260- Content-Type: text/html; charset=UTF-8
261--------------------------------------------------
262[#] Finding Location..!
263[#] status: success
264[#] country: Turkey
265[#] countryCode: TR
266[#] region: 16
267[#] regionName: Bursa
268[#] city: Bursa
269[#] zip: 16090
270[#] lat: 40.1828
271[#] lon: 29.0671
272[#] timezone: Europe/Istanbul
273[#] isp: MEDYABIM
274[#] org:
275[#] as: AS44922 MEDYABIM INTERNET HIZMETLERI
276[#] query: 93.89.20.20
277--------------------------------------------------
278[x] Didn't Detect WAF Presence on: http://tevhididavet.com/
279--------------------------------------------------
280[#] Starting Reverse DNS
281[-] Failed ! Fail
282--------------------------------------------------
283[!] Scanning Open Port
284[#] 21/tcp open ftp
285[#] 53/tcp open domain
286[#] 80/tcp open http
287[#] 110/tcp open pop3
288[#] 111/tcp open rpcbind
289[#] 143/tcp open imap
290[#] 443/tcp open https
291[#] 465/tcp open smtps
292[#] 587/tcp open submission
293[#] 993/tcp open imaps
294[#] 995/tcp open pop3s
295[#] 2222/tcp open EtherNetIP-1
296[#] 3306/tcp open mysql
297--------------------------------------------------
298[+] Getting SSL Info
299[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self signed certificate (_ssl.c:1076)
300--------------------------------------------------
301[+] Collecting Information Disclosure!
302[#] Detecting sitemap.xml file
303[!] sitemap.xml File Found: http://tevhididavet.com//sitemap.xml
304[#] Detecting robots.txt file
305[!] robots.txt File Found: http://tevhididavet.com//robots.txt
306[#] Detecting GNU Mailman
307[-] GNU Mailman App Not Detected!?
308--------------------------------------------------
309[+] Crawling Url Parameter On: http://tevhididavet.com/
310--------------------------------------------------
311[#] Searching Html Form !
312[+] Html Form Discovered
313[#] action: http://tevhididavet.com/
314[#] class: ['search-form']
315[#] id: None
316[#] method: get
317--------------------------------------------------
318[!] Found 2 dom parameter
319[#] https://www.youtube.com/watch?v=4D_FHbtKhOU&t=4s
320[#] http://tevhididavet.com//#
321--------------------------------------------------
322[!] 1 Internal Dynamic Parameter Discovered
323[+] http://tevhididavet.com/xmlrpc.php?rsd
324--------------------------------------------------
325[!] 2 External Dynamic Parameter Discovered
326[#] https://fonts.googleapis.com/css?family=Rajdhani:400,500,600,700&subset=latin-ext
327[#] https://www.youtube.com/watch?v=4D_FHbtKhOU&t=4s
328--------------------------------------------------
329[!] 107 Internal links Discovered
330[+] http://tevhididavet.com/page/2/
331[+] http://tevhididavet.com/
332[+] http://tevhididavet.com/feed/
333[+] http://tevhididavet.com/comments/feed/
334[+] http://tevhididavet.com/wp-includes/wlwmanifest.xml
335[+] http://tevhididavet.com///wp-content/uploads/fbrfg/apple-touch-icon.png
336[+] http://tevhididavet.com///wp-content/uploads/fbrfg/favicon-32x32.png
337[+] http://tevhididavet.com///wp-content/uploads/fbrfg/favicon-16x16.png
338[+] http://tevhididavet.com///wp-content/uploads/fbrfg/site.webmanifest
339[+] http://tevhididavet.com///wp-content/uploads/fbrfg/safari-pinned-tab.svg
340[+] http://tevhididavet.com///wp-content/uploads/fbrfg/favicon.ico
341[+] http://www.tevhididavet.com
342[+] http://tevhididavet.com/kategori/onsayfa/
343[+] http://tevhididavet.com/iletisim/
344[+] http://tevhididavet.com/
345[+] http://tevhididavet.com
346[+] http://tevhididavet.com/kategori/kuran/
347[+] http://tevhididavet.com/kategori/sunnet/
348[+] http://tevhididavet.com/kategori/akaid/
349[+] http://tevhididavet.com/kategori/fikih/
350[+] http://tevhididavet.com/kategori/ahlak/
351[+] http://tevhididavet.com/kategori/makaleler/
352[+] http://tevhididavet.com/kategori/sohbetler/
353[+] http://tevhididavet.com/kategori/edebiyat/
354[+] http://tevhididavet.com/kategori/arabca/
355[+] http://tevhididavet.com/kategori/sorucevab/
356[+] http://tevhididavet.com/kategori/sorucevab/akaid-sorulari/
357[+] http://tevhididavet.com/kategori/sorucevab/fikih-sorulari/
358[+] http://tevhididavet.com/kategori/arabca/
359[+] http://tevhididavet.com/emir-fiil-%d9%81%d8%b9%d9%84-%d8%a7%d9%84%d8%a3%d9%85%d8%b1/
360[+] http://tevhididavet.com/author/abdullahsaid/
361[+] http://tevhididavet.com/kategori/arabca/
362[+] http://tevhididavet.com/muzari-fiil-%d8%a7%d9%84%d9%81%d8%b9%d9%84-%d8%a7%d9%84%d9%85%d8%b6%d8%a7%d8%b1%d9%90%d8%b9/
363[+] http://tevhididavet.com/author/abdullahsaid/
364[+] http://tevhididavet.com/kategori/arabca/
365[+] http://tevhididavet.com/mazi-fiil-%d8%a7%d9%84%d9%81%d8%b9%d9%84-%d8%a7%d9%84%d9%85%d8%a7%d8%b6%d9%8a/
366[+] http://tevhididavet.com/author/abdullahsaid/
367[+] http://tevhididavet.com/kategori/sunnet/
368[+] http://tevhididavet.com/allah-iyilik-ve-kotulukleri-takdir-edip-yazdi/
369[+] http://tevhididavet.com/author/abdullahsaid/
370[+] http://tevhididavet.com/kategori/sunnet/
371[+] http://tevhididavet.com/ittiba-risalesi/
372[+] http://tevhididavet.com/author/abdullahsaid/
373[+] http://tevhididavet.com/kategori/sunnet/
374[+] http://tevhididavet.com/her-kim-islam-dininin-yukselmesi-icin-savasirsa-iste-o-allah-yolundadir/
375[+] http://tevhididavet.com/author/abdullahsaid/
376[+] http://tevhididavet.com/adet-muhakkemdir-%d8%a7%d9%84%d8%b9%d8%a7%d8%af%d8%a9-%d9%85%d8%ad%d9%83%d9%85%d8%a9/
377[+] http://tevhididavet.com/tekfir-dinin-aslindan-degildir-diyenler-tekfir-edilir-mi/
378[+] http://tevhididavet.com/kadinin-kocasindan-izin-almadan-evden-disari-cikmasi-caiz-midir/
379[+] http://tevhididavet.com/mahkemede-savunma-yapmak-kufur-mudur/
380[+] http://tevhididavet.com/zarar-izale-olunur-%d8%a7%d9%84%d8%b6%d9%91%d8%b1%d8%b1-%d9%8a%d8%b2%d8%a7%d9%84/
381[+] http://tevhididavet.com/author/tevhididavet/
382[+] http://tevhididavet.com/sahabe-hakkindaki-akidemiz/
383[+] http://tevhididavet.com/haramlar-allaha-sirk-kosmak/
384[+] http://tevhididavet.com/taguta-muhakeme-olmaya-fetva-veren-yahut-bunu-dinin-aslindan-gormeyen-bir-alim-var-midir/
385[+] http://tevhididavet.com/tevhid-daveti/
386[+] http://tevhididavet.com/kelime-i-tevhidin-faziletleri/
387[+] http://tevhididavet.com/author/abdullahsaid/
388[+] http://tevhididavet.com/adet-muhakkemdir-%d8%a7%d9%84%d8%b9%d8%a7%d8%af%d8%a9-%d9%85%d8%ad%d9%83%d9%85%d8%a9/
389[+] http://tevhididavet.com/zarar-izale-olunur-%d8%a7%d9%84%d8%b6%d9%91%d8%b1%d8%b1-%d9%8a%d8%b2%d8%a7%d9%84/
390[+] http://tevhididavet.com/hacet-umumi-olsun-hususi-olsun-zaruret-menzilesine-indirilir-%d8%a7%d9%84%d8%ad%d8%a7%d8%ac%d8%a9-%d8%aa%d9%86%d8%b2%d9%84-%d9%85%d9%86%d8%b2%d9%84%d8%a9-%d8%a7%d9%84%d8%b6%d8%b1%d9%88%d8%b1%d8%a9/
391[+] http://tevhididavet.com/iztirar-baskasinin-hakkini-ibtal-etmez-%d8%a7%d9%84%d8%a7%d8%b6%d8%b7%d8%b1%d8%a7%d8%b1-%d9%84%d8%a7-%d9%8a%d8%a8%d8%b7%d9%84-%d8%ad%d9%82-%d8%a7%d9%84%d8%ba%d9%8a%d8%b1/
392[+] http://tevhididavet.com/el-varakat-muhtasari-%d9%85%d8%ae%d8%aa%d8%b5%d8%b1-%d8%a7%d9%84%d9%88%d8%b1%d9%82%d8%a7%d8%aa/
393[+] http://tevhididavet.com/author/esedullahsaid/
394[+] http://tevhididavet.com/uyusturucu-belasi/
395[+] http://tevhididavet.com/ehveni-serreyn-nerede-gecerlidir/
396[+] http://tevhididavet.com/koklerimiz/
397[+] http://tevhididavet.com/zinaya-yaklasmayin/
398[+] http://tevhididavet.com/bu-gun-peygamberimiz-olsaydi-ne-derdi/
399[+] http://tevhididavet.com/tekfir-dinin-aslindan-degildir-diyenler-tekfir-edilir-mi/
400[+] http://tevhididavet.com/kadinin-kocasindan-izin-almadan-evden-disari-cikmasi-caiz-midir/
401[+] http://tevhididavet.com/mahkemede-savunma-yapmak-kufur-mudur/
402[+] http://tevhididavet.com/namazda-fatiha-suresini-okumanin-hukmu-nedir/
403[+] http://tevhididavet.com/fatihadan-sonra-amin-demekle-alakali-hukumler-nelerdir/
404[+] http://tevhididavet.com/darul-kufurde-kafirlerin-cani-ve-mali-helal-midir/
405[+] http://tevhididavet.com/velisiz-kiyilan-nikah-gecerli-midir/
406[+] http://tevhididavet.com/kategori/ahlak/
407[+] http://tevhididavet.com/gunluk-zikirler-subhanallahi-ve-bihamdihi-subhanallahil-azim/
408[+] http://tevhididavet.com/author/abdullahsaid/
409[+] http://tevhididavet.com/kategori/sohbetler/
410[+] http://tevhididavet.com/subhanallahi-ve-bihamdihi-zikrinin-fazileti/
411[+] http://tevhididavet.com/author/esedullahsaid/
412[+] http://tevhididavet.com/kategori/ahlak/
413[+] http://tevhididavet.com/gunluk-zikirler-estagfirullahe-ve-etubu-ileyh/
414[+] http://tevhididavet.com/author/abdullahsaid/
415[+] http://tevhididavet.com/kategori/ahlak/
416[+] http://tevhididavet.com/gunluk-zikirler-la-ilahe-illallahu-vahdehu-la-serike-leh/
417[+] http://tevhididavet.com/author/abdullahsaid/
418[+] http://tevhididavet.com/kategori/ahlak/
419[+] http://tevhididavet.com/gunluk-zikirler/
420[+] http://tevhididavet.com/author/abdullahsaid/
421[+] http://tevhididavet.com/kategori/sorucevab/fikih-sorulari/
422[+] http://tevhididavet.com/su-i-zan-nedir-bunun-hakkinda-bilgi-verir-misiniz/
423[+] http://tevhididavet.com/author/abdullahsaid/
424[+] http://tevhididavet.com
425[+] http://tevhididavet.com/kategori/kuran/
426[+] http://tevhididavet.com/kategori/sunnet/
427[+] http://tevhididavet.com/kategori/akaid/
428[+] http://tevhididavet.com/kategori/fikih/
429[+] http://tevhididavet.com/kategori/ahlak/
430[+] http://tevhididavet.com/kategori/makaleler/
431[+] http://tevhididavet.com/kategori/sohbetler/
432[+] http://tevhididavet.com/kategori/edebiyat/
433[+] http://tevhididavet.com/kategori/arabca/
434[+] http://tevhididavet.com/kategori/sorucevab/
435[+] http://tevhididavet.com/kategori/sorucevab/akaid-sorulari/
436[+] http://tevhididavet.com/kategori/sorucevab/fikih-sorulari/
437--------------------------------------------------
438[!] 13 External links Discovered
439[#] http://gmpg.org/xfn/11
440[#] https://www.facebook.com/Tevhididavetcom
441[#] http://twitter.com/tevhididavetcom
442[#] http://www.youtube.com/tevhididavet
443[#] https://www.instagram.com/tevhididavetcom/
444[#] https://www.facebook.com/Tevhididavetcom
445[#] http://twitter.com/tevhididavetcom
446[#] https://www.instagram.com/tevhididavetcom/
447[#] http://www.youtube.com/tevhididavet
448[#] https://www.facebook.com/Tevhididavetcom
449[#] http://twitter.com/tevhididavetcom
450[#] http://www.youtube.com/tevhididavet
451[#] https://www.instagram.com/tevhididavetcom/
452--------------------------------------------------
453[#] Mapping Subdomain..
454[!] Found 2 Subdomain
455- mail.tevhididavet.com
456- www.tevhididavet.com
457--------------------------------------------------
458[!] Done At 2020-01-16 13:33:05.189794
459#####################################################################################################################################
460Trying "tevhididavet.com"
461;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60015
462;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 2
463
464;; QUESTION SECTION:
465;tevhididavet.com. IN ANY
466
467;; ANSWER SECTION:
468tevhididavet.com. 14400 IN SOA ns1.medyabim.com. hostmaster.tevhididavet.com. 2018070100 14400 3600 1209600 86400
469tevhididavet.com. 14400 IN A 93.89.20.20
470tevhididavet.com. 14400 IN TXT "v=spf1 a mx ip4:93.89.20.20 ~all"
471tevhididavet.com. 14400 IN MX 10 mail.tevhididavet.com.
472tevhididavet.com. 14400 IN NS ns2.medyabim.com.
473tevhididavet.com. 14400 IN NS ns1.medyabim.com.
474
475;; ADDITIONAL SECTION:
476ns2.medyabim.com. 43003 IN A 93.89.19.11
477ns1.medyabim.com. 43003 IN A 93.89.16.11
478
479Received 240 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 188 ms
480####################################################################################################################################
481; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace tevhididavet.com any
482;; global options: +cmd
483. 81614 IN NS c.root-servers.net.
484. 81614 IN NS e.root-servers.net.
485. 81614 IN NS i.root-servers.net.
486. 81614 IN NS m.root-servers.net.
487. 81614 IN NS l.root-servers.net.
488. 81614 IN NS d.root-servers.net.
489. 81614 IN NS b.root-servers.net.
490. 81614 IN NS g.root-servers.net.
491. 81614 IN NS j.root-servers.net.
492. 81614 IN NS a.root-servers.net.
493. 81614 IN NS k.root-servers.net.
494. 81614 IN NS f.root-servers.net.
495. 81614 IN NS h.root-servers.net.
496. 81614 IN RRSIG NS 8 0 518400 20200129050000 20200116040000 33853 . aewi/ISE/YldXN0vX2Z6ZvNkTfh4c1/1nZKV8WJBuaXDwrl4No6wCHk2 fvTrnrunuhtXG4ZgzBY46Pa7bMf9rSAr58XIRDpkpM7y8BH6JQhvJolI okmAAqRGpKUw7plZlfxB6xbK8oBI2QIkVupX5jLnQHgZrUQc7YFztwCm laSXoBIyMEpWwdK7YTfKWQfhsrSQJR4gLk5ToL1TXrl+dgo17B9po1QI /tmXBvjbpohjh1ojgJyZzkcMXZnvExMXka+yztUpwdEl7iGhiDHSReng +/03IV+Dz2esZm4Rv+bVw0VqSBYT/6CkijumlwYtyAOW5T9wpxWNBVWf 1Tsgkw==
497;; Received 525 bytes from 38.132.106.139#53(38.132.106.139) in 92 ms
498
499com. 172800 IN NS l.gtld-servers.net.
500com. 172800 IN NS b.gtld-servers.net.
501com. 172800 IN NS c.gtld-servers.net.
502com. 172800 IN NS d.gtld-servers.net.
503com. 172800 IN NS e.gtld-servers.net.
504com. 172800 IN NS f.gtld-servers.net.
505com. 172800 IN NS g.gtld-servers.net.
506com. 172800 IN NS a.gtld-servers.net.
507com. 172800 IN NS h.gtld-servers.net.
508com. 172800 IN NS i.gtld-servers.net.
509com. 172800 IN NS j.gtld-servers.net.
510com. 172800 IN NS k.gtld-servers.net.
511com. 172800 IN NS m.gtld-servers.net.
512com. 86400 IN DS 30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CF C41A5766
513com. 86400 IN RRSIG DS 8 1 86400 20200129170000 20200116160000 33853 . zZJAgQ+RbL1jcracBN1lXpSrPX8rTsYt1XEp7tWWBTO7/TV79mWHlerB SWoCbWHgeIt5T0Nn026kOhXEQwCmxr2lg0GdLPnItF4XAQBMKGRUCun/ om/mPiNOjbRXj999i7oVvjLFbnR248AyzTr6dyiK2O/Rdpub6I3y800g TA1pzg6INhrwIm/0GT6lAtKpoNcLX3t+Qaio61tbJQJb4Hmk3b6zfr83 OWrp8sUym0KcfjngxSGXQPdffhUdI8RA5Krpp4Mkvo1JLQfY4segs54G YGAh2bVf2br7RWv4lbnq6YhdYQQiEBS5Oc30AodW8O+Bro7MgOcz4YPr J6W/HA==
514;; Received 1176 bytes from 192.5.5.241#53(f.root-servers.net) in 92 ms
515
516tevhididavet.com. 172800 IN NS ns1.medyabim.com.
517tevhididavet.com. 172800 IN NS ns2.medyabim.com.
518CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN NSEC3 1 1 0 - CK0Q1GIN43N1ARRC9OSM6QPQR81H5M9A NS SOA RRSIG DNSKEY NSEC3PARAM
519CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN RRSIG NSEC3 8 2 86400 20200122054915 20200115043915 12163 com. FNlrPrqpKfVHKASgkcTgT29br3HmpcXgRzMcdX4Ctkbi1zE22CbnfCTh SjAoyiUDjN5IJ+oGTKuTEjfMIFAEgjUW8b2xVYlmGCiEtrapua407X2t Dw3Dtkn4d5EGYjFORD32d9+gBVGkOEiimWZvL4uCH2gUy/uBPW1PLJAS NQNt45Eu6uTLVDvptAmn5uc2MbRvpkEHr6dsmB587FJQsw==
520LDM6H571G220OG255GCIIQV6VRSRHTUG.com. 86400 IN NSEC3 1 1 0 - LDMANONH6MGMFEFJVK1FDO4S17EHHD51 NS DS RRSIG
521LDM6H571G220OG255GCIIQV6VRSRHTUG.com. 86400 IN RRSIG NSEC3 8 2 86400 20200121064521 20200114053521 12163 com. C/49U16Q2X0WzKFP9svHh8FAe3FM1+2JG3P+NQxGUV94hwaefY8qMawQ 3QMHbEfeQ3tjqanljZoZDWNU1fb+ud0Phh1s4XDmD+64Pkhp1uBQ+WvQ gpCtGrw2gwnbnnt9aYtk+eaExNxYzLx3kYGyy6//We06X9SRDPqmbrTq HHaJbSOnSIcpsVErYhl6YKT7YB9C8WfrnHYHiJ1e1ru8Dw==
522;; Received 671 bytes from 192.55.83.30#53(m.gtld-servers.net) in 130 ms
523
524tevhididavet.com. 14400 IN MX 10 mail.tevhididavet.com.
525tevhididavet.com. 14400 IN TXT "v=spf1 a mx ip4:93.89.20.20 ~all"
526tevhididavet.com. 14400 IN A 93.89.20.20
527tevhididavet.com. 14400 IN SOA ns1.medyabim.com. hostmaster.tevhididavet.com. 2018070100 14400 3600 1209600 86400
528tevhididavet.com. 14400 IN NS ns2.medyabim.com.
529tevhididavet.com. 14400 IN NS ns1.medyabim.com.
530;; Received 267 bytes from 93.89.19.11#53(ns2.medyabim.com) in 233 ms
531#####################################################################################################################################
532[*] Processing domain tevhididavet.com
533[*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
534[+] Getting nameservers
53593.89.16.11 - ns1.medyabim.com
53693.89.19.11 - ns2.medyabim.com
537[-] Zone transfer failed
538
539[+] TXT records found
540"v=spf1 a mx ip4:93.89.20.20 ~all"
541
542[+] MX records found, added to target list
54310 mail.tevhididavet.com.
544
545[*] Scanning tevhididavet.com for A records
54693.89.20.20 - tevhididavet.com
54793.89.20.20 - ftp.tevhididavet.com
54893.89.20.20 - mail.tevhididavet.com
54993.89.20.20 - pop.tevhididavet.com
55093.89.20.20 - smtp.tevhididavet.com
55193.89.20.20 - www.tevhididavet.com
552####################################################################################################################################
553 AVAILABLE PLUGINS
554 -----------------
555
556 CompressionPlugin
557 OpenSslCipherSuitesPlugin
558 FallbackScsvPlugin
559 HttpHeadersPlugin
560 RobotPlugin
561 EarlyDataPlugin
562 OpenSslCcsInjectionPlugin
563 SessionResumptionPlugin
564 CertificateInfoPlugin
565 SessionRenegotiationPlugin
566 HeartbleedPlugin
567
568
569
570 CHECKING HOST(S) AVAILABILITY
571 -----------------------------
572
573 93.89.20.20:443 => 93.89.20.20
574
575
576
577
578 SCAN RESULTS FOR 93.89.20.20:443 - 93.89.20.20
579 ----------------------------------------------
580
581 * Session Renegotiation:
582 Client-initiated Renegotiation: OK - Rejected
583 Secure Renegotiation: OK - Supported
584
585 * TLSV1_3 Cipher Suites:
586 Server rejected all cipher suites.
587
588 * OpenSSL Heartbleed:
589 OK - Not vulnerable to Heartbleed
590
591 * Certificate Information:
592 Content
593 SHA1 Fingerprint: cc53d0ba21499c11db3a649d597ffeaca7c9b70b
594 Common Name: localhost
595 Issuer: localhost
596 Serial Number: 16496124031743550035
597 Not Before: 2017-06-15 12:50:24
598 Not After: 2044-10-30 12:50:24
599 Signature Algorithm: sha1
600 Public Key Algorithm: RSA
601 Key Size: 2048
602 Exponent: 65537 (0x10001)
603 DNS Subject Alternative Names: []
604
605 Trust
606 Hostname Validation: FAILED - Certificate does NOT match 93.89.20.20
607 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):FAILED - Certificate is NOT Trusted: self signed certificate
608 Java CA Store (jdk-12.0.1): FAILED - Certificate is NOT Trusted: self signed certificate
609 Mozilla CA Store (2019-03-14): FAILED - Certificate is NOT Trusted: self signed certificate
610 Windows CA Store (2019-05-27): FAILED - Certificate is NOT Trusted: self signed certificate
611 Android CA Store (9.0.0_r9): ERROR: timeout - timed out
612 Symantec 2018 Deprecation: OK - Not a Symantec-issued certificate
613 Received Chain: localhost
614 Verified Chain: ERROR - Could not build verified chain (certificate untrusted?)
615 Received Chain Contains Anchor: ERROR - Could not build verified chain (certificate untrusted?)
616 Received Chain Order: OK - Order is valid
617 Verified Chain contains SHA1: ERROR - Could not build verified chain (certificate untrusted?)
618
619 Extensions
620 OCSP Must-Staple: NOT SUPPORTED - Extension not found
621 Certificate Transparency: NOT SUPPORTED - Extension not found
622
623 OCSP Stapling
624 NOT SUPPORTED - Server did not send back an OCSP response
625
626 * TLSV1_2 Cipher Suites:
627 Forward Secrecy OK - Supported
628 RC4 OK - Not Supported
629
630 Preferred:
631 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
632 Accepted:
633 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
634 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
635 TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
636 TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
637 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
638 TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
639 TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
640 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
641 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
642 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
643 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 200 OK
644 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
645 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
646 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
647 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
648 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
649 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
650 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
651 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
652 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
653 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
654 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
655 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
656 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
657 Undefined - An unexpected error happened:
658 TLS_DH_anon_WITH_SEED_CBC_SHA timeout - timed out
659
660 * Deflate Compression:
661 OK - Compression disabled
662
663 * Downgrade Attacks:
664 TLS_FALLBACK_SCSV: OK - Supported
665
666 * ROBOT Attack:
667 OK - Not vulnerable
668
669 * TLSV1_1 Cipher Suites:
670Unhandled exception while running --tlsv1_1:
671timeout - timed out
672
673 * TLS 1.2 Session Resumption Support:
674 With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
675 With TLS Tickets: OK - Supported
676
677 * OpenSSL CCS Injection:
678 OK - Not vulnerable to OpenSSL CCS injection
679
680 * SSLV2 Cipher Suites:
681 Server rejected all cipher suites.
682
683 * SSLV3 Cipher Suites:
684 Server rejected all cipher suites.
685
686 * TLSV1 Cipher Suites:
687 Forward Secrecy OK - Supported
688 RC4 OK - Not Supported
689
690 Preferred:
691 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
692 Accepted:
693 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
694 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
695 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
696 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
697 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
698 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
699 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
700 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 200 OK
701 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
702 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
703 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
704 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
705
706
707 SCAN COMPLETED IN 29.62 S
708 -------------------------
709#####################################################################################################################################
710Domains still to check: 1
711 Checking if the hostname tevhididavet.com. given is in fact a domain...
712
713Analyzing domain: tevhididavet.com.
714 Checking NameServers using system default resolver...
715 IP: 93.89.16.11 (Turkey)
716 HostName: ns1.medyabim.com Type: NS
717 HostName: ns1.medyabim.com Type: PTR
718 IP: 93.89.19.11 (Turkey)
719 HostName: ns2.medyabim.com Type: NS
720 HostName: ns2.medyabim.com Type: PTR
721
722 Checking MailServers using system default resolver...
723 IP: 93.89.20.20 (Turkey)
724 HostName: mail.tevhididavet.com Type: MX
725 HostName: 93-89-20-20.static.internetadresi.com Type: PTR
726
727 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
728 No zone transfer found on nameserver 93.89.19.11
729 No zone transfer found on nameserver 93.89.16.11
730
731 Checking SPF record...
732
733 Checking 192 most common hostnames using system default resolver...
734 IP: 93.89.20.20 (Turkey)
735 HostName: mail.tevhididavet.com Type: MX
736 HostName: 93-89-20-20.static.internetadresi.com Type: PTR
737 Type: SPF
738 HostName: www.tevhididavet.com. Type: A
739 IP: 93.89.20.20 (Turkey)
740 HostName: mail.tevhididavet.com Type: MX
741 HostName: 93-89-20-20.static.internetadresi.com Type: PTR
742 Type: SPF
743 HostName: www.tevhididavet.com. Type: A
744 HostName: ftp.tevhididavet.com. Type: A
745 IP: 93.89.20.20 (Turkey)
746 HostName: mail.tevhididavet.com Type: MX
747 HostName: 93-89-20-20.static.internetadresi.com Type: PTR
748 Type: SPF
749 HostName: www.tevhididavet.com. Type: A
750 HostName: ftp.tevhididavet.com. Type: A
751 HostName: mail.tevhididavet.com. Type: A
752 IP: 93.89.20.20 (Turkey)
753 HostName: mail.tevhididavet.com Type: MX
754 HostName: 93-89-20-20.static.internetadresi.com Type: PTR
755 Type: SPF
756 HostName: www.tevhididavet.com. Type: A
757 HostName: ftp.tevhididavet.com. Type: A
758 HostName: mail.tevhididavet.com. Type: A
759 HostName: smtp.tevhididavet.com. Type: A
760 IP: 93.89.20.20 (Turkey)
761 HostName: mail.tevhididavet.com Type: MX
762 HostName: 93-89-20-20.static.internetadresi.com Type: PTR
763 Type: SPF
764 HostName: www.tevhididavet.com. Type: A
765 HostName: ftp.tevhididavet.com. Type: A
766 HostName: mail.tevhididavet.com. Type: A
767 HostName: smtp.tevhididavet.com. Type: A
768 HostName: pop.tevhididavet.com. Type: A
769
770 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
771 Checking netblock 93.89.19.0
772 Checking netblock 93.89.20.0
773 Checking netblock 93.89.16.0
774
775 Searching for tevhididavet.com. emails in Google
776
777 Checking 3 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
778 Host 93.89.19.11 is up (echo-reply ttl 44)
779 Host 93.89.20.20 is up (echo-reply ttl 42)
780 Host 93.89.16.11 is up (echo-reply ttl 43)
781
782 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
783 Scanning ip 93.89.19.11 (ns2.medyabim.com (PTR)):
784 21/tcp open ftp syn-ack ttl 42 ProFTPD 1.3.4a
785 |_ssl-date: 2020-01-16T19:28:36+00:00; -5s from scanner time.
786 53/tcp open domain syn-ack ttl 44 (unknown banner: get lost)
787 | dns-nsid:
788 |_ bind.version: get lost
789 | fingerprint-strings:
790 | DNSVersionBindReqTCP:
791 | version
792 | bind
793 |_ lost
794 80/tcp open ssl/http syn-ack ttl 43 Apache/2
795 | http-methods:
796 |_ Supported Methods: GET POST OPTIONS HEAD
797 |_http-server-header: Apache/2
798 |_http-title: MEDYABIM
799 110/tcp open pop3 syn-ack ttl 42 Dovecot DirectAdmin pop3d
800 |_pop3-capabilities: SASL(PLAIN) TOP STLS USER RESP-CODES UIDL PIPELINING CAPA
801 |_ssl-date: 2020-01-16T19:28:38+00:00; -5s from scanner time.
802 111/tcp open rpcbind syn-ack ttl 41 2-4 (RPC #100000)
803 | rpcinfo:
804 | program version port/proto service
805 | 100000 2,3,4 111/tcp rpcbind
806 | 100000 2,3,4 111/udp rpcbind
807 | 100000 3,4 111/tcp6 rpcbind
808 | 100000 3,4 111/udp6 rpcbind
809 | 100024 1 36958/udp6 status
810 | 100024 1 49274/tcp status
811 | 100024 1 49896/tcp6 status
812 |_ 100024 1 53535/udp status
813 143/tcp open imap syn-ack ttl 41 Dovecot imapd
814 |_imap-capabilities: IDLE more SASL-IR IMAP4rev1 have LOGIN-REFERRALS ENABLE LITERAL+ ID post-login listed OK Pre-login capabilities STARTTLS AUTH=PLAINA0001
815 |_ssl-date: 2020-01-16T19:28:36+00:00; -5s from scanner time.
816 443/tcp open ssl/ssl syn-ack ttl 44 Apache httpd (SSL-only mode)
817 | http-methods:
818 |_ Supported Methods: GET HEAD POST OPTIONS
819 |_http-server-header: Apache/2
820 |_http-title: MEDYABIM
821 | ssl-cert: Subject: commonName=www.medyabim.com.tr/organizationName=www.medyabim.com.tr/countryName=TR
822 | Issuer: commonName=Equifax Secure Global eBusiness CA-1/organizationName=Equifax Secure Inc./countryName=US
823 | Public Key type: rsa
824 | Public Key bits: 1024
825 | Signature Algorithm: md5WithRSAEncryption
826 | Not valid before: 2008-04-15T21:47:59
827 | Not valid after: 2011-06-15T21:47:59
828 | MD5: 2261 62cf 2061 35fb 930b 7b39 0168 3548
829 |_SHA-1: 9113 38c1 048d 0a89 0c78 00a1 072a 042f e1d7 7696
830 |_ssl-date: 2020-01-16T19:28:36+00:00; -4s from scanner time.
831 587/tcp open smtp syn-ack ttl 44 Exim smtpd 4.90_1
832 | smtp-commands: kayisi.medyabim.com Hello nmap.scanme.org [160.116.0.170], SIZE 1626341376, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, CHUNKING, STARTTLS, HELP,
833 |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
834 | ssl-cert: Subject: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=GB
835 | Issuer: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=GB
836 | Public Key type: rsa
837 | Public Key bits: 1024
838 | Signature Algorithm: sha1WithRSAEncryption
839 | Not valid before: 2011-07-19T08:56:59
840 | Not valid after: 2038-12-03T08:56:59
841 | MD5: 7ca0 14bc e517 e437 b49c aca7 17cc fbc6
842 |_SHA-1: 77bc fd19 856a a562 f719 604a 0461 2093 b012 5405
843 |_ssl-date: 2020-01-16T19:28:38+00:00; -5s from scanner time.
844 993/tcp open ssl/imaps? syn-ack ttl 43
845 |_ssl-date: 2020-01-16T19:28:36+00:00; -4s from scanner time.
846 995/tcp open ssl/pop3s? syn-ack ttl 43
847 |_ssl-date: 2020-01-16T19:28:36+00:00; -4s from scanner time.
848 3306/tcp open mysql syn-ack ttl 41 MySQL (unauthorized)
849 OS Info: Service Info: Host: kayisi.medyabim.com; OS: Unix
850 Scanning ip 93.89.20.20 (pop.tevhididavet.com.):
851 21/tcp open ftp syn-ack ttl 42 Pure-FTPd
852 | ssl-cert: Subject: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=US
853 | Issuer: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=US
854 | Public Key type: rsa
855 | Public Key bits: 2048
856 | Signature Algorithm: sha1WithRSAEncryption
857 | Not valid before: 2017-06-15T12:50:24
858 | Not valid after: 2044-10-30T12:50:24
859 | MD5: f416 f3e1 e58f df57 e3fb 122e 0064 1992
860 |_SHA-1: cc53 d0ba 2149 9c11 db3a 649d 597f feac a7c9 b70b
861 |_ssl-date: TLS randomness does not represent time
862 53/tcp open domain syn-ack ttl 43 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
863 | dns-nsid:
864 |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.2
865 | vulners:
866 | cpe:/a:isc:bind:9.9.4:
867 | CVE-2015-4620 7.8 https://vulners.com/cve/CVE-2015-4620
868 | CVE-2014-8500 7.8 https://vulners.com/cve/CVE-2014-8500
869 | CVE-2017-3141 7.2 https://vulners.com/cve/CVE-2017-3141
870 | CVE-2015-8461 7.1 https://vulners.com/cve/CVE-2015-8461
871 | CVE-2013-6230 6.8 https://vulners.com/cve/CVE-2013-6230
872 | CVE-2015-1349 5.4 https://vulners.com/cve/CVE-2015-1349
873 | CVE-2018-5740 5.0 https://vulners.com/cve/CVE-2018-5740
874 | CVE-2017-3145 5.0 https://vulners.com/cve/CVE-2017-3145
875 | CVE-2016-9131 5.0 https://vulners.com/cve/CVE-2016-9131
876 | CVE-2016-8864 5.0 https://vulners.com/cve/CVE-2016-8864
877 | CVE-2016-1286 5.0 https://vulners.com/cve/CVE-2016-1286
878 | CVE-2015-8000 5.0 https://vulners.com/cve/CVE-2015-8000
879 | CVE-2019-6465 4.3 https://vulners.com/cve/CVE-2019-6465
880 | CVE-2018-5743 4.3 https://vulners.com/cve/CVE-2018-5743
881 | CVE-2018-5742 4.3 https://vulners.com/cve/CVE-2018-5742
882 | CVE-2017-3143 4.3 https://vulners.com/cve/CVE-2017-3143
883 | CVE-2017-3142 4.3 https://vulners.com/cve/CVE-2017-3142
884 | CVE-2017-3136 4.3 https://vulners.com/cve/CVE-2017-3136
885 | CVE-2016-2775 4.3 https://vulners.com/cve/CVE-2016-2775
886 | CVE-2016-1285 4.3 https://vulners.com/cve/CVE-2016-1285
887 | CVE-2018-5741 4.0 https://vulners.com/cve/CVE-2018-5741
888 | CVE-2016-6170 4.0 https://vulners.com/cve/CVE-2016-6170
889 | CVE-2018-5745 3.5 https://vulners.com/cve/CVE-2018-5745
890 |_ CVE-2014-0591 2.6 https://vulners.com/cve/CVE-2014-0591
891 80/tcp open ssl/http syn-ack ttl 43 Apache/2
892 | http-methods:
893 |_ Supported Methods: GET POST OPTIONS HEAD
894 |_http-server-header: Apache/2
895 |_http-title: Site doesn't have a title (text/html).
896 110/tcp open pop3 syn-ack ttl 44 Dovecot DirectAdmin pop3d
897 |_pop3-capabilities: PIPELINING TOP RESP-CODES CAPA STLS SASL(PLAIN) AUTH-RESP-CODE USER UIDL
898 |_ssl-date: TLS randomness does not represent time
899 111/tcp open rpcbind syn-ack ttl 42 2-4 (RPC #100000)
900 | rpcinfo:
901 | program version port/proto service
902 | 100000 2,3,4 111/tcp rpcbind
903 | 100000 2,3,4 111/udp rpcbind
904 | 100000 3,4 111/tcp6 rpcbind
905 |_ 100000 3,4 111/udp6 rpcbind
906 143/tcp open imap syn-ack ttl 42 Dovecot imapd
907 |_imap-capabilities: AUTH=PLAINA0001 more STARTTLS ENABLE have LITERAL+ SASL-IR Pre-login IMAP4rev1 LOGIN-REFERRALS listed IDLE OK capabilities ID post-login
908 |_ssl-date: TLS randomness does not represent time
909 443/tcp open ssl/ssl syn-ack ttl 42 Apache httpd (SSL-only mode)
910 | http-methods:
911 |_ Supported Methods: GET POST OPTIONS HEAD
912 |_http-server-header: Apache/2
913 |_http-title: 400 Bad Request
914 | ssl-cert: Subject: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=US
915 | Issuer: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=US
916 | Public Key type: rsa
917 | Public Key bits: 2048
918 | Signature Algorithm: sha1WithRSAEncryption
919 | Not valid before: 2017-06-15T12:50:24
920 | Not valid after: 2044-10-30T12:50:24
921 | MD5: f416 f3e1 e58f df57 e3fb 122e 0064 1992
922 |_SHA-1: cc53 d0ba 2149 9c11 db3a 649d 597f feac a7c9 b70b
923 |_ssl-date: TLS randomness does not represent time
924 | tls-alpn:
925 |_ http/1.1
926 465/tcp open ssl/smtp syn-ack ttl 44 Exim smtpd 4.89
927 |_smtp-commands: erik.medyabim.com Hello nmap.scanme.org [160.116.0.170], SIZE 53477376, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
928 | ssl-cert: Subject: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=GB
929 | Issuer: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=GB
930 | Public Key type: rsa
931 | Public Key bits: 4096
932 | Signature Algorithm: sha1WithRSAEncryption
933 | Not valid before: 2016-05-13T00:13:50
934 | Not valid after: 2043-09-28T00:13:50
935 | MD5: 90b8 d95c 4714 d2ac 2daf f7f5 cf81 4dcd
936 |_SHA-1: 7a7e 8e6a b2c5 cd60 a8d0 fc5b e5b8 171f 4d18 ff73
937 |_ssl-date: TLS randomness does not represent time
938 | vulners:
939 | cpe:/a:exim:exim:4.89:
940 | CVE-2019-15846 10.0 https://vulners.com/cve/CVE-2019-15846
941 | CVE-2019-13917 10.0 https://vulners.com/cve/CVE-2019-13917
942 | CVE-2019-10149 7.5 https://vulners.com/cve/CVE-2019-10149
943 | CVE-2018-6789 7.5 https://vulners.com/cve/CVE-2018-6789
944 | CVE-2017-16943 7.5 https://vulners.com/cve/CVE-2017-16943
945 | CVE-2017-16944 5.0 https://vulners.com/cve/CVE-2017-16944
946 |_ CVE-2017-1000369 2.1 https://vulners.com/cve/CVE-2017-1000369
947 587/tcp open smtp syn-ack ttl 43 Exim smtpd 4.89
948 | smtp-commands: erik.medyabim.com Hello nmap.scanme.org [160.116.0.170], SIZE 53477376, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
949 |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
950 | ssl-cert: Subject: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=GB
951 | Issuer: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=GB
952 | Public Key type: rsa
953 | Public Key bits: 4096
954 | Signature Algorithm: sha1WithRSAEncryption
955 | Not valid before: 2016-05-13T00:13:50
956 | Not valid after: 2043-09-28T00:13:50
957 | MD5: 90b8 d95c 4714 d2ac 2daf f7f5 cf81 4dcd
958 |_SHA-1: 7a7e 8e6a b2c5 cd60 a8d0 fc5b e5b8 171f 4d18 ff73
959 |_ssl-date: TLS randomness does not represent time
960 | vulners:
961 | cpe:/a:exim:exim:4.89:
962 | CVE-2019-15846 10.0 https://vulners.com/cve/CVE-2019-15846
963 | CVE-2019-13917 10.0 https://vulners.com/cve/CVE-2019-13917
964 | CVE-2019-10149 7.5 https://vulners.com/cve/CVE-2019-10149
965 | CVE-2018-6789 7.5 https://vulners.com/cve/CVE-2018-6789
966 | CVE-2017-16943 7.5 https://vulners.com/cve/CVE-2017-16943
967 | CVE-2017-16944 5.0 https://vulners.com/cve/CVE-2017-16944
968 |_ CVE-2017-1000369 2.1 https://vulners.com/cve/CVE-2017-1000369
969 993/tcp open ssl/imaps? syn-ack ttl 42
970 |_ssl-date: TLS randomness does not represent time
971 995/tcp open ssl/pop3s? syn-ack ttl 41
972 |_ssl-date: TLS randomness does not represent time
973 3306/tcp open mysql syn-ack ttl 44 MySQL 5.5.5-10.0.34-MariaDB
974 | mysql-info:
975 | Protocol: 10
976 | Version: 5.5.5-10.0.34-MariaDB
977 | Thread ID: 1153477
978 | Capabilities flags: 63487
979 | Some Capabilities: Support41Auth, Speaks41ProtocolOld, SupportsCompression, SupportsTransactions, Speaks41ProtocolNew, FoundRows, LongPassword, IgnoreSpaceBeforeParenthesis, InteractiveClient, IgnoreSigpipes, SupportsLoadDataLocal, ODBCClient, DontAllowDatabaseTableColumn, LongColumnFlag, ConnectWithDatabase, SupportsAuthPlugins, SupportsMultipleResults, SupportsMultipleStatments
980 | Status: Autocommit
981 | Salt: NKl^rE?MERLd2mP'p"Ud
982 |_ Auth Plugin Name: mysql_native_password
983 Device type: general purpose|storage-misc|router|WAP|broadband router|media device
984 Running (JUST GUESSING): Linux 2.6.X|3.X (94%), HP embedded (91%), MikroTik RouterOS 6.X (90%), Ubiquiti embedded (90%), Ubiquiti AirOS 5.X (90%), Infomir embedded (89%)
985 OS Info: Service Info: Host: erik.medyabim.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
986 Scanning ip 93.89.16.11 (ns1.medyabim.com (PTR)):
987 WebCrawling domain's web servers... up to 50 max links.
988
989 + URL to crawl: https://ns2.medyabim.com:80
990 + Date: 2020-01-16
991
992 + Crawling URL: https://ns2.medyabim.com:80:
993 + Links:
994 + Crawling https://ns2.medyabim.com:80 ([SSL: WRONG_VERSION_NUMBER] wrong version number (_ssl.c:727))
995 + Searching for directories...
996 + Searching open folders...
997
998
999 + URL to crawl: http://ns2.medyabim.com:443
1000 + Date: 2020-01-16
1001
1002 + Crawling URL: http://ns2.medyabim.com:443:
1003 + Links:
1004 + Crawling http://ns2.medyabim.com:443 (400 Bad Request)
1005 + Searching for directories...
1006 + Searching open folders...
1007
1008
1009 + URL to crawl: https://ftp.tevhididavet.com.:80
1010 + Date: 2020-01-16
1011
1012 + Crawling URL: https://ftp.tevhididavet.com.:80:
1013 + Links:
1014 + Crawling https://ftp.tevhididavet.com.:80 ([SSL: WRONG_VERSION_NUMBER] wrong version number (_ssl.c:727))
1015 + Searching for directories...
1016 + Searching open folders...
1017
1018
1019 + URL to crawl: https://pop.tevhididavet.com.:80
1020 + Date: 2020-01-16
1021
1022 + Crawling URL: https://pop.tevhididavet.com.:80:
1023 + Links:
1024 + Crawling https://pop.tevhididavet.com.:80 ([SSL: WRONG_VERSION_NUMBER] wrong version number (_ssl.c:727))
1025 + Searching for directories...
1026 + Searching open folders...
1027
1028
1029 + URL to crawl: https://www.tevhididavet.com.:80
1030 + Date: 2020-01-16
1031
1032 + Crawling URL: https://www.tevhididavet.com.:80:
1033 + Links:
1034 + Crawling https://www.tevhididavet.com.:80 ([SSL: WRONG_VERSION_NUMBER] wrong version number (_ssl.c:727))
1035 + Searching for directories...
1036 + Searching open folders...
1037
1038
1039 + URL to crawl: https://smtp.tevhididavet.com.:80
1040 + Date: 2020-01-16
1041
1042 + Crawling URL: https://smtp.tevhididavet.com.:80:
1043 + Links:
1044 + Crawling https://smtp.tevhididavet.com.:80 ([SSL: WRONG_VERSION_NUMBER] wrong version number (_ssl.c:727))
1045 + Searching for directories...
1046 + Searching open folders...
1047
1048
1049 + URL to crawl: https://mail.tevhididavet.com:80
1050 + Date: 2020-01-16
1051
1052 + Crawling URL: https://mail.tevhididavet.com:80:
1053 + Links:
1054 + Crawling https://mail.tevhididavet.com:80 ([SSL: WRONG_VERSION_NUMBER] wrong version number (_ssl.c:727))
1055 + Searching for directories...
1056 + Searching open folders...
1057
1058
1059 + URL to crawl: https://mail.tevhididavet.com.:80
1060 + Date: 2020-01-16
1061
1062 + Crawling URL: https://mail.tevhididavet.com.:80:
1063 + Links:
1064 + Crawling https://mail.tevhididavet.com.:80 ([SSL: WRONG_VERSION_NUMBER] wrong version number (_ssl.c:727))
1065 + Searching for directories...
1066 + Searching open folders...
1067
1068
1069 + URL to crawl: http://ftp.tevhididavet.com.:443
1070 + Date: 2020-01-16
1071
1072 + Crawling URL: http://ftp.tevhididavet.com.:443:
1073 + Links:
1074 + Crawling http://ftp.tevhididavet.com.:443 (400 Bad Request)
1075 + Searching for directories...
1076 + Searching open folders...
1077
1078
1079 + URL to crawl: http://pop.tevhididavet.com.:443
1080 + Date: 2020-01-16
1081
1082 + Crawling URL: http://pop.tevhididavet.com.:443:
1083 + Links:
1084 + Crawling http://pop.tevhididavet.com.:443 (400 Bad Request)
1085 + Searching for directories...
1086 + Searching open folders...
1087
1088
1089 + URL to crawl: http://www.tevhididavet.com.:443
1090 + Date: 2020-01-16
1091
1092 + Crawling URL: http://www.tevhididavet.com.:443:
1093 + Links:
1094 + Crawling http://www.tevhididavet.com.:443 (400 Bad Request)
1095 + Searching for directories...
1096 + Searching open folders...
1097
1098
1099 + URL to crawl: http://smtp.tevhididavet.com.:443
1100 + Date: 2020-01-16
1101
1102 + Crawling URL: http://smtp.tevhididavet.com.:443:
1103 + Links:
1104 + Crawling http://smtp.tevhididavet.com.:443 (400 Bad Request)
1105 + Searching for directories...
1106 + Searching open folders...
1107
1108
1109 + URL to crawl: http://mail.tevhididavet.com:443
1110 + Date: 2020-01-16
1111
1112 + Crawling URL: http://mail.tevhididavet.com:443:
1113 + Links:
1114 + Crawling http://mail.tevhididavet.com:443 (400 Bad Request)
1115 + Searching for directories...
1116 + Searching open folders...
1117
1118
1119 + URL to crawl: http://mail.tevhididavet.com.:443
1120 + Date: 2020-01-16
1121
1122 + Crawling URL: http://mail.tevhididavet.com.:443:
1123 + Links:
1124 + Crawling http://mail.tevhididavet.com.:443 (400 Bad Request)
1125 + Searching for directories...
1126 + Searching open folders...
1127
1128--Finished--
1129Summary information for domain tevhididavet.com.
1130-----------------------------------------
1131
1132 Domain Ips Information:
1133 IP: 93.89.19.11
1134 HostName: ns2.medyabim.com Type: NS
1135 HostName: ns2.medyabim.com Type: PTR
1136 Country: Turkey
1137 Is Active: True (echo-reply ttl 44)
1138 Port: 21/tcp open ftp syn-ack ttl 42 ProFTPD 1.3.4a
1139 Script Info: |_ssl-date: 2020-01-16T19:28:36+00:00; -5s from scanner time.
1140 Port: 53/tcp open domain syn-ack ttl 44 (unknown banner: get lost)
1141 Script Info: | dns-nsid:
1142 Script Info: |_ bind.version: get lost
1143 Script Info: | fingerprint-strings:
1144 Script Info: | DNSVersionBindReqTCP:
1145 Script Info: | version
1146 Script Info: | bind
1147 Script Info: |_ lost
1148 Port: 80/tcp open ssl/http syn-ack ttl 43 Apache/2
1149 Script Info: | http-methods:
1150 Script Info: |_ Supported Methods: GET POST OPTIONS HEAD
1151 Script Info: |_http-server-header: Apache/2
1152 Script Info: |_http-title: MEDYABIM
1153 Port: 110/tcp open pop3 syn-ack ttl 42 Dovecot DirectAdmin pop3d
1154 Script Info: |_pop3-capabilities: SASL(PLAIN) TOP STLS USER RESP-CODES UIDL PIPELINING CAPA
1155 Script Info: |_ssl-date: 2020-01-16T19:28:38+00:00; -5s from scanner time.
1156 Port: 111/tcp open rpcbind syn-ack ttl 41 2-4 (RPC #100000)
1157 Script Info: | rpcinfo:
1158 Script Info: | program version port/proto service
1159 Script Info: | 100000 2,3,4 111/tcp rpcbind
1160 Script Info: | 100000 2,3,4 111/udp rpcbind
1161 Script Info: | 100000 3,4 111/tcp6 rpcbind
1162 Script Info: | 100000 3,4 111/udp6 rpcbind
1163 Script Info: | 100024 1 36958/udp6 status
1164 Script Info: | 100024 1 49274/tcp status
1165 Script Info: | 100024 1 49896/tcp6 status
1166 Script Info: |_ 100024 1 53535/udp status
1167 Port: 143/tcp open imap syn-ack ttl 41 Dovecot imapd
1168 Script Info: |_imap-capabilities: IDLE more SASL-IR IMAP4rev1 have LOGIN-REFERRALS ENABLE LITERAL+ ID post-login listed OK Pre-login capabilities STARTTLS AUTH=PLAINA0001
1169 Script Info: |_ssl-date: 2020-01-16T19:28:36+00:00; -5s from scanner time.
1170 Port: 443/tcp open ssl/ssl syn-ack ttl 44 Apache httpd (SSL-only mode)
1171 Script Info: | http-methods:
1172 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1173 Script Info: |_http-server-header: Apache/2
1174 Script Info: |_http-title: MEDYABIM
1175 Script Info: | ssl-cert: Subject: commonName=www.medyabim.com.tr/organizationName=www.medyabim.com.tr/countryName=TR
1176 Script Info: | Issuer: commonName=Equifax Secure Global eBusiness CA-1/organizationName=Equifax Secure Inc./countryName=US
1177 Script Info: | Public Key type: rsa
1178 Script Info: | Public Key bits: 1024
1179 Script Info: | Signature Algorithm: md5WithRSAEncryption
1180 Script Info: | Not valid before: 2008-04-15T21:47:59
1181 Script Info: | Not valid after: 2011-06-15T21:47:59
1182 Script Info: | MD5: 2261 62cf 2061 35fb 930b 7b39 0168 3548
1183 Script Info: |_SHA-1: 9113 38c1 048d 0a89 0c78 00a1 072a 042f e1d7 7696
1184 Script Info: |_ssl-date: 2020-01-16T19:28:36+00:00; -4s from scanner time.
1185 Port: 587/tcp open smtp syn-ack ttl 44 Exim smtpd 4.90_1
1186 Script Info: | smtp-commands: kayisi.medyabim.com Hello nmap.scanme.org [160.116.0.170], SIZE 1626341376, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, CHUNKING, STARTTLS, HELP,
1187 Script Info: |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1188 Script Info: | ssl-cert: Subject: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=GB
1189 Script Info: | Issuer: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=GB
1190 Script Info: | Public Key type: rsa
1191 Script Info: | Public Key bits: 1024
1192 Script Info: | Signature Algorithm: sha1WithRSAEncryption
1193 Script Info: | Not valid before: 2011-07-19T08:56:59
1194 Script Info: | Not valid after: 2038-12-03T08:56:59
1195 Script Info: | MD5: 7ca0 14bc e517 e437 b49c aca7 17cc fbc6
1196 Script Info: |_SHA-1: 77bc fd19 856a a562 f719 604a 0461 2093 b012 5405
1197 Script Info: |_ssl-date: 2020-01-16T19:28:38+00:00; -5s from scanner time.
1198 Port: 993/tcp open ssl/imaps? syn-ack ttl 43
1199 Script Info: |_ssl-date: 2020-01-16T19:28:36+00:00; -4s from scanner time.
1200 Port: 995/tcp open ssl/pop3s? syn-ack ttl 43
1201 Script Info: |_ssl-date: 2020-01-16T19:28:36+00:00; -4s from scanner time.
1202 Port: 3306/tcp open mysql syn-ack ttl 41 MySQL (unauthorized)
1203 Os Info: Host: kayisi.medyabim.com; OS: Unix
1204 IP: 93.89.20.20
1205 HostName: mail.tevhididavet.com Type: MX
1206 HostName: 93-89-20-20.static.internetadresi.com Type: PTR
1207 Type: SPF
1208 HostName: www.tevhididavet.com. Type: A
1209 HostName: ftp.tevhididavet.com. Type: A
1210 HostName: mail.tevhididavet.com. Type: A
1211 HostName: smtp.tevhididavet.com. Type: A
1212 HostName: pop.tevhididavet.com. Type: A
1213 Country: Turkey
1214 Is Active: True (echo-reply ttl 42)
1215 Port: 21/tcp open ftp syn-ack ttl 42 Pure-FTPd
1216 Script Info: | ssl-cert: Subject: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=US
1217 Script Info: | Issuer: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=US
1218 Script Info: | Public Key type: rsa
1219 Script Info: | Public Key bits: 2048
1220 Script Info: | Signature Algorithm: sha1WithRSAEncryption
1221 Script Info: | Not valid before: 2017-06-15T12:50:24
1222 Script Info: | Not valid after: 2044-10-30T12:50:24
1223 Script Info: | MD5: f416 f3e1 e58f df57 e3fb 122e 0064 1992
1224 Script Info: |_SHA-1: cc53 d0ba 2149 9c11 db3a 649d 597f feac a7c9 b70b
1225 Script Info: |_ssl-date: TLS randomness does not represent time
1226 Port: 53/tcp open domain syn-ack ttl 43 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
1227 Script Info: | dns-nsid:
1228 Script Info: |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.2
1229 Script Info: | vulners:
1230 Script Info: | cpe:/a:isc:bind:9.9.4:
1231 Script Info: | CVE-2015-4620 7.8 https://vulners.com/cve/CVE-2015-4620
1232 Script Info: | CVE-2014-8500 7.8 https://vulners.com/cve/CVE-2014-8500
1233 Script Info: | CVE-2017-3141 7.2 https://vulners.com/cve/CVE-2017-3141
1234 Script Info: | CVE-2015-8461 7.1 https://vulners.com/cve/CVE-2015-8461
1235 Script Info: | CVE-2013-6230 6.8 https://vulners.com/cve/CVE-2013-6230
1236 Script Info: | CVE-2015-1349 5.4 https://vulners.com/cve/CVE-2015-1349
1237 Script Info: | CVE-2018-5740 5.0 https://vulners.com/cve/CVE-2018-5740
1238 Script Info: | CVE-2017-3145 5.0 https://vulners.com/cve/CVE-2017-3145
1239 Script Info: | CVE-2016-9131 5.0 https://vulners.com/cve/CVE-2016-9131
1240 Script Info: | CVE-2016-8864 5.0 https://vulners.com/cve/CVE-2016-8864
1241 Script Info: | CVE-2016-1286 5.0 https://vulners.com/cve/CVE-2016-1286
1242 Script Info: | CVE-2015-8000 5.0 https://vulners.com/cve/CVE-2015-8000
1243 Script Info: | CVE-2019-6465 4.3 https://vulners.com/cve/CVE-2019-6465
1244 Script Info: | CVE-2018-5743 4.3 https://vulners.com/cve/CVE-2018-5743
1245 Script Info: | CVE-2018-5742 4.3 https://vulners.com/cve/CVE-2018-5742
1246 Script Info: | CVE-2017-3143 4.3 https://vulners.com/cve/CVE-2017-3143
1247 Script Info: | CVE-2017-3142 4.3 https://vulners.com/cve/CVE-2017-3142
1248 Script Info: | CVE-2017-3136 4.3 https://vulners.com/cve/CVE-2017-3136
1249 Script Info: | CVE-2016-2775 4.3 https://vulners.com/cve/CVE-2016-2775
1250 Script Info: | CVE-2016-1285 4.3 https://vulners.com/cve/CVE-2016-1285
1251 Script Info: | CVE-2018-5741 4.0 https://vulners.com/cve/CVE-2018-5741
1252 Script Info: | CVE-2016-6170 4.0 https://vulners.com/cve/CVE-2016-6170
1253 Script Info: | CVE-2018-5745 3.5 https://vulners.com/cve/CVE-2018-5745
1254 Script Info: |_ CVE-2014-0591 2.6 https://vulners.com/cve/CVE-2014-0591
1255 Port: 80/tcp open ssl/http syn-ack ttl 43 Apache/2
1256 Script Info: | http-methods:
1257 Script Info: |_ Supported Methods: GET POST OPTIONS HEAD
1258 Script Info: |_http-server-header: Apache/2
1259 Script Info: |_http-title: Site doesn't have a title (text/html).
1260 Port: 110/tcp open pop3 syn-ack ttl 44 Dovecot DirectAdmin pop3d
1261 Script Info: |_pop3-capabilities: PIPELINING TOP RESP-CODES CAPA STLS SASL(PLAIN) AUTH-RESP-CODE USER UIDL
1262 Script Info: |_ssl-date: TLS randomness does not represent time
1263 Port: 111/tcp open rpcbind syn-ack ttl 42 2-4 (RPC #100000)
1264 Script Info: | rpcinfo:
1265 Script Info: | program version port/proto service
1266 Script Info: | 100000 2,3,4 111/tcp rpcbind
1267 Script Info: | 100000 2,3,4 111/udp rpcbind
1268 Script Info: | 100000 3,4 111/tcp6 rpcbind
1269 Script Info: |_ 100000 3,4 111/udp6 rpcbind
1270 Port: 143/tcp open imap syn-ack ttl 42 Dovecot imapd
1271 Script Info: |_imap-capabilities: AUTH=PLAINA0001 more STARTTLS ENABLE have LITERAL+ SASL-IR Pre-login IMAP4rev1 LOGIN-REFERRALS listed IDLE OK capabilities ID post-login
1272 Script Info: |_ssl-date: TLS randomness does not represent time
1273 Port: 443/tcp open ssl/ssl syn-ack ttl 42 Apache httpd (SSL-only mode)
1274 Script Info: | http-methods:
1275 Script Info: |_ Supported Methods: GET POST OPTIONS HEAD
1276 Script Info: |_http-server-header: Apache/2
1277 Script Info: |_http-title: 400 Bad Request
1278 Script Info: | ssl-cert: Subject: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=US
1279 Script Info: | Issuer: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=US
1280 Script Info: | Public Key type: rsa
1281 Script Info: | Public Key bits: 2048
1282 Script Info: | Signature Algorithm: sha1WithRSAEncryption
1283 Script Info: | Not valid before: 2017-06-15T12:50:24
1284 Script Info: | Not valid after: 2044-10-30T12:50:24
1285 Script Info: | MD5: f416 f3e1 e58f df57 e3fb 122e 0064 1992
1286 Script Info: |_SHA-1: cc53 d0ba 2149 9c11 db3a 649d 597f feac a7c9 b70b
1287 Script Info: |_ssl-date: TLS randomness does not represent time
1288 Script Info: | tls-alpn:
1289 Script Info: |_ http/1.1
1290 Port: 465/tcp open ssl/smtp syn-ack ttl 44 Exim smtpd 4.89
1291 Script Info: |_smtp-commands: erik.medyabim.com Hello nmap.scanme.org [160.116.0.170], SIZE 53477376, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
1292 Script Info: | ssl-cert: Subject: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=GB
1293 Script Info: | Issuer: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=GB
1294 Script Info: | Public Key type: rsa
1295 Script Info: | Public Key bits: 4096
1296 Script Info: | Signature Algorithm: sha1WithRSAEncryption
1297 Script Info: | Not valid before: 2016-05-13T00:13:50
1298 Script Info: | Not valid after: 2043-09-28T00:13:50
1299 Script Info: | MD5: 90b8 d95c 4714 d2ac 2daf f7f5 cf81 4dcd
1300 Script Info: |_SHA-1: 7a7e 8e6a b2c5 cd60 a8d0 fc5b e5b8 171f 4d18 ff73
1301 Script Info: |_ssl-date: TLS randomness does not represent time
1302 Script Info: | vulners:
1303 Script Info: | cpe:/a:exim:exim:4.89:
1304 Script Info: | CVE-2019-15846 10.0 https://vulners.com/cve/CVE-2019-15846
1305 Script Info: | CVE-2019-13917 10.0 https://vulners.com/cve/CVE-2019-13917
1306 Script Info: | CVE-2019-10149 7.5 https://vulners.com/cve/CVE-2019-10149
1307 Script Info: | CVE-2018-6789 7.5 https://vulners.com/cve/CVE-2018-6789
1308 Script Info: | CVE-2017-16943 7.5 https://vulners.com/cve/CVE-2017-16943
1309 Script Info: | CVE-2017-16944 5.0 https://vulners.com/cve/CVE-2017-16944
1310 Script Info: |_ CVE-2017-1000369 2.1 https://vulners.com/cve/CVE-2017-1000369
1311 Port: 587/tcp open smtp syn-ack ttl 43 Exim smtpd 4.89
1312 Script Info: | smtp-commands: erik.medyabim.com Hello nmap.scanme.org [160.116.0.170], SIZE 53477376, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
1313 Script Info: |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1314 Script Info: | ssl-cert: Subject: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=GB
1315 Script Info: | Issuer: commonName=localhost/organizationName=none/stateOrProvinceName=Someprovince/countryName=GB
1316 Script Info: | Public Key type: rsa
1317 Script Info: | Public Key bits: 4096
1318 Script Info: | Signature Algorithm: sha1WithRSAEncryption
1319 Script Info: | Not valid before: 2016-05-13T00:13:50
1320 Script Info: | Not valid after: 2043-09-28T00:13:50
1321 Script Info: | MD5: 90b8 d95c 4714 d2ac 2daf f7f5 cf81 4dcd
1322 Script Info: |_SHA-1: 7a7e 8e6a b2c5 cd60 a8d0 fc5b e5b8 171f 4d18 ff73
1323 Script Info: |_ssl-date: TLS randomness does not represent time
1324 Script Info: | vulners:
1325 Script Info: | cpe:/a:exim:exim:4.89:
1326 Script Info: | CVE-2019-15846 10.0 https://vulners.com/cve/CVE-2019-15846
1327 Script Info: | CVE-2019-13917 10.0 https://vulners.com/cve/CVE-2019-13917
1328 Script Info: | CVE-2019-10149 7.5 https://vulners.com/cve/CVE-2019-10149
1329 Script Info: | CVE-2018-6789 7.5 https://vulners.com/cve/CVE-2018-6789
1330 Script Info: | CVE-2017-16943 7.5 https://vulners.com/cve/CVE-2017-16943
1331 Script Info: | CVE-2017-16944 5.0 https://vulners.com/cve/CVE-2017-16944
1332 Script Info: |_ CVE-2017-1000369 2.1 https://vulners.com/cve/CVE-2017-1000369
1333 Port: 993/tcp open ssl/imaps? syn-ack ttl 42
1334 Script Info: |_ssl-date: TLS randomness does not represent time
1335 Port: 995/tcp open ssl/pop3s? syn-ack ttl 41
1336 Script Info: |_ssl-date: TLS randomness does not represent time
1337 Port: 3306/tcp open mysql syn-ack ttl 44 MySQL 5.5.5-10.0.34-MariaDB
1338 Script Info: | mysql-info:
1339 Script Info: | Protocol: 10
1340 Script Info: | Version: 5.5.5-10.0.34-MariaDB
1341 Script Info: | Thread ID: 1153477
1342 Script Info: | Capabilities flags: 63487
1343 Script Info: | Some Capabilities: Support41Auth, Speaks41ProtocolOld, SupportsCompression, SupportsTransactions, Speaks41ProtocolNew, FoundRows, LongPassword, IgnoreSpaceBeforeParenthesis, InteractiveClient, IgnoreSigpipes, SupportsLoadDataLocal, ODBCClient, DontAllowDatabaseTableColumn, LongColumnFlag, ConnectWithDatabase, SupportsAuthPlugins, SupportsMultipleResults, SupportsMultipleStatments
1344 Script Info: | Status: Autocommit
1345 Script Info: | Salt: NKl^rE?MERLd2mP'p"Ud
1346 Script Info: |_ Auth Plugin Name: mysql_native_password
1347 Script Info: Device type: general purpose|storage-misc|router|WAP|broadband router|media device
1348 Script Info: Running (JUST GUESSING): Linux 2.6.X|3.X (94%), HP embedded (91%), MikroTik RouterOS 6.X (90%), Ubiquiti embedded (90%), Ubiquiti AirOS 5.X (90%), Infomir embedded (89%)
1349 Os Info: Host: erik.medyabim.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1350 IP: 93.89.16.11
1351 HostName: ns1.medyabim.com Type: NS
1352 HostName: ns1.medyabim.com Type: PTR
1353 Country: Turkey
1354 Is Active: True (echo-reply ttl 43)
1355
1356--------------End Summary --------------
1357-----------------------------------------#####################################################################################################################################
1358traceroute to tevhididavet.com (93.89.20.20), 30 hops max, 60 byte packets
1359 1 10.252.204.1 (10.252.204.1) 61.569 ms 61.534 ms 61.511 ms
1360 2 104.245.145.177 (104.245.145.177) 61.490 ms 61.457 ms 61.436 ms
1361 3 te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9) 61.468 ms 61.452 ms 91.174 ms
1362 4 be3435.ccr31.yyz02.atlas.cogentco.com (154.54.85.57) 61.365 ms 61.359 ms 91.018 ms
1363 5 ix-ae-16-0.tcore1.tnk-toronto.as6453.net (64.86.33.98) 61.190 ms te0-9-0-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.141) 61.166 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161) 61.143 ms
1364 6 if-ae-2-2.tcore2.tnk-toronto.as6453.net (64.86.33.90) 200.772 ms ix-ae-16-0.tcore1.tnk-toronto.as6453.net (64.86.33.98) 102.400 ms 171.806 ms
1365 7 if-ae-2-2.tcore2.tnk-toronto.as6453.net (64.86.33.90) 272.055 ms 242.062 ms 272.035 ms
1366 8 if-ae-26-2.tcore2.nto-new-york.as6453.net (216.6.81.28) 272.020 ms 272.005 ms 271.999 ms
1367 9 if-ae-32-3.tcore2.ldn-london.as6453.net (80.231.20.106) 187.711 ms if-ae-32-2.tcore2.ldn-london.as6453.net (63.243.216.23) 249.669 ms if-ae-26-2.tcore2.nto-new-york.as6453.net (216.6.81.28) 279.864 ms
136810 if-ae-32-2.tcore2.ldn-london.as6453.net (63.243.216.23) 249.632 ms if-ae-14-2.tcore2.av2-amsterdam.as6453.net (80.231.131.161) 249.619 ms if-ae-15-2.tcore2.l78-london.as6453.net (80.231.131.117) 279.751 ms
136911 if-ae-15-2.tcore2.l78-london.as6453.net (80.231.131.117) 279.741 ms if-ae-14-2.tcore2.av2-amsterdam.as6453.net (80.231.131.161) 279.648 ms if-ae-2-2.tcore1.av2-amsterdam.as6453.net (195.219.194.5) 168.663 ms
137012 if-ae-2-2.tcore1.av2-amsterdam.as6453.net (195.219.194.5) 205.286 ms if-ae-6-3.tcore1.fnm-frankfurt.as6453.net (195.219.194.78) 205.095 ms if-ae-2-2.tcore1.av2-amsterdam.as6453.net (195.219.194.5) 205.206 ms
137113 if-ae-6-3.tcore1.fnm-frankfurt.as6453.net (195.219.194.78) 205.156 ms if-ae-8-2.tcore1.it5-istanbul.as6453.net (195.219.156.22) 205.050 ms if-ae-6-3.tcore1.fnm-frankfurt.as6453.net (195.219.194.78) 197.571 ms
137214 if-ae-6-2.tcore1.fnm-frankfurt.as6453.net (195.219.194.150) 205.023 ms 229.796 ms 5.23.0.38 (5.23.0.38) 229.687 ms
137315 if-ae-8-2.tcore1.it5-istanbul.as6453.net (195.219.156.22) 229.686 ms 229.657 ms 5.23.0.38 (5.23.0.38) 235.394 ms
137416 5.23.0.38 (5.23.0.38) 235.403 ms sol-gw-brs01.internetadresi.com (92.45.78.54) 235.413 ms 93-89-18-233.static.internetadresi.com (93.89.18.233) 235.359 ms
137517 sol-gw-brs01.internetadresi.com (92.45.78.54) 235.355 ms 93-89-18-233.static.internetadresi.com (93.89.18.233) 235.348 ms sol-gw-brs01.internetadresi.com (92.45.78.54) 235.366 ms
137618 93-89-20-20.static.internetadresi.com (93.89.20.20) 235.343 ms 235.330 ms 235.315 ms
1377#######################################################################################################################################
1378----- tevhididavet.com -----
1379
1380
1381Host's addresses:
1382__________________
1383
1384tevhididavet.com. 12906 IN A 93.89.20.20
1385
1386
1387Name Servers:
1388______________
1389
1390ns1.medyabim.com. 84906 IN A 93.89.16.11
1391ns2.medyabim.com. 86073 IN A 93.89.19.11
1392
1393
1394Mail (MX) Servers:
1395___________________
1396
1397mail.tevhididavet.com. 13424 IN A 93.89.20.20
1398
1399
1400Trying Zone Transfers and getting Bind Versions:
1401_________________________________________________
1402
1403
1404Trying Zone Transfer for tevhididavet.com on ns1.medyabim.com ...
1405AXFR record query failed: REFUSED
1406
1407Trying Zone Transfer for tevhididavet.com on ns2.medyabim.com ...
1408AXFR record query failed: REFUSED
1409
1410
1411Scraping tevhididavet.com subdomains from Google:
1412__________________________________________________
1413
1414
1415 ---- Google search page: 1 ----
1416
1417
1418 ---- Google search page: 2 ----
1419
1420
1421 ---- Google search page: 3 ----
1422
1423
1424 ---- Google search page: 4 ----
1425
1426
1427 ---- Google search page: 5 ----
1428
1429
1430
1431Google Results:
1432________________
1433
1434 perhaps Google is blocking our queries.
1435 Check manually.
1436
1437
1438Brute forcing with /usr/share/dnsenum/dns.txt:
1439_______________________________________________
1440
1441ftp.tevhididavet.com. 13401 IN A 93.89.20.20
1442mail.tevhididavet.com. 13375 IN A 93.89.20.20
1443pop.tevhididavet.com. 14067 IN A 93.89.20.20
1444smtp.tevhididavet.com. 14062 IN A 93.89.20.20
1445www.tevhididavet.com. 12833 IN A 93.89.20.20
1446
1447
1448Launching Whois Queries:
1449_________________________
1450
1451 whois ip result: 93.89.20.0 -> 93.89.20.0/24
1452
1453
1454tevhididavet.com________________
1455
1456 93.89.20.0/24
1457######################################################################################################################################
1458WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
1459Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-16 13:34 EST
1460Nmap scan report for 93-89-20-20.static.internetadresi.com (93.89.20.20)
1461Host is up (0.22s latency).
1462Not shown: 480 closed ports, 3 filtered ports
1463Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
1464PORT STATE SERVICE
146521/tcp open ftp
146653/tcp open domain
146780/tcp open http
1468110/tcp open pop3
1469111/tcp open rpcbind
1470143/tcp open imap
1471443/tcp open https
1472465/tcp open smtps
1473587/tcp open submission
1474993/tcp open imaps
1475995/tcp open pop3s
14762222/tcp open EtherNetIP-1
14773306/tcp open mysql
1478
1479Nmap done: 1 IP address (1 host up) scanned in 3.34 seconds
1480#####################################################################################################################################
1481Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-16 13:34 EST
1482Nmap scan report for 93-89-20-20.static.internetadresi.com (93.89.20.20)
1483Host is up (0.20s latency).
1484Not shown: 12 closed ports, 2 filtered ports
1485PORT STATE SERVICE
148653/udp open domain
1487
1488Nmap done: 1 IP address (1 host up) scanned in 7.51 seconds
1489######################################################################################################################################
1490Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-16 13:35 EST
1491NSE: Loaded 55 scripts for scanning.
1492NSE: Script Pre-scanning.
1493Initiating NSE at 13:35
1494Completed NSE at 13:35, 0.00s elapsed
1495Initiating NSE at 13:35
1496Completed NSE at 13:35, 0.00s elapsed
1497Initiating Parallel DNS resolution of 1 host. at 13:35
1498Completed Parallel DNS resolution of 1 host. at 13:35, 0.03s elapsed
1499Initiating SYN Stealth Scan at 13:35
1500Scanning 93-89-20-20.static.internetadresi.com (93.89.20.20) [1 port]
1501Discovered open port 21/tcp on 93.89.20.20
1502Completed SYN Stealth Scan at 13:35, 0.23s elapsed (1 total ports)
1503Initiating Service scan at 13:35
1504Scanning 1 service on 93-89-20-20.static.internetadresi.com (93.89.20.20)
1505Completed Service scan at 13:35, 0.36s elapsed (1 service on 1 host)
1506Initiating OS detection (try #1) against 93-89-20-20.static.internetadresi.com (93.89.20.20)
1507Retrying OS detection (try #2) against 93-89-20-20.static.internetadresi.com (93.89.20.20)
1508Initiating Traceroute at 13:35
1509Completed Traceroute at 13:35, 0.43s elapsed
1510Initiating Parallel DNS resolution of 15 hosts. at 13:35
1511Completed Parallel DNS resolution of 15 hosts. at 13:35, 0.46s elapsed
1512NSE: Script scanning 93.89.20.20.
1513Initiating NSE at 13:35
1514Completed NSE at 13:36, 91.12s elapsed
1515Initiating NSE at 13:36
1516Completed NSE at 13:36, 0.05s elapsed
1517Nmap scan report for 93-89-20-20.static.internetadresi.com (93.89.20.20)
1518Host is up (0.21s latency).
1519
1520PORT STATE SERVICE VERSION
152121/tcp open ftp Pure-FTPd
1522| vulscan: VulDB - https://vuldb.com:
1523| [102925] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface pureftpd.passwd HTTP Request privilege escalation
1524| [57510] Pureftpd Pure-FTPd up to 0.x Memory Consumption denial of service
1525| [57504] Pureftpd Pure-FTPd up to 0.x ftp_parser.c Cleartext unknown vulnerability
1526|
1527| MITRE CVE - https://cve.mitre.org:
1528| [CVE-2004-0656] The accept_client function in PureFTPd 1.0.18 and earlier allows remote attackers to cause a denial of service by exceeding the maximum number of connections.
1529|
1530| SecurityFocus - https://www.securityfocus.com/bid/:
1531| [10664] PureFTPd Accept_Client Remote Denial of Service Vulnerability
1532|
1533| IBM X-Force - https://exchange.xforce.ibmcloud.com:
1534| No findings
1535|
1536| Exploit-DB - https://www.exploit-db.com:
1537| No findings
1538|
1539| OpenVAS (Nessus) - http://www.openvas.org:
1540| No findings
1541|
1542| SecurityTracker - https://www.securitytracker.com:
1543| [1010701] PureFTPd Logic Bug in accept_client() Lets Remote Users Crash the FTP Daemon
1544| [1008135] (Claim is Retracted) PureFTPd Buffer Overflow in displayrate() Lets Remote Users Crash the Service
1545| [1002993] PurePostPro Script Add-on for PureFTPd and MySQL Allows Remote Users to Execute SQL Commands on the Server
1546| [1001126] PureFTPd May Allow Remote Users to Deny Service on the Server
1547|
1548| OSVDB - http://www.osvdb.org:
1549| No findings
1550|_
1551Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1552Aggressive OS guesses: Linux 2.6.32 (95%), Linux 2.6.32 - 3.1 (95%), Linux 3.5 (95%), Linux 3.8 (95%), Linux 2.6.32 - 3.10 (95%), Linux 2.6.32 - 3.13 (95%), Linux 2.6.32 - 3.9 (95%), Linux 3.2 (95%), Linux 3.11 (94%), Linux 3.1 (94%)
1553No exact OS matches for host (test conditions non-ideal).
1554Uptime guess: 42.525 days (since Thu Dec 5 01:00:40 2019)
1555Network Distance: 19 hops
1556TCP Sequence Prediction: Difficulty=259 (Good luck!)
1557IP ID Sequence Generation: All zeros
1558
1559TRACEROUTE (using port 21/tcp)
1560HOP RTT ADDRESS
15611 41.99 ms 10.252.204.1
15622 114.63 ms 104.245.145.177
15633 114.67 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
15644 114.67 ms be3435.ccr31.yyz02.atlas.cogentco.com (154.54.85.57)
15655 114.70 ms te0-9-0-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.141)
15666 181.53 ms if-ae-2-2.tcore2.tnk-toronto.as6453.net (64.86.33.90)
15677 210.81 ms if-ae-8-2.tcore1.ct8-chicago.as6453.net (66.110.48.2)
15688 210.89 ms if-ae-8-2.tcore1.ct8-chicago.as6453.net (66.110.48.2)
15699 231.21 ms if-ae-26-2.tcore2.nto-new-york.as6453.net (216.6.81.28)
157010 221.71 ms if-ae-15-2.tcore2.l78-london.as6453.net (80.231.131.117)
157111 221.60 ms if-ae-14-2.tcore2.av2-amsterdam.as6453.net (80.231.131.161)
157212 221.70 ms if-ae-14-2.tcore2.av2-amsterdam.as6453.net (80.231.131.161)
157313 221.56 ms if-ae-2-2.tcore1.av2-amsterdam.as6453.net (195.219.194.5)
157414 221.65 ms 5.23.0.38
157515 221.64 ms 5.23.0.38
157616 221.71 ms 93-89-18-233.static.internetadresi.com (93.89.18.233)
157717 221.69 ms sol-gw-brs01.internetadresi.com (92.45.78.54)
157818 221.78 ms 93-89-18-233.static.internetadresi.com (93.89.18.233)
157919 201.15 ms 93-89-20-20.static.internetadresi.com (93.89.20.20)
1580
1581NSE: Script Post-scanning.
1582Initiating NSE at 13:36
1583Completed NSE at 13:36, 0.00s elapsed
1584Initiating NSE at 13:36
1585Completed NSE at 13:36, 0.00s elapsed
1586######################################################################################################################################
1587HTTP/1.1 200 OK
1588Date: Thu, 16 Jan 2020 18:37:47 GMT
1589Server: Apache/2
1590Upgrade: h2,h2c
1591Connection: Upgrade
1592Last-Modified: Fri, 30 Aug 2019 21:14:16 GMT
1593ETag: "2c-5915c1ac9ba00"
1594Accept-Ranges: bytes
1595Content-Length: 44
1596Vary: User-Agent
1597Content-Type: text/html
1598
1599Allow: GET,POST,OPTIONS,HEAD
1600#####################################################################################################################################
1601wig - WebApp Information Gatherer
1602
1603
1604Scanning http://93.89.20.20...
1605_________________ SITE INFO __________________
1606IP Title
160793.89.20.20
1608
1609__________________ VERSION ___________________
1610Name Versions Type
1611Roundcube CMS
1612phpMyAdmin 4_6_4 CMS
1613Apache 2 Platform
1614
1615______________________________________________
1616Time: 53.0 sec Urls: 628 Fingerprints: 40401
1617######################################################################################################################################
1618Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-16 13:39 EST
1619NSE: Loaded 162 scripts for scanning.
1620NSE: Script Pre-scanning.
1621Initiating NSE at 13:39
1622Completed NSE at 13:39, 0.00s elapsed
1623Initiating NSE at 13:39
1624Completed NSE at 13:39, 0.00s elapsed
1625Initiating Parallel DNS resolution of 1 host. at 13:39
1626Completed Parallel DNS resolution of 1 host. at 13:39, 0.02s elapsed
1627Initiating SYN Stealth Scan at 13:39
1628Scanning 93-89-20-20.static.internetadresi.com (93.89.20.20) [1 port]
1629Discovered open port 80/tcp on 93.89.20.20
1630Completed SYN Stealth Scan at 13:39, 0.23s elapsed (1 total ports)
1631Initiating Service scan at 13:39
1632Scanning 1 service on 93-89-20-20.static.internetadresi.com (93.89.20.20)
1633Completed Service scan at 13:39, 11.93s elapsed (1 service on 1 host)
1634Initiating OS detection (try #1) against 93-89-20-20.static.internetadresi.com (93.89.20.20)
1635Retrying OS detection (try #2) against 93-89-20-20.static.internetadresi.com (93.89.20.20)
1636Initiating Traceroute at 13:39
1637Completed Traceroute at 13:39, 0.49s elapsed
1638Initiating Parallel DNS resolution of 16 hosts. at 13:39
1639Completed Parallel DNS resolution of 16 hosts. at 13:39, 0.27s elapsed
1640NSE: Script scanning 93.89.20.20.
1641Initiating NSE at 13:39
1642Completed NSE at 13:40, 60.83s elapsed
1643Initiating NSE at 13:40
1644Completed NSE at 13:40, 1.24s elapsed
1645Nmap scan report for 93-89-20-20.static.internetadresi.com (93.89.20.20)
1646Host is up (0.23s latency).
1647
1648PORT STATE SERVICE VERSION
164980/tcp open http Apache/2
1650| fingerprint-strings:
1651| GetRequest:
1652| HTTP/1.1 200 OK
1653| Date: Thu, 16 Jan 2020 18:39:09 GMT
1654| Server: Apache/2
1655| Upgrade: h2,h2c
1656| Connection: Upgrade, close
1657| Last-Modified: Fri, 30 Aug 2019 21:14:16 GMT
1658| ETag: "2c-5915c1ac9ba00"
1659| Accept-Ranges: bytes
1660| Content-Length: 44
1661| Vary: User-Agent
1662| Content-Type: text/html
1663| <html>Apache is functioning normally</html>
1664| HTTPOptions:
1665| HTTP/1.1 200 OK
1666| Date: Thu, 16 Jan 2020 18:39:09 GMT
1667| Server: Apache/2
1668| Upgrade: h2,h2c
1669| Connection: Upgrade, close
1670| Allow: GET,POST,OPTIONS,HEAD
1671| Vary: User-Agent
1672| Content-Length: 0
1673|_ Content-Type: text/html
1674| http-brute:
1675|_ Path "/" does not require authentication
1676|_http-chrono: Request times for /; avg: 240.59ms; min: 203.27ms; max: 381.04ms
1677|_http-csrf: Couldn't find any CSRF vulnerabilities.
1678|_http-date: Thu, 16 Jan 2020 18:39:36 GMT; -5s from local time.
1679|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
1680|_http-dombased-xss: Couldn't find any DOM based XSS.
1681|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
1682|_http-errors: ERROR: Script execution failed (use -d to debug)
1683|_http-feed: Couldn't find any feeds.
1684|_http-fetch: Please enter the complete path of the directory to save data in.
1685| http-headers:
1686| Date: Thu, 16 Jan 2020 18:39:31 GMT
1687| Server: Apache/2
1688| Upgrade: h2,h2c
1689| Connection: Upgrade, close
1690| Last-Modified: Fri, 30 Aug 2019 21:14:16 GMT
1691| ETag: "2c-5915c1ac9ba00"
1692| Accept-Ranges: bytes
1693| Content-Length: 44
1694| Vary: User-Agent
1695| Content-Type: text/html
1696|
1697|_ (Request type: HEAD)
1698|_http-jsonp-detection: Couldn't find any JSONP endpoints.
1699| http-methods:
1700|_ Supported Methods: GET POST OPTIONS HEAD
1701|_http-mobileversion-checker: No mobile version detected.
1702| http-php-version: Logo query returned unknown hash 39687c596d2a53237334159b16fdd6c8
1703|_Credits query returned unknown hash 39687c596d2a53237334159b16fdd6c8
1704|_http-security-headers:
1705|_http-server-header: Apache/2
1706| http-sitemap-generator:
1707| Directory structure:
1708| Longest directory structure:
1709| Depth: 0
1710| Dir: /
1711| Total files found (by extension):
1712|_
1713|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
1714|_http-title: Site doesn't have a title (text/html).
1715|_http-userdir-enum: Potential Users: root
1716| http-vhosts:
1717| cms.static.internetadresi.com
1718|_126 names had status 200
1719|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
1720|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
1721|_http-xssed: No previously reported XSS vuln.
17221 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
1723SF-Port80-TCP:V=7.80%I=7%D=1/16%Time=5E20ADD1%P=x86_64-pc-linux-gnu%r(GetR
1724SF:equest,140,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Thu,\x2016\x20Jan\x20202
1725SF:0\x2018:39:09\x20GMT\r\nServer:\x20Apache/2\r\nUpgrade:\x20h2,h2c\r\nCo
1726SF:nnection:\x20Upgrade,\x20close\r\nLast-Modified:\x20Fri,\x2030\x20Aug\x
1727SF:202019\x2021:14:16\x20GMT\r\nETag:\x20\"2c-5915c1ac9ba00\"\r\nAccept-Ra
1728SF:nges:\x20bytes\r\nContent-Length:\x2044\r\nVary:\x20User-Agent\r\nConte
1729SF:nt-Type:\x20text/html\r\n\r\n<html>Apache\x20is\x20functioning\x20norma
1730SF:lly</html>\n")%r(HTTPOptions,D3,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Thu
1731SF:,\x2016\x20Jan\x202020\x2018:39:09\x20GMT\r\nServer:\x20Apache/2\r\nUpg
1732SF:rade:\x20h2,h2c\r\nConnection:\x20Upgrade,\x20close\r\nAllow:\x20GET,PO
1733SF:ST,OPTIONS,HEAD\r\nVary:\x20User-Agent\r\nContent-Length:\x200\r\nConte
1734SF:nt-Type:\x20text/html\r\n\r\n");
1735Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1736Aggressive OS guesses: Linux 2.6.32 (95%), Linux 3.5 (95%), Linux 3.8 (95%), Linux 2.6.32 - 3.10 (95%), Linux 2.6.32 - 3.13 (95%), Linux 2.6.32 - 3.9 (95%), Linux 3.2 (95%), Linux 2.6.32 - 3.1 (94%), Linux 3.11 (94%), Linux 3.1 (94%)
1737No exact OS matches for host (test conditions non-ideal).
1738Uptime guess: 42.528 days (since Thu Dec 5 01:00:39 2019)
1739Network Distance: 19 hops
1740TCP Sequence Prediction: Difficulty=259 (Good luck!)
1741IP ID Sequence Generation: All zeros
1742
1743TRACEROUTE (using port 80/tcp)
1744HOP RTT ADDRESS
17451 75.53 ms 10.252.204.1
17462 140.81 ms 104.245.145.177
17473 140.85 ms te0-1-1-9.219.ccr32.yyz02.atlas.cogentco.com (38.104.158.113)
17484 140.86 ms te0-0-0-1.agr13.yyz02.atlas.cogentco.com (154.24.54.37)
17495 140.88 ms ix-ae-16-0.tcore1.tnk-toronto.as6453.net (64.86.33.98)
17506 245.84 ms if-ae-2-2.tcore2.tnk-toronto.as6453.net (64.86.33.90)
17517 200.88 ms if-ae-8-2.tcore1.ct8-chicago.as6453.net (66.110.48.2)
17528 201.39 ms if-ae-26-2.tcore2.nto-new-york.as6453.net (216.6.81.28)
17539 206.07 ms if-ae-2-39.tcore2.l78-london.as6453.net (80.231.131.17)
175410 206.06 ms if-ae-32-3.tcore2.ldn-london.as6453.net (80.231.20.106)
175511 206.08 ms if-ae-14-2.tcore2.av2-amsterdam.as6453.net (80.231.131.161)
175612 206.05 ms if-ae-2-2.tcore1.av2-amsterdam.as6453.net (195.219.194.5)
175713 206.09 ms if-ae-2-2.tcore1.av2-amsterdam.as6453.net (195.219.194.5)
175814 206.08 ms if-ae-8-2.tcore1.it5-istanbul.as6453.net (195.219.156.22)
175915 235.72 ms if-ae-8-2.tcore1.it5-istanbul.as6453.net (195.219.156.22)
176016 235.74 ms sol-gw-brs01.internetadresi.com (92.45.78.54)
176117 235.74 ms sol-gw-brs01.internetadresi.com (92.45.78.54)
176218 174.21 ms 93-89-18-233.static.internetadresi.com (93.89.18.233)
176319 244.52 ms 93-89-20-20.static.internetadresi.com (93.89.20.20)
1764
1765NSE: Script Post-scanning.
1766Initiating NSE at 13:40
1767Completed NSE at 13:40, 0.00s elapsed
1768Initiating NSE at 13:40
1769Completed NSE at 13:40, 0.00s elapsed
1770######################################################################################################################################
1771Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-16 13:40 EST
1772NSE: Loaded 50 scripts for scanning.
1773NSE: Script Pre-scanning.
1774Initiating NSE at 13:40
1775Completed NSE at 13:40, 0.00s elapsed
1776Initiating NSE at 13:40
1777Completed NSE at 13:40, 0.00s elapsed
1778Initiating Ping Scan at 13:40
1779Scanning 93.89.20.20 [4 ports]
1780Completed Ping Scan at 13:40, 0.23s elapsed (1 total hosts)
1781Initiating Parallel DNS resolution of 1 host. at 13:40
1782Completed Parallel DNS resolution of 1 host. at 13:40, 0.02s elapsed
1783Initiating SYN Stealth Scan at 13:40
1784Scanning 93-89-20-20.static.internetadresi.com (93.89.20.20) [1 port]
1785Discovered open port 110/tcp on 93.89.20.20
1786Completed SYN Stealth Scan at 13:40, 0.26s elapsed (1 total ports)
1787Initiating Service scan at 13:40
1788Scanning 1 service on 93-89-20-20.static.internetadresi.com (93.89.20.20)
1789Completed Service scan at 13:40, 0.36s elapsed (1 service on 1 host)
1790Initiating OS detection (try #1) against 93-89-20-20.static.internetadresi.com (93.89.20.20)
1791Retrying OS detection (try #2) against 93-89-20-20.static.internetadresi.com (93.89.20.20)
1792Initiating Traceroute at 13:40
1793Completed Traceroute at 13:40, 0.46s elapsed
1794Initiating Parallel DNS resolution of 15 hosts. at 13:40
1795Completed Parallel DNS resolution of 15 hosts. at 13:40, 0.42s elapsed
1796NSE: Script scanning 93.89.20.20.
1797Initiating NSE at 13:40
1798NSE Timing: About 69.12% done; ETC: 13:42 (0:00:30 remaining)
1799Completed NSE at 13:42, 90.36s elapsed
1800Initiating NSE at 13:42
1801Completed NSE at 13:42, 0.05s elapsed
1802Nmap scan report for 93-89-20-20.static.internetadresi.com (93.89.20.20)
1803Host is up (0.22s latency).
1804
1805PORT STATE SERVICE VERSION
1806110/tcp open pop3 Dovecot DirectAdmin pop3d
1807|_pop3-capabilities: STLS PIPELINING AUTH-RESP-CODE CAPA RESP-CODES SASL(PLAIN) TOP UIDL USER
1808| vulscan: VulDB - https://vuldb.com:
1809| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
1810| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
1811| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
1812| [134243] InfinitumIT DirectAdmin up to 1.561 FileManager CSRF privilege escalation
1813| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
1814| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
1815| [131477] JBMC DirectAdmin 1.55 /CMD_ACCOUNT_ADMIN cross site request forgery
1816| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
1817| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
1818| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
1819| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
1820| [112266] JBMC DirectAdmin up to 1.51 email_ftp_password_change Setting memory corruption
1821| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
1822| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
1823| [95172] Directadmin Controlpanel 1.50.1 /CMD_SELECT_USERS cross site scripting
1824| [95100] DirectAdmin up to 1.50.1 Crash denial of service
1825| [69835] Dovecot 2.2.0/2.2.1 denial of service
1826| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
1827| [65684] Dovecot up to 2.2.6 unknown vulnerability
1828| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
1829| [63692] Dovecot up to 2.0.15 spoofing
1830| [7062] Dovecot 2.1.10 mail-search.c denial of service
1831| [62578] DirectAdmin 1.403 cross site scripting
1832| [61198] Jbmc-software DirectAdmin 1.403 cross site scripting
1833| [57517] Dovecot up to 2.0.12 Login directory traversal
1834| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
1835| [57515] Dovecot up to 2.0.12 Crash denial of service
1836| [54944] Dovecot up to 1.2.14 denial of service
1837| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
1838| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
1839| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
1840| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
1841| [53277] Dovecot up to 1.2.10 denial of service
1842| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
1843| [48756] Jbmc-software DirectAdmin up to 1.292 cross site scripting
1844| [48060] Jbmc-software DirectAdmin up to 1.17 privilege escalation
1845| [45256] Dovecot up to 1.1.5 directory traversal
1846| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
1847| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
1848| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
1849| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
1850| [40356] Dovecot 1.0.9 Cache unknown vulnerability
1851| [38747] DirectAdmin 1.30.2 cross site scripting
1852| [38222] Dovecot 1.0.2 directory traversal
1853| [37578] DirectAdmin 1.30.1 cross site scripting
1854| [36376] Dovecot up to 1.0.x directory traversal
1855| [36066] JBMC Software DirectAdmin 1.293 cross site scripting
1856| [35680] Jbmc Software DirectAdmin 1.293 cross site scripting
1857| [33341] JBMC Software DirectAdmin 1.28.1 cross site scripting
1858| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
1859|
1860| MITRE CVE - https://cve.mitre.org:
1861| [CVE-2012-5305] Cross-site scripting (XSS) vulnerability in CMD_DOMAIN in JBMC Software DirectAdmin 1.403 allows remote attackers to inject arbitrary web script or HTML via the domain parameter.
1862| [CVE-2012-3842] Multiple cross-site scripting (XSS) vulnerabilities in CMD_DOMAIN in JBMC Software DirectAdmin 1.403 allow remote authenticated users with certain privileges to inject arbitrary web script or HTML via the (1) select0 or (2) select8 parameters.
1863| [CVE-2011-5033] Stack-based buffer overflow in CFS.c in ConfigServer Security & Firewall (CSF) before 5.43, when running on a DirectAdmin server, allows local users to cause a denial of service (crash) via a long string in an admin.list file.
1864| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
1865| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
1866| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
1867| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
1868| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
1869| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
1870| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
1871| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
1872| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
1873| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
1874| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
1875| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
1876| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
1877| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
1878| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
1879| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
1880| [CVE-2009-2216] Cross-site scripting (XSS) vulnerability in CMD_REDIRECT in DirectAdmin 1.33.6 and earlier allows remote attackers to inject arbitrary web script or HTML via the URI in a view=advanced request.
1881| [CVE-2009-1526] JBMC Software DirectAdmin before 1.334 allows local users to create or overwrite any file via a symlink attack on an arbitrary file in a certain temporary directory, related to a request for this temporary file in the PATH_INFO to the CMD_DB script during a backup action.
1882| [CVE-2009-1525] CMD_DB in JBMC Software DirectAdmin before 1.334 allows remote authenticated users to gain privileges via shell metacharacters in the name parameter during a restore action.
1883| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
1884| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
1885| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
1886| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
1887| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
1888| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
1889| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
1890| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
1891| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
1892| [CVE-2007-4830] Cross-site scripting (XSS) vulnerability in CMD_BANDWIDTH_BREAKDOWN in DirectAdmin 1.30.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the user parameter.
1893| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
1894| [CVE-2007-3501] Cross-site scripting (XSS) vulnerability in CMD_USER_STATS in DirectAdmin 1.30.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the domain parameter, a different vector than CVE-2007-1508.
1895| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
1896| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
1897| [CVE-2007-1926] Cross-site scripting (XSS) vulnerability in JBMC Software DirectAdmin before 1.293 does not properly display log files, which allows remote authenticated users to inject arbitrary web script or HTML via (1) http or (2) ftp requests logged in /var/log/directadmin/security.log
1898| [CVE-2007-1508] Cross-site scripting (XSS) vulnerability in CMD_USER_STATS in DirectAdmin allows remote attackers to inject arbitrary web script or HTML via the RESULT parameter, a different vector than CVE-2006-5983.
1899| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
1900| [CVE-2006-5983] Multiple cross-site scripting (XSS) vulnerabilities in JBMC Software DirectAdmin 1.28.1 allow remote authenticated users to inject arbitrary web script or HTML via the (1) user parameter to (a) CMD_SHOW_RESELLER or (b) CMD_SHOW_USER in the Admin level
1901| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
1902| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
1903| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
1904| [CVE-2006-2153] Cross-site scripting (XSS) vulnerability in HTM_PASSWD in DirectAdmin Hosting Management allows remote attackers to inject arbitrary web script or HTML via the domain parameter.
1905| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
1906| [CVE-2002-0925] Format string vulnerability in mmsyslog function allows remote attackers to execute arbitrary code via (1) the USER command to mmpop3d for mmmail 0.0.13 and earlier, (2) the HELO command to mmsmtpd for mmmail 0.0.13 and earlier, or (3) the USER command to mmftpd 0.0.7 and earlier.
1907| [CVE-2001-0143] vpop3d program in linuxconf 1.23r and earlier allows local users to overwrite arbitrary files via a symlink attack.
1908| [CVE-2000-1197] POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes.
1909| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
1910|
1911| SecurityFocus - https://www.securityfocus.com/bid/:
1912| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
1913| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
1914| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
1915| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
1916| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
1917| [83952] DirectAdmin CVE-2006-2153 Cross-Site Scripting Vulnerability
1918| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
1919| [67306] Dovecot Denial of Service Vulnerability
1920| [67219] akpop3d 'pszQuery' Remote Memory Corruption Vulnerability
1921| [63911] Installatron Plugin for DirectAdmin Insecure Temporary File Creation Vulnerability
1922| [63373] Installatron Plugin for DirectAdmin cURL Output Remote Privilege Escalation Vulnerability
1923| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
1924| [62929] DirectAdmin Backup Multiple Security Vulnerabilities
1925| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
1926| [61017] DirectAdmin Symlink Attack Multiple Remote Privilege Escalation Vulnerabilities
1927| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
1928| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
1929| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
1930| [53281] DirectAdmin Multiple Cross Site Scripting Vulnerabilities
1931| [52848] RETIRED: DirectAdmin 'CMD_DOMAIN' Cross-Site Scripting Vulnerability
1932| [52845] JBMC Software DirectAdmin 'domain' Parameter Cross Site Scripting Vulnerability
1933| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
1934| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
1935| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
1936| [47693] DirectAdmin 'mysql_backup' Folder Permissions Information Disclosure Vulnerability
1937| [47690] DirectAdmin Hard Link Local Privilege Escalation Vulnerability
1938| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
1939| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
1940| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
1941| [39838] tpop3d Remote Denial of Service Vulnerability
1942| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
1943| [38721] DirectAdmin 'CMD_DB_VIEW' Cross-Site Scripting Vulnerability
1944| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
1945| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
1946| [35450] DirectAdmin 'CMD_REDIRECT' Cross-Site Scripting Vulnerability
1947| [34678] DirectAdmin '/CMD_DB' Restore Action Local Privilege Escalation Vulnerability
1948| [34676] DirectAdmin '/CMD_DB' Backup Action Insecure Temporary File Creation Vulnerability
1949| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
1950| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
1951| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
1952| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
1953| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
1954| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
1955| [25607] DirectAdmin CMD_BANDWIDTH_BREAKDOWN Cross-Site Scripting Vulnerability
1956| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
1957| [24688] DirectAdmin Domain Parameter Cross-Site Scripting Vulnerability
1958| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
1959| [23254] DirectAdmin Logfile HTML Injection Vulnerability
1960| [22996] DirectAdmin CMD_USER_STATS Cross-Site Scripting Vulnerability
1961| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
1962| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
1963| [21049] DirectAdmin Multiple Cross-Site Scripting Vulnerabilities
1964| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
1965| [17961] Dovecot Remote Information Disclosure Vulnerability
1966| [16672] Dovecot Double Free Denial of Service Vulnerability
1967| [8495] akpop3d User Name SQL Injection Vulnerability
1968| [8473] Vpop3d Remote Denial Of Service Vulnerability
1969| [3990] ZPop3D Bad Login Logging Failure Vulnerability
1970| [2781] DynFX MailServer POP3d Denial of Service Vulnerability
1971|
1972| IBM X-Force - https://exchange.xforce.ibmcloud.com:
1973| [86382] Dovecot POP3 Service denial of service
1974| [85490] DirectAdmin Backup System email account functionality symlink
1975| [85488] DirectAdmin Backup System symlink
1976| [84396] Dovecot IMAP APPEND denial of service
1977| [80453] Dovecot mail-search.c denial of service
1978| [74569] DirectAdmin CMD_DOMAIN cross-site scripting
1979| [72685] DirectAdmin domain parameter cross-site request forgery
1980| [71354] Dovecot SSL Common Name (CN) weak security
1981| [67675] Dovecot script-login security bypass
1982| [67674] Dovecot script-login directory traversal
1983| [67589] Dovecot header name denial of service
1984| [67254] DirectAdmin MySQL information disclosure
1985| [67253] DirectAdmin hard link privilege escalation
1986| [63267] Apple Mac OS X Dovecot information disclosure
1987| [62340] Dovecot mailbox security bypass
1988| [62339] Dovecot IMAP or POP3 denial of service
1989| [62256] Dovecot mailbox security bypass
1990| [62255] Dovecot ACL entry security bypass
1991| [60639] Dovecot ACL plugin weak security
1992| [57267] Apple Mac OS X Dovecot Kerberos security bypass
1993| [56875] DirectAdmin name cross-site scripting
1994| [56763] Dovecot header denial of service
1995| [55181] DirectAdmin account cross-site request forgery
1996| [54363] Dovecot base_dir privilege escalation
1997| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
1998| [51292] DirectAdmin CMD_REDIRECT cross-site scripting
1999| [50167] DirectAdmin CMD_DB command execution
2000| [49416] DirectAdmin CMD_DB backup action symlink
2001| [46323] Dovecot dovecot.conf information disclosure
2002| [46227] Dovecot message parsing denial of service
2003| [45669] Dovecot ACL mailbox security bypass
2004| [45667] Dovecot ACL plugin rights security bypass
2005| [41085] Dovecot TAB characters authentication bypass
2006| [41009] Dovecot mail_extra_groups option unauthorized access
2007| [39342] Dovecot LDAP auth cache configuration security bypass
2008| [36510] DirectAdmin user parameter cross-site scripting
2009| [35767] Dovecot ACL plugin security bypass
2010| [35177] DirectAdmin domain parameter cross-site scripting
2011| [34082] Dovecot mbox-storage.c directory traversal
2012| [33390] DirectAdmin log file cross-site scripting
2013| [33023] DirectAdmin CMD_USER_STATS form cross-site scripting
2014| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
2015| [30256] DirectAdmin user, TYPE, and name parameters cross-site scripting
2016| [26578] Cyrus IMAP pop3d buffer overflow
2017| [26536] Dovecot IMAP LIST information disclosure
2018| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
2019| [24709] Dovecot APPEND command denial of service
2020| [13018] akpop3d authentication code SQL injection
2021| [7345] Slackware Linux imapd and ipop3d core dump
2022| [6269] imap, ipop2d and ipop3d buffer overflows
2023| [5923] Linuxconf vpop3d symbolic link
2024| [4918] IPOP3D, Buffer overflow attack
2025| [1560] IPOP3D, user login successful
2026| [1559] IPOP3D user login to remote host successful
2027| [1525] IPOP3D, user logout
2028| [1524] IPOP3D, user auto-logout
2029| [1523] IPOP3D, user login failure
2030| [1522] IPOP3D, brute force attack
2031| [1521] IPOP3D, user kiss of death logout
2032| [418] pop3d mktemp creates insecure temporary files
2033|
2034| Exploit-DB - https://www.exploit-db.com:
2035| [29747] DirectAdmin 1.292 CMD_USER_STATS Cross-Site Scripting Vulnerability
2036| [29006] DirectAdmin 1.28/1.29 CMD_FTP_SHOW DOMAIN Parameter XSS
2037| [29005] DirectAdmin 1.28/1.29 CMD_EMAIL_LIST name Parameter XSS
2038| [29004] DirectAdmin 1.28/1.29 CMD_EMAIL_VACATION_MODIFY user Parameter XSS
2039| [29003] DirectAdmin 1.28/1.29 CMD_TICKET type Parameter XSS
2040| [29002] DirectAdmin 1.28/1.29 CMD_EMAIL_FORWARDER_MODIFY user Parameter XSS
2041| [29001] DirectAdmin 1.28/1.29 CMD_TICKET_CREATE TYPE Parameter XSS
2042| [29000] DirectAdmin 1.28/1.29 CMD_SHOW_USER user Parameter XSS
2043| [28999] DirectAdmin 1.28/1.29 CMD_SHOW_RESELLER user Parameter XSS
2044| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
2045| [23053] Vpop3d Remote Denial of Service Vulnerability
2046| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
2047| [11893] tPop3d 1.5.3 DoS
2048| [11813] DirectAdmin 1.34.4 - Multi CSRF vulnerability
2049| [11029] DirectAdmin <= 1.33.6 Symlink Permission Bypass
2050| [10779] DirectAdmin 1.34.0 - CSRF Create Administrator Vulnerability
2051| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
2052| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
2053| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
2054| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
2055|
2056| OpenVAS (Nessus) - http://www.openvas.org:
2057| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
2058| [901025] Dovecot Version Detection
2059| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
2060| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
2061| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
2062| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
2063| [870607] RedHat Update for dovecot RHSA-2011:0600-01
2064| [870471] RedHat Update for dovecot RHSA-2011:1187-01
2065| [870153] RedHat Update for dovecot RHSA-2008:0297-02
2066| [863272] Fedora Update for dovecot FEDORA-2011-7612
2067| [863115] Fedora Update for dovecot FEDORA-2011-7258
2068| [861525] Fedora Update for dovecot FEDORA-2007-664
2069| [861394] Fedora Update for dovecot FEDORA-2007-493
2070| [861333] Fedora Update for dovecot FEDORA-2007-1485
2071| [860845] Fedora Update for dovecot FEDORA-2008-9202
2072| [860663] Fedora Update for dovecot FEDORA-2008-2475
2073| [860169] Fedora Update for dovecot FEDORA-2008-2464
2074| [860089] Fedora Update for dovecot FEDORA-2008-9232
2075| [840950] Ubuntu Update for dovecot USN-1295-1
2076| [840668] Ubuntu Update for dovecot USN-1143-1
2077| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
2078| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
2079| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
2080| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
2081| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
2082| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
2083| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
2084| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
2085| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
2086| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
2087| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
2088| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
2089| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
2090| [70259] FreeBSD Ports: dovecot
2091| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
2092| [66522] FreeBSD Ports: dovecot
2093| [65010] Ubuntu USN-838-1 (dovecot)
2094| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
2095| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
2096| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
2097| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
2098| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
2099| [62854] FreeBSD Ports: dovecot-managesieve
2100| [61916] FreeBSD Ports: dovecot
2101| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
2102| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
2103| [60528] FreeBSD Ports: dovecot
2104| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
2105| [60089] FreeBSD Ports: dovecot
2106| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
2107| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
2108|
2109| SecurityTracker - https://www.securitytracker.com:
2110| [1028744] DirectAdmin Backup System Flaws Let Local Users Gain Elevated Privileges
2111| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
2112| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
2113| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
2114|
2115| OSVDB - http://www.osvdb.org:
2116| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
2117| [94899] DirectAdmin Backup System Unspecified Email Account Function Symlink Local Privilege Escalation
2118| [94898] DirectAdmin Backup System Unspecified Symlink Arbitrary File Manipulation Local Privilege Escalation
2119| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
2120| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
2121| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
2122| [80919] DirectAdmin CMD_DOMAIN Multiple Parameter XSS
2123| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
2124| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
2125| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
2126| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
2127| [72120] DirectAdmin mysql_backups Folder MySQL Database Backup Local Disclosure
2128| [72119] DirectAdmin Backup Creation Hard Link Check Weakness Local Privilege Escalation
2129| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
2130| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
2131| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
2132| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
2133| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
2134| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
2135| [66113] Dovecot Mail Root Directory Creation Permission Weakness
2136| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
2137| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
2138| [66110] Dovecot Multiple Unspecified Buffer Overflows
2139| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
2140| [64783] Dovecot E-mail Message Header Unspecified DoS
2141| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
2142| [62914] DirectAdmin CMD_DB_VIEW name Parameter XSS
2143| [62796] Dovecot mbox Format Email Header Handling DoS
2144| [61395] DirectAdmin Admin Account Creation CSRF
2145| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
2146| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
2147| [55296] DirectAdmin CMD_REDIRECT URL Parameter XSS
2148| [54015] DirectAdmin CMD_DB name Parameter Shell Metacharacter Arbitrary Command Execution
2149| [54014] DirectAdmin CMD_DB Database Backup Request Temporary File Symlink Arbitrary File Overwrite
2150| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
2151| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
2152| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
2153| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
2154| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
2155| [43137] Dovecot mail_extra_groups Symlink File Manipulation
2156| [42979] Dovecot passdbs Argument Injection Authentication Bypass
2157| [39876] Dovecot LDAP Auth Cache Security Bypass
2158| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
2159| [36999] DirectAdmin CMD_BANDWIDTH_BREAKDOWN user Parameter XSS
2160| [36339] DirectAdmin CMD_USER_STATS domain Parameter XSS
2161| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
2162| [34687] DirectAdmin http/ftp XSS Log Viewer Data Injection
2163| [34273] DirectAdmin CMD_USER_STATS RESULT Parameter XSS
2164| [32676] DirectAdmin CMD_FTP_SHOW DOMAIN Parameter XSS
2165| [32675] DirectAdmin CMD_EMAIL_LIST name Parameter XSS
2166| [32674] DirectAdmin CMD_EMAIL_VACATION_MODIFY user Parameter XSS
2167| [32673] DirectAdmin CMD_TICKET type Parameter XSS
2168| [32672] DirectAdmin CMD_EMAIL_FORWARDER_MODIFY user Parameter XSS
2169| [32671] DirectAdmin CMD_TICKET_CREATE TYPE Parameter XSS
2170| [32670] DirectAdmin CMD_SHOW_USER user Parameter XSS
2171| [32669] DirectAdmin CMD_SHOW_RESELLER user Parameter XSS
2172| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
2173| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
2174| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
2175| [25138] DirectAdmin HTM_PASSWD domain Parameter XSS
2176| [23281] Dovecot imap/pop3-login dovecot-auth DoS
2177| [23280] Dovecot Malformed APPEND Command DoS
2178| [14459] mmmail mmpop3d USER Command mmsyslog Function Format String
2179| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
2180| [5857] Linux pop3d Arbitrary Mail File Access
2181| [2471] akpop3d username SQL Injection
2182|_
2183Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2184Aggressive OS guesses: Linux 2.6.32 (95%), Linux 2.6.32 - 3.1 (95%), Linux 3.8 (95%), Linux 2.6.32 - 3.10 (95%), Linux 2.6.32 - 3.13 (95%), Linux 2.6.32 - 3.9 (95%), Linux 3.2 (95%), Linux 3.5 (94%), Linux 3.1 (94%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%)
2185No exact OS matches for host (test conditions non-ideal).
2186Uptime guess: 42.529 days (since Thu Dec 5 01:00:39 2019)
2187Network Distance: 18 hops
2188TCP Sequence Prediction: Difficulty=263 (Good luck!)
2189IP ID Sequence Generation: All zeros
2190
2191TRACEROUTE (using port 110/tcp)
2192HOP RTT ADDRESS
21931 80.60 ms 10.252.204.1
21942 80.65 ms 104.245.145.177
21953 80.72 ms te0-1-1-9.219.ccr32.yyz02.atlas.cogentco.com (38.104.158.113)
21964 51.56 ms be3435.ccr31.yyz02.atlas.cogentco.com (154.54.85.57)
21975 81.44 ms te0-9-0-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.141)
21986 201.65 ms if-ae-2-2.tcore2.tnk-toronto.as6453.net (64.86.33.90)
21997 170.70 ms if-ae-2-2.tcore2.tnk-toronto.as6453.net (64.86.33.90)
22008 223.68 ms if-ae-26-2.tcore2.nto-new-york.as6453.net (216.6.81.28)
22019 223.57 ms if-ae-32-3.tcore2.ldn-london.as6453.net (80.231.20.106)
220210 223.66 ms if-ae-15-2.tcore2.l78-london.as6453.net (80.231.131.117)
220311 223.69 ms if-ae-15-2.tcore2.l78-london.as6453.net (80.231.131.117)
220412 199.27 ms if-ae-2-2.tcore1.av2-amsterdam.as6453.net (195.219.194.5)
220513 191.74 ms if-ae-2-2.tcore1.av2-amsterdam.as6453.net (195.219.194.5)
220614 191.68 ms if-ae-8-2.tcore1.it5-istanbul.as6453.net (195.219.156.22)
220715 223.70 ms 5.23.0.38
220816 223.79 ms sol-gw-brs01.internetadresi.com (92.45.78.54)
220917 199.26 ms 93-89-18-233.static.internetadresi.com (93.89.18.233)
221018 220.76 ms 93-89-20-20.static.internetadresi.com (93.89.20.20)
2211
2212NSE: Script Post-scanning.
2213Initiating NSE at 13:42
2214Completed NSE at 13:42, 0.00s elapsed
2215Initiating NSE at 13:42
2216Completed NSE at 13:42, 0.00s elapsed
2217######################################################################################################################################
2218Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-16 13:42 EST
2219NSE: Loaded 162 scripts for scanning.
2220NSE: Script Pre-scanning.
2221Initiating NSE at 13:42
2222Completed NSE at 13:42, 0.00s elapsed
2223Initiating NSE at 13:42
2224Completed NSE at 13:42, 0.00s elapsed
2225Initiating Parallel DNS resolution of 1 host. at 13:42
2226Completed Parallel DNS resolution of 1 host. at 13:42, 0.02s elapsed
2227Initiating SYN Stealth Scan at 13:42
2228Scanning 93-89-20-20.static.internetadresi.com (93.89.20.20) [1 port]
2229Discovered open port 443/tcp on 93.89.20.20
2230Completed SYN Stealth Scan at 13:42, 0.23s elapsed (1 total ports)
2231Initiating Service scan at 13:42
2232Scanning 1 service on 93-89-20-20.static.internetadresi.com (93.89.20.20)
2233Completed Service scan at 13:43, 27.04s elapsed (1 service on 1 host)
2234Initiating OS detection (try #1) against 93-89-20-20.static.internetadresi.com (93.89.20.20)
2235Retrying OS detection (try #2) against 93-89-20-20.static.internetadresi.com (93.89.20.20)
2236Initiating Traceroute at 13:43
2237Completed Traceroute at 13:43, 0.42s elapsed
2238Initiating Parallel DNS resolution of 17 hosts. at 13:43
2239Completed Parallel DNS resolution of 17 hosts. at 13:43, 0.37s elapsed
2240NSE: Script scanning 93.89.20.20.
2241Initiating NSE at 13:43
2242Completed NSE at 13:44, 90.53s elapsed
2243Initiating NSE at 13:44
2244Completed NSE at 13:44, 1.87s elapsed
2245Nmap scan report for 93-89-20-20.static.internetadresi.com (93.89.20.20)
2246Host is up (0.19s latency).
2247
2248PORT STATE SERVICE VERSION
2249443/tcp open ssl/ssl Apache httpd (SSL-only mode)
2250| http-brute:
2251|_ Path "/" does not require authentication
2252|_http-chrono: Request times for /; avg: 369.76ms; min: 320.73ms; max: 455.92ms
2253|_http-csrf: Couldn't find any CSRF vulnerabilities.
2254|_http-date: Thu, 16 Jan 2020 18:43:13 GMT; -5s from local time.
2255|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
2256|_http-dombased-xss: Couldn't find any DOM based XSS.
2257|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
2258|_http-errors: ERROR: Script execution failed (use -d to debug)
2259|_http-feed: Couldn't find any feeds.
2260|_http-fetch: Please enter the complete path of the directory to save data in.
2261| http-headers:
2262| Date: Thu, 16 Jan 2020 18:43:23 GMT
2263| Server: Apache/2
2264| Upgrade: h2,h2c
2265| Connection: Upgrade, close
2266| Last-Modified: Fri, 30 Aug 2019 21:14:16 GMT
2267| ETag: "2c-5915c1ac9ba00"
2268| Accept-Ranges: bytes
2269| Content-Length: 44
2270| Vary: User-Agent
2271| Content-Type: text/html
2272|
2273|_ (Request type: HEAD)
2274|_http-jsonp-detection: Couldn't find any JSONP endpoints.
2275| http-methods:
2276|_ Supported Methods: GET HEAD POST OPTIONS
2277|_http-mobileversion-checker: No mobile version detected.
2278|_http-php-version: Credits query returned unknown hash 39687c596d2a53237334159b16fdd6c8
2279| http-security-headers:
2280| Strict_Transport_Security:
2281|_ HSTS not configured in HTTPS Server
2282|_http-server-header: Apache/2
2283| http-sitemap-generator:
2284| Directory structure:
2285| /
2286| Other: 1
2287| Longest directory structure:
2288| Depth: 0
2289| Dir: /
2290| Total files found (by extension):
2291|_ Other: 1
2292|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
2293|_http-title: Site doesn't have a title (text/html).
2294|_http-userdir-enum: Potential Users: root
2295| http-vhosts:
2296| mail3.static.internetadresi.com
2297| shop.static.internetadresi.com : 400
2298| sql.static.internetadresi.com : 400
2299| ssl.static.internetadresi.com : 400
2300| dns.static.internetadresi.com : 400
2301| voip.static.internetadresi.com : 400
2302|_121 names had status 200
2303|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
2304|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
2305|_http-xssed: No previously reported XSS vuln.
2306| vulscan: VulDB - https://vuldb.com:
2307| [141649] Apache OFBiz up to 16.11.05 Form Widget Freemarker Markup Code Execution
2308| [141648] Apache OFBiz up to 16.11.05 Application Stored cross site scripting
2309| [140386] Apache Commons Beanutils 1.9.2 BeanIntrospector unknown vulnerability
2310| [139708] Apache Ranger up to 1.2.0 Policy Import cross site scripting
2311| [139540] cPanel up to 60.0.24 Apache HTTP Server Key information disclosure
2312| [139386] Apache Tike up to 1.21 RecursiveParserWrapper Stack-based memory corruption
2313| [139385] Apache Tika 1.19/1.20/1.21 SAXParsers Hang denial of service
2314| [139384] Apache Tika up to 1.21 RecursiveParserWrapper ZIP File denial of service
2315| [139261] Apache Solr 8.2.0 DataImportHandler Parameter unknown vulnerability
2316| [139259] cPanel up to 68.0.26 WHM Apache Includes Editor information disclosure
2317| [139256] cPanel up to 68.0.26 WHM Apache Configuration Include Editor cross site scripting
2318| [139239] cPanel up to 70.0.22 Apache HTTP Server Log information disclosure
2319| [139141] Apache ActiveMQ Client up to 5.15.4 ActiveMQConnection.java ActiveMQConnection denial of service
2320| [139130] cPanel up to 73.x Apache HTTP Server Injection privilege escalation
2321| [138914] Venustech Apache VCL 2.1/2.2/2.3/2.4/2.5 VM sql injection
2322| [138913] Venustech Apache VCL 2.1/2.2/2.3/2.4/2.5 Block Argument privilege escalation
2323| [138912] Venustech Apache VCL 2.1/2.2/2.3/2.4/2.5 Cookie sql injection
2324| [138816] Apache Storm up to 1.2.2 Logviewer Daemon Log information disclosure
2325| [138815] Apache Storm up to 1.2.2 UI Daemon Deserialization privilege escalation
2326| [138164] Oracle 2.7.0.1 Apache Log4j unknown vulnerability
2327| [138155] Oracle Agile Engineering Data Management 6.2.0/6.2.1 Apache Tomcat unknown vulnerability
2328| [138151] Oracle Transportation Management 6.3.7 Apache Tomcat unknown vulnerability
2329| [138149] Oracle Agile Engineering Data Management 6.2.0/6.2.1 Apache Commons FileUpload unknown vulnerability
2330| [138131] Oracle MICROS Retail XBRi Loss Prevention 10.8.0/10.8.1/10.8.2/10.8.3 Apache Tomcat unknown vulnerability
2331| [138129] Oracle Retail Xstore Point of Service 7.0/7.1 Apache HTTP Server denial of service
2332| [138123] Oracle Retail Order Management System 5.0 Apache Struts 1 unknown vulnerability
2333| [138122] Oracle Retail Order Broker 5.2/15.0 Apache Tomcat unknown vulnerability
2334| [138121] Oracle Retail Order Broker 5.2/15.0 Apache CXF unknown vulnerability
2335| [138112] Oracle Retail Integration Bus 15.0/16.0 Apache Commons FileUpload unknown vulnerability
2336| [138111] Oracle MICROS Retail XBRi Loss Prevention 10.8.0/10.8.1/10.8.2/10.8.3 Apache Commons FileUpload unknown vulnerability
2337| [138103] Oracle PeopleSoft Enterprise PeopleTools 8.55/8.56/8.57 Apache WSS4J information disclosure
2338| [138053] Oracle JD Edwards EnterpriseOne Tools 9.2 Apache Log4j unknown vulnerability
2339| [138036] Oracle Insurance Rules Palette 10.0/10.1/10.2/11.0 Apache Commons FileUpload unknown vulnerability
2340| [138035] Oracle Insurance Policy Administration J2EE 10.0/10.1/10.2/11.0 Apache Commons FileUpload unknown vulnerability
2341| [138034] Oracle Insurance Calculation Engine 9.7/10.0/10.1/10.2 Apache Commons FileUpload unknown vulnerability
2342| [138028] Oracle Identity Manager 11.1.2.3.0/12.2.1.3.0 Apache Log4j unknown vulnerability
2343| [138020] Oracle BI Publisher 11.1.1.9.0 Apache Tomcat unknown vulnerability
2344| [138019] Oracle BI Publisher (formerly XML Publisher) 11.1.1.9.0 Apache Tomcat unknown vulnerability
2345| [138017] Oracle Outside In Technology 8.5.4 Apache Commons FileUpload unknown vulnerability
2346| [138013] Oracle Outside In Technology 8.5.4 Apache Tomcat unknown vulnerability
2347| [138012] Oracle Outside In Technology 8.5.4 Apache HTTP Server unknown vulnerability
2348| [138009] Oracle Outside In Technology 8.5.4 Apache HTTP Server unknown vulnerability
2349| [138008] Oracle WebLogic Server 10.3.6.0.0/12.1.3.0.0/12.2.1.3.0 Apache Struts 1 denial of service
2350| [138007] Oracle WebCenter Sites 12.2.1.3.0 Apache Tomcat denial of service
2351| [138006] Oracle Enterprise Repository 12.1.3.0.0 Apache CXF denial of service
2352| [138000] Oracle WebCenter Sites 12.2.1.3.0 Apache Commons FileUpload unknown vulnerability
2353| [137999] Oracle WebLogic Server 10.3.6.0.0/12.1.3.0.0/12.2.1.3.0 Apache Commons FileUpload unknown vulnerability
2354| [137995] Oracle Hospitality Simphony 18.2.1 Apache WSS4J information disclosure
2355| [137987] Oracle FLEXCUBE Universal Banking up to 12.0.3/12.4.0/14.2.0 Apache Log4j unknown vulnerability
2356| [137981] Oracle Insurance IFRS 17 Analyzer 8.0.6/8.0.7 Apache Commons FileUpload unknown vulnerability
2357| [137980] Oracle Insurance Data Foundation 8.0.4/8.0.5/8.0.6/8.0.7 Apache Commons FileUpload unknown vulnerability
2358| [137979] Oracle 8.0.8 Apache Commons FileUpload unknown vulnerability
2359| [137973] Oracle 8.0.4/8.0.5/8.0.6/8.0.7 Apache Batik unknown vulnerability
2360| [137970] Oracle Financial Services Profitability Management 8.0.4/8.0.5/8.0.6/8.0.7 Apache ActiveMQ unknown vulnerability
2361| [137967] Oracle up to 8.0.7 Apache httpd unknown vulnerability
2362| [137966] Oracle 8.0.7/8.0.8 Apache Groovy unknown vulnerability
2363| [137965] Oracle Financial Services Liquidity Risk Management 8.0.1/8.0.2/8.0.4/8.0.5/8.0.6 Apache Commons FileUpload unknown vulnerability
2364| [137964] Oracle 8.0.4/8.0.5/8.0.6/8.0.7 Apache Log4j unknown vulnerability
2365| [137933] Oracle Banking Platform up to 2.7.1 Apache Tika unknown vulnerability
2366| [137926] Oracle Enterprise Manager for Fusion Middleware 13.2/13.3 Apache Commons FileUpload information disclosure
2367| [137924] Oracle Enterprise Manager Base Platform 12.1.0.5.0/13.2.0.0.0/13.3.0.0.0 Apache Commons FileUpload unknown vulnerability
2368| [137914] Oracle E-Business Suite up to 12.2.8 Apache ActiveMQ unknown vulnerability
2369| [137913] Oracle E-Business Suite up to 12.2.8 Apache ActiveMQ unknown vulnerability
2370| [137911] Oracle E-Business Suite up to 12.2.8 Apache HTTP Server unknown vulnerability
2371| [137910] Oracle E-Business Suite up to 12.2.8 Apache CXF information disclosure
2372| [137909] Oracle E-Business Suite up to 12.2.8 Apache Commons FileUpload unknown vulnerability
2373| [137905] Oracle Primavera Gateway 15.2/16.2/17.12/18.8 Apache Tika denial of service
2374| [137901] Oracle Primavera Unifier up to 18.8 Apache HTTP Server unknown vulnerability
2375| [137895] Oracle Instant Messaging Server 10.0.1.2.0 Apache Tika information disclosure
2376| [137894] Oracle EAGLE (Software) 46.5/46.6/46.7 Apache Tomcat information disclosure
2377| [137892] Oracle Online Mediation Controller 6.1 Apache Batik denial of service
2378| [137891] Oracle Interactive Session Recorder 6.0/6.1/6.2 Apache Tomcat unknown vulnerability
2379| [137885] Oracle Diameter Signaling Router (DSR) 8.0/8.1/8.2 Apache cxf unknown vulnerability
2380| [137882] Oracle Unified 8.0.0.2.0 Apache Commons FileUpload unknown vulnerability
2381| [137881] Oracle Online Mediation Controller 6.1 Apache Commons FileUpload unknown vulnerability
2382| [137880] Oracle Interactive Session Recorder 6.0/6.1/6.2 Apache Log4j unknown vulnerability
2383| [137879] Oracle Convergence 3.0.2 Apache Commons FileUpload unknown vulnerability
2384| [137876] Oracle Application Session Controller 3.7.1/3.8.0 Apache Commons FileUpload unknown vulnerability
2385| [137829] Apache Roller 5.2.3 Math Comment Authenticator Reflected cross site scripting
2386| [137736] Apache Kafka 0.11.0.0/2.1.0 ACL Validation Request privilege escalation
2387| [136858] MakerBot Replicator 5G Printer Apache HTTP Server information disclosure
2388| [136849] Analogic Poste.io 2.1.6 on Apache RoundCube logs/ information disclosure
2389| [136822] Apache Tomcat up to 8.5.40/9.0.19 Incomplete Fix CVE-2019-0199 Resource Exhaustion denial of service
2390| [136808] Apache Geode up to 1.8.0 Secure Mode privilege escalation
2391| [136646] Apache Allura up to 1.10.x Dropdown Selector Stored cross site scripting
2392| [136374] Apache HTTP Server up to 2.4.38 Slash Regular Expression unknown vulnerability
2393| [136373] Apache HTTP Server 2.4.34/2.4.35/2.4.36/2.4.37/2.4.38 HTTP2 Request Crash denial of service
2394| [136372] Apache HTTP Server up to 2.4.38 HTTP2 Request unknown vulnerability
2395| [136370] Apache Fineract up to 1.2.x sql injection
2396| [136369] Apache Fineract up to 1.2.x sql injection
2397| [135731] Apache Hadoop up to 2.8.4/2.9.1/3.1.0 yarn privilege escalation
2398| [135664] Apache Tomcat up to 7.0.93/8.5.39/9.0.0.17 SSI printenv Command cross site scripting
2399| [135663] Apache Camel up to 2.23.x JSON-lib Library XML Data XML External Entity
2400| [135661] Apache Roller up to 5.2.1/5.2.0 XML-RPC Interface XML File Server-Side Request Forgery
2401| [135402] Apache Zookeeper up to 3.4.13/3.5.0-alpha to 3.5.4-beta getACL() information disclosure
2402| [135270] Apache JSPWiki up to 2.11.0.M3 Plugin Link cross site scripting
2403| [135269] Apache JSPWiki up to 2.11.0.M3 InterWiki Link cross site scripting
2404| [135268] Apache JSPWiki up to 2.11.0.M3 Attachment cross site scripting
2405| [134527] Apache Karaf up to 4.2.4 Config Service directory traversal
2406| [134416] Apache Sanselan 0.97-incubator Loop denial of service
2407| [134415] Apache Sanselan 0.97-incubator Hang denial of service
2408| [134291] Apache Axis up to 1.7.8 Server-Side Request Forgery
2409| [134290] Apache UIMA DUCC up to 2.2.2 cross site scripting
2410| [134248] Apache Archiva up to 2.2.3 Artifact Upload directory traversal
2411| [134247] Apache Archiva up to 2.2.3 Artifact Upload directory traversal
2412| [134246] Apache Camel up to 2.19/2.21.3/2.22.2/2.23.0 directory traversal
2413| [134138] Apache Pluto 3.0.0/3.0.1 Chat Room Demo Portlet cross site scripting
2414| [133992] Apache Qpid Proton up to 0.27.0 Certificate Validation Man-in-the-Middle weak authentication
2415| [133977] Apache Zeppelin up to 0.7.x Stored cross site scripting
2416| [133976] Apache Zeppelin up to 0.7.x Cron Scheduler privilege escalation
2417| [133975] Apache Zeppelin up to 0.7.2 Session Fixation weak authentication
2418| [133444] Apache PDFbox 2.0.14 XML Parser XML External Entity
2419| [133573] Oracle FLEXCUBE Private Banking 2.0.0.0/2.2.0.1/12.0.1.0/12.0.3.0/12.1.0.0 Apache ActiveMQ unknown vulnerability
2420| [133407] Apache Tomcat up to 7.0.93/8.5.39/9.0.17 on Windows JRE Command Line Argument Code Execution
2421| [133315] Apache Airflow up to 1.10.2 HTTP Endpoint cross site request forgery
2422| [133314] Apache Airflow up to 1.10.2 Metadata Database cross site scripting
2423| [133290] Apache Tomcat up to 8.5.37/9.0.14 HTTP2 Stream Execution denial of service
2424| [133112] Apache HTTP Server up to 2.4.38 mod_auth_digest race condition privilege escalation
2425| [133111] Apache HTTP Server 2.4.37/2.4.38 mod_ssl Bypass privilege escalation
2426| [133092] Airsonic 10.2.1 org.apache.commons.lang.RandomStringUtils RecoverController.java java.util.Random weak authentication
2427| [132568] Apache JSPWiki up to 2.11.0.M2 URL User information disclosure
2428| [132567] Apache JSPWiki up to 2.11.0.M2 URL cross site scripting
2429| [132566] Apache ActiveMQ up to 5.15.8 MQTT Frame Memory denial of service
2430| [132565] Apache HBase up to 2.1.3 REST Server Request privilege escalation
2431| [132183] Apache Mesos up to pre-1.4.x Docker Image Code Execution
2432| [131988] Apache Karaf up to 4.2.2 kar Deployer directory traversal
2433| [131859] Apache Hadoop up to 2.9.1 privilege escalation
2434| [131479] Apache Solr up to 7.6 HTTP GET Request Server-Side Request Forgery
2435| [131446] Apache Solr up to 5.0.5/6.6.5 Config API HTTP POST Request Code Execution
2436| [131385] Apache Qpid Broker-J up to 6.x/7.0.6/7.1.0 AMQP Command Crash denial of service
2437| [131315] Apache Mesos up to pre-1.4.x Mesos Masters Rendering JSON Payload Recursion denial of service
2438| [131236] Apache Airflow up to 1.10.1 Metadata Database cross site scripting
2439| [130755] Apache JSPWiki up to 2.10.5 URL cross site scripting
2440| [130629] Apache Guacamole Cookie Flag weak encryption
2441| [130628] Apache Hadoop up to 3.0.0 HDFS information disclosure
2442| [130529] Apache Subversion 1.10.0/1.10.1/1.10.2/1.10.3/1.11.0 mod_dav_svn Directory Crash denial of service
2443| [130353] Apache Open Office up to 4.1.5 Document Loader String memory corruption
2444| [130341] Apache HTTP Server 2.4.37 mod_ssl Loop denial of service
2445| [130330] Apache HTTP Server up to 2.4.37 mod_session Expired privilege escalation
2446| [130329] Apache HTTP Server 2.4.37 mod_http2 Slowloris denial of service
2447| [130212] Apache Airflow up to 1.10.0 LDAP Auth Backend Certificate weak authentication
2448| [130123] Apache Airflow up to 1.8.2 information disclosure
2449| [130122] Apache Airflow up to 1.8.2 command injection cross site request forgery
2450| [130121] Apache Airflow up to 1.8.2 Webserver Object Code Execution
2451| [129717] Oracle Secure Global Desktop 5.4 Apache HTTP Server denial of service
2452| [129688] Oracle Tape Library ACSLS 8.4 Apache Log4j unknown vulnerability
2453| [129673] Oracle Retail Returns Management 13.3/13.4/14.0/14.1 Apache Commons Fileupload unknown vulnerability
2454| [129672] Oracle Retail Central Office 13.3/13.4/14.0/14.1 Apache Commons Fileupload unknown vulnerability
2455| [129671] Oracle Retail Back Office 13.3/13.4/14.0/14.1 Apache Commons Fileupload unknown vulnerability
2456| [129574] Oracle Outside In Technology 8.5.3/8.5.4 Apache Tomcat denial of service
2457| [129573] Oracle WebLogic Server 10.3.6.0 Apache HTTP Server denial of service
2458| [129563] Oracle Enterprise Repository 12.1.3.0.0 Apache Log4j unknown vulnerability
2459| [129555] Oracle Outside In Technology 8.5.3 Apache Batik denial of service
2460| [129551] Oracle Outside In Technology 8.5.3/8.5.4 Apache Commons FileUpload denial of service
2461| [129542] Oracle API Gateway 11.1.2.4.0 Apache Batik denial of service
2462| [129538] Oracle SOA Suite 12.1.3.0.0/12.2.1.3.0 Apache Batik unknown vulnerability
2463| [129519] Oracle Enterprise Manager Ops Center 12.2.2/12.3.3 Apache ActiveMQ unknown vulnerability
2464| [129508] Oracle Applications Manager up to 12.2.8 Apache Derby unknown vulnerability
2465| [129507] Oracle Mobile Field Service up to 12.2.8 Apache Log4j unknown vulnerability
2466| [129505] Oracle Email Center up to 12.2.8 Apache Log4j unknown vulnerability
2467| [129504] Oracle CRM Technical Foundation up to 12.2.8 Apache Commons FileUpload unknown vulnerability
2468| [129499] Oracle Partner Management up to 12.2.8 Apache Log4j unknown vulnerability
2469| [129498] Oracle Marketing up to 12.2.8 Apache Commons FileUpload unknown vulnerability
2470| [129480] Oracle Communications WebRTC Session Controller up to 7.1 Apache Batik unknown vulnerability
2471| [129479] Oracle Communications Diameter Signaling Router up to 8.2 Apache Batik unknown vulnerability
2472| [129474] Oracle Communications Diameter Signaling Router up to 8.2 Apache HTTP Server information disclosure
2473| [129472] Oracle Communications WebRTC Session Controller up to 7.1 Apache Struts 1 unknown vulnerability
2474| [129470] Oracle Communications Converged Application Server up to 7.0.0.0 Apache Struts 1 unknown vulnerability
2475| [129463] Oracle Communications WebRTC Session Controller up to 7.1 Apache Log4j unknown vulnerability
2476| [129461] Oracle Communications Services Gatekeeper up to 6.1.0.3.x Apache Commons Collections Fileupload unknown vulnerability
2477| [129460] Oracle Communications Service Broker 6.0 Apache Log4j unknown vulnerability
2478| [129459] Oracle Communications Policy Management up to 12.4 Apache Struts 2 unknown vulnerability
2479| [129458] Oracle Communications Online Mediation Controller 6.1 Apache Log4j unknown vulnerability
2480| [129457] Oracle Communications Diameter Signaling Router up to 8.2 Apache Commons Fileupload unknown vulnerability
2481| [129456] Oracle Communications Converged Application Server 6.1 Apache Log4j unknown vulnerability
2482| [128714] Apache Thrift Java Client Library up to 0.11.0 SASL Negotiation org.apache.thrift.transport.TSaslTransport unknown vulnerability
2483| [128713] Apache Thrift Node.js Static Web Server up to 0.11.0 directory traversal
2484| [128709] Apache Karaf up to 4.1.6/4.2.1 Features Deployer XMLInputFactory XML External Entity
2485| [128575] Apache NetBeans 9.0 Proxy Auto-Config Code Execution
2486| [128369] Apache Tika 1.8-1.19.1 SQLite3Parser Loop sql injection
2487| [128111] Apache NiFi 1.8.0 Template Upload Man-in-the-Middle cross site request forgery
2488| [128110] Apache NiFi 1.8.0 Cluster Request privilege escalation
2489| [128109] Apache NiFi 1.8.0 Error Page message-page.jsp Request Header cross site scripting
2490| [128108] Apache NiFi up to 1.7.x X-Frame-Options Header privilege escalation
2491| [128102] Apache Oozie up to 5.0.0 Workflow XML Impersonation spoofing
2492| [127994] WordPress up to 5.0.0 on Apache httpd MIME Restriction cross site scripting
2493| [127981] Apache OFBiz 16.11.01/16.11.02/16.11.03/16.11.04 HTTP Engine httpService GET Request privilege escalation
2494| [127161] Apache Hadoop 2.7.4/2.7.5/2.7.6 Incomplete Fix CVE-2016-6811 privilege escalation
2495| [127040] Loadbalancer.org Enterprise VA MAX up to 8.3.2 Apache HTTP Server Log cross site scripting
2496| [127007] Apache Spark Request Code Execution
2497| [126791] Apache Hadoop up to 0.23.11/2.7.6/2.8.4/2.9.1/3.0.2 ZIP File unknown vulnerability
2498| [126767] Apache Qpid Proton-J Transport 0.3 Certificate Verification Man-in-the-Middle weak authentication
2499| [126896] Apache Commons FileUpload 1.3.3 on LDAP Manager DiskFileItem File privilege escalation
2500| [126574] Apache Hive up to 2.3.3/3.1.0 Query privilege escalation
2501| [126573] Apache Hive up to 2.3.3/3.1.0 HiveServer2 privilege escalation
2502| [126564] Apache Superset up to 0.22 Pickle Library load Code Execution
2503| [126488] Apache Syncope up to 2.0.10/2.1.1 BPMN Definition xxe privilege escalation
2504| [126487] Apache Syncope up to 2.0.10/2.1.1 cross site scripting
2505| [126346] Apache Tomcat Path privilege escalation
2506| [125922] Apache Impala up to 3.0.0 ALTER privilege escalation
2507| [125921] Apache Impala up to 3.0.0 Queue Injection privilege escalation
2508| [125647] Oracle Agile Engineering Data Management 6.1.3/6.2.0/6.2.1 Install (Apache Tomcat) information disclosure
2509| [125617] Oracle Retail Returns Management 14.1 Apache Batik unknown vulnerability
2510| [125616] Oracle Retail Point-of-Service 13.4/14.0/14.1 Apache Batik unknown vulnerability
2511| [125614] Oracle Retail Central Office 14.1 Apache Batik unknown vulnerability
2512| [125613] Oracle Retail Back Office 13.3/13.4/14/14.1 Apache Batik unknown vulnerability
2513| [125599] Oracle Retail Open Commerce Platform 5.3.0/6.0.0/6.0.1 Apache Log4j unknown vulnerability
2514| [125569] Oracle PeopleSoft Enterprise PeopleTools 8.55/8.56 Apache HTTP Server information disclosure
2515| [125494] Oracle Hospitality Guest Access 4.2.0/4.2.1 Apache Tomcat information disclosure
2516| [125447] Oracle Business Intelligence Enterprise Edition 11.1.1.7.0/11.1.1.9.0/12.2.1.3.0/12.2.1.4.0 Apache Batik unknown vulnerability
2517| [125428] Oracle Identity Management Suite 11.1.2.3.0/12.2.1.3.0 Apache Log4j unknown vulnerability
2518| [125427] Oracle Identity Analytics 11.1.1.5.8 Apache Log4j unknown vulnerability
2519| [125424] Oracle API Gateway 11.1.2.4.0 Apache Log4j unknown vulnerability
2520| [125423] Oracle BI Publisher 11.1.1.7.0/11.1.1.9.0/12.2.1.3.0/12.2.1.4.0 Apache Log4j unknown vulnerability
2521| [125383] Oracle up to 10.2.0 Apache Trinidad unknown vulnerability
2522| [125379] Oracle up to 10.1.x Apache Struts 1 cross site scripting
2523| [125377] Oracle up to 10.2.0 Apache Commons Collections unknown vulnerability
2524| [125376] Oracle Communications Application Session Controller up to 3.7.0 Apache Commons Collections unknown vulnerability
2525| [125375] Oracle Communications User Data Repository up to 12.1.x Apache Xerces memory corruption
2526| [125248] Apache ActiveMQ up to 5.15.5 Web-based Administration Console queue.jsp Parameter cross site scripting
2527| [125133] Apache Tika up to 1.19 XML Parser reset() denial of service
2528| [124877] Apache PDFbox up to 2.0.11 PDF File denial of service
2529| [124876] Apache Ranger up to 1.1.x UnixAuthenticationService Stack-based memory corruption
2530| [124791] Apache Tomcat up to 7.0.90/8.5.33/9.0.11 URL Open Redirect
2531| [124787] Apache Pony Mail 0.7/0.8/0.9 Statistics Generator Timestamp Data information disclosure
2532| [124447] Apache HTTP Server up to 2.4.34 SETTINGS Frame denial of service
2533| [124346] Apache Mesos pre-1.4.2/1.5.0/1.5.1/1.6.0 on Executor HTTP API String Comparison validation JSON Web Token information disclosure
2534| [124286] Apache Tika up to 1.18 IptcAnpaParser Loop denial of service
2535| [124242] Apache Tika up to 0.18 C:/evil.bat" Directory unknown vulnerability
2536| [124241] Apache Tika up to 0.18 XML Parser Entity Expansion denial of service
2537| [124191] Apache Karaf up to 3.0.8/4.0.8/4.1.0 WebConsole .../gogo/ weak authentication
2538| [124190] Apache Karaf up to 4.1.x sshd privilege escalation
2539| [124152] Apache Camel Mail up to 2.22.0 Path directory traversal
2540| [124143] Apache SpamAssassin up to 3.4.1 PDFInfo Plugin Code Execution
2541| [124134] Apache SpamAssassin up to 3.4.1 Scan Engine HTML::Parser Email denial of service
2542| [124095] PHP up to 5.6.37/7.0.31/7.1.21/7.2.9 Apache2 sapi_apache2.c php_handler cross site scripting
2543| [124024] Apache Mesos 1.4.x/1.5.0 libprocess JSON Payload denial of service
2544| [123814] Apache ActiveMQ Client up to 5.15.5 TLS Hostname Verification Man-in-the-Middle weak authentication
2545| [123393] Apache Traffic Server up to 6.2.2/7.1.3 ESI Plugin Config privilege escalation
2546| [123392] Apache Traffic Server 6.2.2 TLS Handshake Segmentation Fault denial of service
2547| [123391] Apache Traffic Server up to 6.2.2/7.1.3 Range Request Performance denial of service
2548| [123390] Apache Traffic Server up to 6.2.2/7.1.3 Request HTTP Smuggling privilege escalation
2549| [123369] Apache Traffic Server up to 6.2.2/7.1.3 ACL remap.config Request denial of service
2550| [123197] Apache Sentry up to 2.0.0 privilege escalation
2551| [123145] Apache Struts up to 2.3.34/2.5.16 Namespace Code Execution
2552| [123144] Apache Cayenne up to 4.1.M1 CayenneModeler XML File File Transfer privilege escalation
2553| [122981] Apache Commons Compress 1.7 ZipArchiveInputStream ZIP Archive denial of service
2554| [122889] Apache HTTP Server up to 2.2.31/2.4.23 mod_userdir HTTP Response Splitting privilege escalation
2555| [122800] Apache Spark 1.3.0 REST API weak authentication
2556| [122642] Apache Airflow up to 1.8.x 404 Page Reflected cross site scripting
2557| [122568] Apache Tomcat up to 8.5.31/9.0.9 Connection Reuse weak authentication
2558| [122567] Apache Axis 1.0./1.1/1.2/1.3/1.4 cross site scripting
2559| [122556] Apache Tomcat up to 7.0.86/8.0.51/8.5.30/9.0.7 UTF-8 Decoder Loop denial of service
2560| [122531] Apache Tomcat up to 7.0.88/8.0.52/8.5.31/9.0.9 WebSocket Client unknown vulnerability
2561| [122456] Apache Camel up to 2.20.3/2.21.0 XSD Validator XML External Entity
2562| [122455] Apache Tomcat Native up to 1.1.34/1.2.16 OSCP Revoked Certificate weak authentication
2563| [122454] Apache Tomcat Native up to 1.1.34/1.2.16 OSCP Responder Revoked Certificate weak authentication
2564| [122214] Apache Kafka up to 0.9.0.1/0.10.2.1/0.11.0.2/1.0.0 Broker Request Data Loss denial of service
2565| [122202] Apache Kafka up to 0.10.2.1/0.11.0.1 SASL Impersonation spoofing
2566| [122101] Docker Skeleton Runtime for Apache OpenWhisk Docker Action dockerskeleton:1.3.0 privilege escalation
2567| [122100] PHP Runtime for Apache OpenWhisk Docker Action action-php-v7.2:1.0.0 privilege escalation
2568| [122012] Apache Ignite up to 2.5 Serialization privilege escalation
2569| [121911] Apache Ambari up to 2.5.x/2.6.2 Log Message Credentials information disclosure
2570| [121910] Apache HTTP Server 2.4.33 mod_md HTTP Requests denial of service
2571| [121854] Oracle Tape Library ACSLS up to ACSLS 8.4.0-2 Apache Commons Collections unknown vulnerability
2572| [121752] Oracle Insurance Policy Administration 10.0/10.1/10.2/11.0 Apache Log4j unknown vulnerability
2573| [121370] Apache Spark up to 2.1.2/2.2.1/2.3.0 URL cross site scripting
2574| [121354] Apache CouchDB HTTP API Code Execution
2575| [121144] Apache LDAP API up to 1.0.1 SSL Filter information disclosure
2576| [121143] Apache Storm up to 0.10.2/1.0.6/1.1.2/1.2.1 Cluster privilege escalation
2577| [120436] Apache CXF Fediz up to 1.4.3 Application Plugin unknown vulnerability
2578| [120310] Apache PDFbox up to 1.8.14/2.0.10 AFMParser Loop denial of service
2579| [120168] Apache CXF weak authentication
2580| [120080] Apache Cassandra up to 3.11.1 JMX/RMI Interface RMI Request privilege escalation
2581| [120043] Apache HBase up to 1.2.6.0/1.3.2.0/1.4.4/2.0.0 Thrift 1 API Server weak authentication
2582| [119723] Apache Qpid Broker-J 7.0.0/7.0.1/7.0.2/7.0.3/7.0.4 AMQP Messages Crash denial of service
2583| [122569] Apache HTTP Server up to 2.4.33 HTTP2 Request denial of service
2584| [119486] Apache Geode up to 1.4.0 Security Manager Code Execution
2585| [119306] Apache MXNet Network Interface privilege escalation
2586| [118999] Apache Storm up to 1.0.6/1.1.2/1.2.1 Archive directory traversal
2587| [118996] Apache Storm up to 1.0.6/1.1.2/1.2.1 Daemon spoofing
2588| [118644] Apple macOS up to 10.13.5 apache_mod_php unknown vulnerability
2589| [118200] Apache Batik up to 1.9 Deserialization unknown vulnerability
2590| [118143] Apache NiFi activemq-client Library Deserialization denial of service
2591| [118142] Apache NiFi 1.6.0 SplitXML xxe privilege escalation
2592| [118051] Apache Zookeeper up to 3.4.9/3.5.3-beta weak authentication
2593| [117997] Apache ORC up to 1.4.3 ORC File Recursion denial of service
2594| [117825] Apache Tomcat up to 7.0.88/8.0.52/8.5.31/9.0.8 CORS Filter privilege escalation
2595| [117405] Apache Derby up to 10.14.1.0 Network Server Network Packet privilege escalation
2596| [117347] Apache Ambari up to 2.6.1 HTTP Request directory traversal
2597| [117265] LibreOffice/Apache Office Writer SMB Connection XML Document information disclosure
2598| [117143] Apache uimaj/uima-as/uimaFIT/uimaDUCC XML XXE information disclosure
2599| [117117] Apache Tika up to 1.17 ChmParser Loop denial of service
2600| [117116] Apache Tika up to 1.17 BPGParser Loop denial of service
2601| [117115] Apache Tika up to 1.17 tika-server command injection
2602| [116929] Apache Fineract getReportType Parameter privilege escalation
2603| [116928] Apache Fineract REST Endpoint Parameter privilege escalation
2604| [116927] Apache Fineract MakercheckersApiResource Parameter sql injection
2605| [116926] Apache Fineract REST Parameter privilege escalation
2606| [116574] Apache wicket-jquery-ui up to 6.29.0/7.10.1/8.0.0-M9.1 WYSIWYG Editor privilege escalation
2607| [116622] Oracle Enterprise Manager for MySQL Database 12.1.0.4 EM Plugin: General (Apache Tomcat) unknown vulnerability
2608| [115931] Apache Solr up to 6.6.2/7.2.1 XML Data Parameter XML External Entity
2609| [115883] Apache Hive up to 2.3.2 privilege escalation
2610| [115882] Apache Hive up to 2.3.2 xpath_short information disclosure
2611| [115881] Apache DriverHive JDBC Driver up to 2.3.2 Escape Argument Bypass privilege escalation
2612| [115518] Apache Ignite 2.3 Deserialization privilege escalation
2613| [115260] EMC RSA Authentication Agent for Web up to 8.0.1 on IIS/Apache cross site scripting
2614| [115259] EMC RSA Authentication Agent for Web up to 8.0.1 on IIS/Apache Cookie Stack-based memory corruption
2615| [115500] CA Workload Control Center up to r11.4 SP5 Apache MyFaces Component Code Execution
2616| [115121] Apache Struts REST Plugin up to 2.5.15 Xstream XML Data denial of service
2617| [115061] Apache HTTP Server up to 2.4.29 HTTP Digest Authentication Challenge HTTP Requests Replay privilege escalation
2618| [115060] Apache HTTP Server up to 2.4.29 mod_cache_socache Request Header Crash denial of service
2619| [115059] Apache HTTP Server up to 2.4.29 HTTP2 NULL Pointer Dereference denial of service
2620| [115058] Apache HTTP Server up to 2.4.29 HTTP Header Crash denial of service
2621| [115057] Apache HTTP Server up to 2.4.29 mod_session Variable Name Cache privilege escalation
2622| [115039] Apache HTTP Server up to 2.4.29 FilesMatch File Upload privilege escalation
2623| [115038] Apache HTTP Server up to 2.0.65/2.2.34/2.4.29 mod_authnz_ldap Crash denial of service
2624| [114817] Apache Syncope up to 1.2.10/2.0.7 Search Parameter information disclosure
2625| [114816] Apache Syncope up to 1.2.10/2.0.7 XSLT Code Execution
2626| [114717] Apache Commons 1.11/1.12/1.13/1.14/1.15 ZIP Archive ZipFile/ZipArchiveInputStream denial of service
2627| [114661] Apache Allura up to 1.8.0 HTTP Response Splitting privilege escalation
2628| [114400] Apache Tomcat JK ISAPI Connector up to 1.2.42 IIS/ISAPI privilege escalation
2629| [114258] Apache HTTP Server up to 2.4.22 mod_cluster Segmentation Fault denial of service
2630| [114086] Apache ODE 1.3.3 ODE Process Deployment Web Service directory traversal
2631| [113955] Apache Xerces-C up to 3.2.0 XML Parser NULL Pointer Dereference denial of service
2632| [113945] Apache Tomcat up to 7.0.84/8.0.49/8.5.27/9.0.4 URL Pattern Empty String privilege escalation
2633| [113944] Apache OpenMeetings up to 3.x/4.0.1 CRUD Operation denial of service
2634| [113905] Apache Traffic Server up to 5.2.x/5.3.2/6.2.0/7.0.0 TLS Handshake Core Dump denial of service
2635| [113904] Apache Traffic Server up to 6.2.0 Host Header privilege escalation
2636| [113895] Apache Geode up to 1.3.x Code Execution
2637| [113894] Apache Geode up to 1.3.x TcpServer Code Execution
2638| [113888] Apache James Hupa WebMail 0.0.2 cross site scripting
2639| [113813] Apache Geode Cluster up to 1.3.x Secure Mode privilege escalation
2640| [113747] Apache Tomcat Servlets privilege escalation
2641| [113647] Apache Qpid up to 0.30 qpidd Broker AMQP Message Crash denial of service
2642| [113645] Apache VCL up to 2.1/2.2.1/2.3.1 Web GUI/XMLRPC API privilege escalation
2643| [113560] Apache jUDDI Console 3.0.0 Log Entries spoofing
2644| [113571] Apache Oozie up to 4.3.0/5.0.0-beta1 XML Data XML File privilege escalation
2645| [113569] Apache Karaf up to 4.0.7 LDAPLoginModule LDAP injection denial of service
2646| [113273] Apache JMeter 2.x/3.x Distributed Test Only privilege escalation
2647| [113198] Apache Qpid Dispatch Router 0.7.0/0.8.0 AMQP denial of service
2648| [113186] Apache JMeter 2.x/3.x Distributed Test Only privilege escalation
2649| [113145] Apache Thrift up to 0.9.3 Go Client Library privilege escalation
2650| [113106] Apache jUDDI up to 3.3.3 XML Data WADL2Java/WSDL2Java XML Document privilege escalation
2651| [113105] Apache Qpid Broker-J 7.0.0 AMQP Crash denial of service
2652| [112885] Apache Allura up to 1.8.0 File information disclosure
2653| [112856] Apache CloudStack up to 4.8.1.0/4.9.0.0 API weak authentication
2654| [112855] Apache CloudStack 4.1.0/4.1.1 API information disclosure
2655| [112678] Apache Tomcat up to 7.0.82/8.0.47/8.5.23/9.0.1 Bug Fix 61201 privilege escalation
2656| [112677] Apache Tomcat Native Connector up to 1.1.34/1.2.14 OCSP Checker Client weak authentication
2657| [112625] Apache POI up to 3.16 Loop denial of service
2658| [112448] Apache NiFi up to 1.3.x Deserialization privilege escalation
2659| [112396] Apache Hadoop 2.7.3/2.7.4 YARN NodeManager Credentials information disclosure
2660| [112339] Apache NiFi 1.5.0 Header privilege escalation
2661| [112330] Apache NiFi 1.5.0 Header HTTP Request privilege escalation
2662| [112314] NetGain Enterprise Manager 7.2.730 Build 1034 org.apache.jsp.u.jsp.tools.exec_jsp Servlet Parameter privilege escalation
2663| [112253] Apache Hadoop up to 0.23.x/2.7.4/2.8.2 MapReduce Job History Server Configuration File privilege escalation
2664| [112171] Oracle Secure Global Desktop 5.3 Apache Log4j privilege escalation
2665| [112164] Oracle Agile PLM 9.3.5/9.3.6 Apache Tomcat unknown vulnerability
2666| [112161] Oracle Agile PLM 9.3.3/9.3.4/9.3.5/9.3.6 Apache Tomcat privilege escalation
2667| [112158] Oracle Autovue for Agile Product Lifecycle Management 21.0.0/21.0.1 Apache Log4j privilege escalation
2668| [112156] Oracle Agile PLM 9.3.3/9.3.4/9.3.5/9.3.6 Apache Log4j privilege escalation
2669| [112155] Oracle Agile Engineering Data Management 6.1.3/6.2.0/6.2.1 Apache Log4j privilege escalation
2670| [112137] Oracle MICROS Relate CRM Software 10.8.x/11.4.x/15.0.x, Apache Tomcat unknown vulnerability
2671| [112136] Oracle MICROS Retail XBRi Loss Prevention up to 10.8.1 Apache Tomcat privilege escalation
2672| [112133] Oracle Retail Workforce Management 1.60.7/1.64.0 Apache Log4j privilege escalation
2673| [112129] Oracle Retail Assortment Planning 14.1.3/15.0.3/16.0.1 Apache Log4j privilege escalation
2674| [112114] Oracle 9.1 Apache Log4j privilege escalation
2675| [112113] Oracle 9.1 Apache Log4j privilege escalation
2676| [112045] Oracle Hospitality Guest Access 4.2.0/4.2.1 Apache Tomcat privilege escalation
2677| [112038] Oracle Health Sciences Empirica Inspections 1.0.1.1 Apache Tomcat information disclosure
2678| [112019] Oracle Endeca Information Discovery Integrator 3.1.0/3.2.0 Apache Tomcat privilege escalation
2679| [112017] Oracle WebCenter Portal 11.1.1.9.0/12.2.1.2.0/12.2.1.3.0 Apache Struts 1 cross site scripting
2680| [112011] Oracle Identity Manager 11.1.2.3.0 Apache Commons Collections privilege escalation
2681| [111950] Oracle Database 12.2.0.1 Apache Tomcat information disclosure
2682| [111703] Apache Sling XSS Protection API 1.0.4 URL Encoding cross site scripting
2683| [111556] Apache Geode up to 1.2.x Secure Mode Parameter OQL privilege escalation
2684| [111555] Apache Geode up to 1.2.x Secure Mode OQL privilege escalation
2685| [111540] Apache Geode up to 1.2.x Secure Mode information disclosure
2686| [111519] Apache Sling JCR ContentLoader 2.1.4 xmlreader directory traversal
2687| [111338] Apache DeltaSpike-JSF 1.8.0 cross site scripting
2688| [111330] Apache OFBiz 16.11.01/16.11.02/16.11.03 BIRT Plugin cross site scripting
2689| [110789] Apache Sling up to 1.4.0 Authentication Service Credentials information disclosure
2690| [110785] Apache Drill up to 1.11.0 Query Page unknown vulnerability
2691| [110701] Apache Fineract Query Parameter sql injection
2692| [110484] Apache Synapse up to 3.0.0 Apache Commons Collections Serialized Object Code Injection privilege escalation
2693| [110426] Adobe Experience Manager 6.0/6.1/6.2/6.3 Apache Sling Servlets Post cross site scripting
2694| [110141] Apache Struts up to 2.5.14 REST Plugin denial of service
2695| [110140] Apache Qpid Broker-J up to 0.32 privilege escalation
2696| [110139] Apache Qpid Broker-J up to 6.1.4 AMQP Frame denial of service
2697| [110106] Apache CXF Fediz Spring cross site request forgery
2698| [109766] Apache OpenOffice up to 4.1.3 DOC File Parser WW8Fonts memory corruption
2699| [109750] Apache OpenOffice up to 4.1.3 DOC File Parser ImportOldFormatStyles memory corruption
2700| [109749] Apache OpenOffice up to 4.1.3 PPT File Parser PPTStyleSheet memory corruption
2701| [109606] October CMS Build 412 Apache Configuration File Upload privilege escalation
2702| [109419] Apache Camel up to 2.19.3/2.20.0 camel-castor Java Object Deserialization privilege escalation
2703| [109418] Apache Camel up to 2.19.3/2.20.0 camel-hessian Java Object Deserialization privilege escalation
2704| [109400] Apache CouchDB up to 1.6.x/2.1.0 Database Server Shell privilege escalation
2705| [109399] Apache CouchDB up to 1.6.x/2.1.0 JSON Parser Shell privilege escalation
2706| [109398] Apache CXF 3.1.14/3.2.1 JAX-WS/JAX-RS Attachment denial of service
2707| [108872] Apache Hive up to 2.1.1/2.2.0/2.3.0 Policy Enforcement privilege escalation
2708| [108939] Apple macOS up to 10.13.1 apache unknown vulnerability
2709| [108938] Apple macOS up to 10.13.1 apache denial of service
2710| [108937] Apple macOS up to 10.13.1 apache unknown vulnerability
2711| [108936] Apple macOS up to 10.13.1 apache unknown vulnerability
2712| [108935] Apple macOS up to 10.13.1 apache denial of service
2713| [108934] Apple macOS up to 10.13.1 apache unknown vulnerability
2714| [108933] Apple macOS up to 10.13.1 apache unknown vulnerability
2715| [108932] Apple macOS up to 10.13.1 apache unknown vulnerability
2716| [108931] Apple macOS up to 10.13.1 apache denial of service
2717| [108930] Apple macOS up to 10.13.1 apache unknown vulnerability
2718| [108929] Apple macOS up to 10.13.1 apache denial of service
2719| [108928] Apple macOS up to 10.13.1 apache unknown vulnerability
2720| [108797] Apache Struts up to 2.3.19 TextParseUtiltranslateVariables OGNL Expression privilege escalation
2721| [108795] Apache Traffic Server up to 5.3.0 HTTP2 set_dynamic_table_size memory corruption
2722| [108794] Apache WSS4J up to 1.6.16/2.0.1 Incomplete Fix Leak information disclosure
2723| [108793] Apache Qpid up to 0.30 qpidd Crash denial of service
2724| [108792] Apache Traffic Server up to 5.1.0 Access Restriction privilege escalation
2725| [108791] Apache Wicket up to 1.5.11/6.16.x/7.0.0-M2 Session information disclosure
2726| [108790] Apache Storm 0.9.0.1 Log Viewer directory traversal
2727| [108789] Apache Cordova In-App-Browser Standalone Plugin up to 0.3.1 on iOS CDVInAppBrowser privilege escalation
2728| [108788] Apache Cordova File-Transfer Standalone Plugin up to 0.4.1 on iOS ios/CDVFileTransfer.m spoofing
2729| [108787] Apache HttpClient up to 4.3.0 HttpClientBuilder.java unknown vulnerability
2730| [108786] Apache Wicket up to 1.4.21/1.5.9/6.3.x script Tag cross site scripting
2731| [108783] Apache Hadoop up to 0.23.3/1.0.3/2.0.1 Kerberos Security Feature Key weak encryption
2732| [108782] Apache Xerces2 XML Service denial of service
2733| [108781] Apache jUDDI up to 1.x happyjuddi.jsp Parameter cross site scripting
2734| [108780] Apache jUDDI up to 1.x Log File uddiget.jsp spoofing
2735| [108709] Apache Cordova Android up to 3.7.1/4.0.1 intent URL privilege escalation
2736| [108708] Apache ActiveMQ up to 5.10.0 XML Data XML External Entity
2737| [108707] Apache ActiveMQ up to 1.7.0 XML Data XML External Entity
2738| [108629] Apache OFBiz up to 10.04.01 privilege escalation
2739| [108543] Apache Derby 10.1.2.1/10.2.2.0/10.3.1.4/10.4.1.3 Export File privilege escalation
2740| [108312] Apache HTTP Server on RHEL IP Address Filter privilege escalation
2741| [108297] Apache NiFi up to 0.7.1/1.1.1 Proxy Chain Username Deserialization privilege escalation
2742| [108296] Apache NiFi up to 0.7.1/1.1.1 Cluster Request privilege escalation
2743| [108250] Oracle Secure Global Desktop 5.3 Apache HTTP Server memory corruption
2744| [108245] Oracle Transportation Management up to 6.3.7 Apache Tomcat unknown vulnerability
2745| [108244] Oracle Transportation Management 6.4.1/6.4.2 Apache Commons FileUpload denial of service
2746| [108243] Oracle Agile Engineering Data Management 6.1.3/6.2.0 Apache Commons Collections memory corruption
2747| [108222] Oracle MICROS Retail XBRi Loss Prevention up to 10.8.1 Apache Batik denial of service
2748| [108219] Oracle MICROS Retail XBRi Loss Prevention up to 10.8.1 Apache Tomcat unknown vulnerability
2749| [108217] Oracle Retail Store Inventory Management 13.2.9/14.0.4/14.1.3/15.0.1/16.0.1 Apache Groovy unknown vulnerability
2750| [108216] Oracle Retail Convenience and Fuel POS Software 2.1.132 Apache Groovy unknown vulnerability
2751| [108169] Oracle MySQL Enterprise Monitor up to 3.2.8.2223/3.3.4.3247/3.4.2.4181 Apache Tomcat unknown vulnerability
2752| [108113] Oracle Hospitality Guest Access 4.2.0/4.2.1 Apache Batik denial of service
2753| [108107] Oracle Hospitality Guest Access 4.2.0/4.2.1 Apache Tomcat unknown vulnerability
2754| [108102] Oracle Healthcare Master Person Index 4.x Apache Groovy unknown vulnerability
2755| [108085] Oracle Identity Manager 11.1.2.3.0 Apache Struts 1 memory corruption
2756| [108083] Oracle API Gateway 11.1.2.4.0 Apache Batik denial of service
2757| [108080] Oracle GlassFish Server 3.1.2 Apache Commons FileUpload denial of service
2758| [108066] Oracle Management Pack for GoldenGate 11.2.1.0.12 Apache Tomcat memory corruption
2759| [108062] Oracle BI Publisher 11.1.1.7.0/12.2.1.1.0/12.2.1.2.0 Apache ActiveMQ memory corruption
2760| [108060] Oracle Enterprise Manager Ops Center 12.2.2/12.3.2 Apache Groovy unknown vulnerability
2761| [108033] Oracle Primavera Unifier 9.13/9.14/10.x/15.x/16.x, Apache Groovy unknown vulnerability
2762| [108013] Oracle Communications WebRTC Session Controller 7.0/7.1/7.2 Apache Groovy unknown vulnerability
2763| [108011] Oracle Communications Services Gatekeeper 5.1/6.0 Apache Trinidad unknown vulnerability
2764| [107904] Apache Struts up to 2.3.28 Double OGNL Evaluation privilege escalation
2765| [107860] Apache Solr up to 7.0 Apache Lucene RunExecutableListener XML External Entity
2766| [107834] Apache Ranger up to 0.6.1 Change Password privilege escalation
2767| [107639] Apache NiFi 1.4.0 XML External Entity
2768| [107606] Apache ZooKeper up to 3.4.9/3.5.2 Command CPU Exhaustion denial of service
2769| [107597] Apache Roller up to 5.0.2 XML-RPC Protocol Support XML External Entity
2770| [107429] Apache Impala up to 2.9.x Kudu Table privilege escalation
2771| [107411] Apache Tomcat up to 7.0.81/8.0.46/8.5.22/9.0.0 JSP File File Upload privilege escalation
2772| [107385] Apache Geode up to 1.2.0 Secure Mode privilege escalation
2773| [107339] Apache OpenNLP up to 1.5.3/1.6.0/1.7.2/1.8.1 XML Data XML External Entity
2774| [107333] Apache Wicket up to 8.0.0-M1 CSRF Prevention HTTP Header privilege escalation
2775| [107323] Apache Wicket 1.5.10/6.13.0 Class Request information disclosure
2776| [107310] Apache Geode up to 1.2.0 Command Line Utility Query privilege escalation
2777| [107276] ArcSight ESM/ArcSight ESM Express up to 6.9.1c Patch 3/6.11.0 Apache Tomcat Version information disclosure
2778| [107266] Apache Tika up to 1.12 XML Parser XML External Entity
2779| [107262] Apache Mesos up to 1.1.2/1.2.1/1.3.0/1.4.0-dev libprocess HTTP Request Crash denial of service
2780| [107258] Apache Mesos up to 1.1.2/1.2.1/1.3.0/1.4.0-dev libprocess HTTP Request Crash denial of service
2781| [107197] Apache Xerces Jelly Parser XML File XML External Entity
2782| [107193] ZTE NR8950 Apache Commons Collections RMI Request Deserialization privilege escalation
2783| [107084] Apache Struts up to 2.3.19 cross site scripting
2784| [106877] Apache Struts up to 2.0.33/2.5.10 Freemarker Tag privilege escalation
2785| [106875] Apache Struts up to 2.5.5 URL Validator denial of service
2786| [106874] Apache Struts up to 2.3.30 Convention Plugin directory traversal
2787| [106847] Apache Tomcat up to 7.0.80 VirtualDirContext Source information disclosure
2788| [106846] Apache Tomcat up to 7.0.79 on Windows HTTP PUT Method Parameter File Upload privilege escalation
2789| [106777] Apache HTTP Server up to 2.2.34/2.4.27 Limit Directive ap_limit_section HTTP Request information disclosure
2790| [106739] puppetlabs-apache up to 1.11.0/2.0.x weak authentication
2791| [106720] Apache Wicket up to 1.5.12/6.18.x/7.0.0-M4 CryptoMapper privilege escalation
2792| [106586] Apache Brooklyn up to 0.9.x REST Server cross site scripting
2793| [106562] Apache Spark up to 2.1.1 Launcher API Deserialization privilege escalation
2794| [106559] Apache Brooklyn up to 0.9.x SnakeYAML YAML Data Java privilege escalation
2795| [106558] Apache Brooklyn up to 0.9.x REST Server cross site request forgery
2796| [106556] Apache Traffic Server up to 5.3.1 HTTP2 unknown vulnerability
2797| [106555] Apache Traffic Server up to 5.3.1 HTTP2 unknown vulnerability
2798| [106171] Apache Directory LDAP API up to 1.0.0-M30 Timing unknown vulnerability
2799| [106167] Apache Struts up to 2.5.12 REST Plugin XML Data privilege escalation
2800| [106166] Apache Struts up to 2.3.33/2.5.12 REST Plugin denial of service
2801| [106165] Apache Struts up to 2.3.33/2.5.12 URLValidator Regex CPU Exhaustion denial of service
2802| [106115] Apache Hadoop up to 2.6.4/2.7.2 YARN NodeManager Password information disclosure
2803| [106012] Apache Solr up to 5.5.3/6.4.0 Replication directory traversal
2804| [105980] Apache Engine 16.11.01 Parameter Reflected unknown vulnerability
2805| [105962] Apache Atlas 0.6.0/0.7.0 Frame cross site scripting
2806| [105961] Apache Atlas 0.6.0/0.7.0 Stack Trace information disclosure
2807| [105960] Apache Atlas 0.6.0/0.7.0 Search Reflected cross site scripting
2808| [105959] Apache Atlas 0.6.0/0.7.0 edit Tag DOM cross site scripting
2809| [105958] Apache Atlas 0.6.0/0.7.0 edit Tag Stored cross site scripting
2810| [105957] Apache Atlas 0.6.0/0.7.0 Cookie privilege escalation
2811| [105905] Apache Atlas 0.6.0/0.7.0/0.7.1 /js privilege escalation
2812| [105878] Apache Struts up to 2.3.24.0 privilege escalation
2813| [105682] Apache2Triad 1.5.4 phpsftpd/users.php Parameter cross site scripting
2814| [105681] Apache2Triad 1.5.4 phpsftpd/users.php Request cross site request forgery
2815| [105680] Apache2Triad 1.5.4 Parameter Session Fixation weak authentication
2816| [105643] Apache Pony Mail up to 0.8b weak authentication
2817| [105288] Apache Sling up to 2.3.21 Sling.evalString() String cross site scripting
2818| [105219] Apache Tomcat up to 8.5.15/9.0.0.M21 HTTP2 Bypass directory traversal
2819| [105218] Apache Tomcat up to 7.0.78/8.0.44/8.5.15/9.0.0.M21 CORS Filter Cache Poisoning privilege escalation
2820| [105215] Apache CXF up to 3.0.12/3.1.9 OAuth2 Hawk/JOSE MAC Validation Timing unknown vulnerability
2821| [105206] Apache CXF up to 3.0.11/3.1.8 JAX-RS Module XML External Entity
2822| [105205] Apache CXF up to 3.0.11/3.1.8 HTTP Transport Module Parameter cross site scripting
2823| [105202] Apache Storm 1.0.0/1.0.1/1.0.2/1.0.3/1.1.0 Worker privilege escalation
2824| [104987] Apache Xerces-C++ XML Service CPU Exhaustion denial of service
2825| [104986] Apache CXF 2.4.5/2.5.1 WS-SP UsernameToken Policy SOAP Request weak authentication
2826| [104985] Apache MyFaces Core up to 2.1.4 EL Expression Parameter Injection information disclosure
2827| [104983] Apache Wink up to 1.1.1 XML Document xxe privilege escalation
2828| [104981] Apache Commons Email 1.0/1.1/1.2/1.3/1.4 Subject Linebreak SMTP privilege escalation
2829| [104591] MEDHOST Document Management System Apache Solr Default Credentials weak authentication
2830| [104062] Oracle MySQL Enterprise Monitor up to 3.3.3.1199 Apache Tomcat unknown vulnerability
2831| [104061] Oracle MySQL Enterprise Monitor up to 3.2.7.1204/3.3.3.1199 Apache Tomcat unknown vulnerability
2832| [104060] Oracle MySQL Enterprise Monitor up to 3.1.5.7958/3.2.5.1141/3.3.2.1162 Apache Struts 2 unknown vulnerability
2833| [103995] Oracle 8.3/8.4/15.1/15.2 Apache Trinidad unknown vulnerability
2834| [103993] Oracle Policy Automation up to 12.2.3 Apache Commons FileUplaod denial of service
2835| [103916] Oracle Banking Platform 2.3/2.4/2.4.1/2.5 Apache Commons FileUpload denial of service
2836| [103906] Oracle Communications BRM 11.2.0.0.0 Apache Commons Collections privilege escalation
2837| [103904] Oracle Communications BRM 11.2.0.0.0/11.3.0.0.0 Apache Groovy memory corruption
2838| [103866] Oracle Transportation Management 6.1/6.2 Apache Webserver unknown vulnerability
2839| [103816] Oracle BI Publisher 11.1.1.9.0/12.2.1.1.0/12.2.1.2.0 Apache Commons Fileupload denial of service
2840| [103797] Oracle Tuxedo System and Applications Monitor Apache Commons Collections privilege escalation
2841| [103792] Oracle Enterprise Data Quality 8.1.13.0.0 Apache Commons Fileupload privilege escalation
2842| [103791] Oracle Endeca Server 7.6.0.0/7.6.1.0 Apache Commons Collections privilege escalation
2843| [103788] Oracle Enterprise Repository 11.1.1.7.0/12.1.3.0.0 Apache ActiveMQ memory corruption
2844| [103787] Oracle Enterprise Data Quality 8.1.13.0.0 Apache Groovy memory corruption
2845| [103763] Apache Sling up to 1.0.11 XSS Protection API XSS.getValidXML() Application XML External Entity
2846| [103762] Apache Sling up to 1.0.12 XSS Protection API XSSAPI.encodeForJSString() Script Tag cross site scripting
2847| [103693] Apache OpenMeetings 1.0.0 HTTP Method privilege escalation
2848| [103692] Apache OpenMeetings 1.0.0 Tomcat Error information disclosure
2849| [103691] Apache OpenMeetings 3.2.0 Parameter privilege escalation
2850| [103690] Apache OpenMeetings 1.0.0 sql injection
2851| [103689] Apache OpenMeetings 1.0.0 crossdomain.xml privilege escalation
2852| [103688] Apache OpenMeetings 1.0.0 weak encryption
2853| [103687] Apache OpenMeetings 1.0.0 cross site request forgery
2854| [103556] Apache Roller 5.1.0/5.1.1 Weblog Page Template VTL privilege escalation
2855| [103554] Apache OpenMeetings 1.0.0 Password Update unknown vulnerability
2856| [103553] Apache OpenMeetings 1.0.0 File Upload privilege escalation
2857| [103552] Apache OpenMeetings 3.2.0 Chat cross site scripting
2858| [103551] Apache OpenMeetings 3.1.0 XML unknown vulnerability
2859| [103521] Apache HTTP Server 2.4.26 HTTP2 Free memory corruption
2860| [103520] Apache HTTP Server up to 2.2.33/2.4.26 mod_auth_digest Authorization Header memory corruption
2861| [103519] Apache Struts up to 2.5.11/2.3.32 Spring AOP denial of service
2862| [103518] Apache Struts up to 2.5.11 URLValidator directory traversal
2863| [103492] Apache Spark up to 2.1.x Web UI Reflected cross site scripting
2864| [103401] Apache Struts 2.3.x Struts 1 Plugin ActionMessage privilege escalation
2865| [103399] Apache Traffic Control Traffic Router TCP Connection Slowloris denial of service
2866| [103387] Apache Impala up to 2.8.0 StatestoreSubscriber weak encryption
2867| [103386] Apache Impala up to 2.7.x/2.8.0 Kerberos weak authentication
2868| [103352] Apache Solr Node weak authentication
2869| [102897] Apache Ignite up to 2.0 Update Notifier information disclosure
2870| [102878] Code42 CrashPlan 5.4.x RMI Server org.apache.commons.ssl.rmi.DateRMI privilege escalation
2871| [102698] Apache HTTP Server up to 2.2.32/2.4.25 mod_mime Content-Type memory corruption
2872| [102697] Apache HTTP Server 2.2.24/2.2.32 HTTP Strict Parsing ap_find_token Request Header memory corruption
2873| [102690] Apache HTTP Server up to 2.2.32/2.4.25 mod_ssl ap_hook_process_connection() denial of service
2874| [102689] Apache HTTP Server up to 2.2.32/2.4.25 ap_get_basic_auth_pw weak authentication
2875| [102622] Apache Thrift up to 0.9.2 Client Libraries skip denial of service
2876| [102538] Apache Ranger up to 0.7.0 Authorizer unknown vulnerability
2877| [102537] Apache Ranger up to 0.7.0 Wildcard Character unknown vulnerability
2878| [102536] Apache Ranger up to 0.6 Stored cross site scripting
2879| [102535] Apache Ranger up to 0.6.2 Policy Engine unknown vulnerability
2880| [102255] Apache NiFi up to 0.7.3/1.2.x Response Header privilege escalation
2881| [102254] Apache NiFi up to 0.7.3/1.2.x UI cross site scripting
2882| [102070] Apache CXF Fediz up to 1.1.2/1.2.0 Application Plugin denial of service
2883| [102020] Apache Tomcat up to 9.0.0.M1 Java Servlet HTTP Method unknown vulnerability
2884| [101858] Apache Hive up to 1.2.1/2.0.0 Client weak authentication
2885| [101802] Apache KNOX up to 0.11.0 WebHDFS privilege escalation
2886| [101928] HPE Aruba ClearPass Apache Tomcat information disclosure
2887| [101524] Apache Archiva up to 1.x/2.2.1 REST Endpoint cross site request forgery
2888| [101513] Apache jUDDI 3.1./3.1.2/3.1.3/3.1.4 Logout Open Redirect
2889| [101430] Apache CXF Fediz up to 1.3.1 OIDC Service cross site request forgery
2890| [101429] Apache CXF Fediz up to 1.2.3/1.3.1 Plugins cross site request forgery
2891| [100619] Apache Hadoop up to 2.6.x HDFS Servlet unknown vulnerability
2892| [100618] Apache Hadoop up to 2.7.0 HDFS Web UI cross site scripting
2893| [100621] Adobe ColdFusion 10/11/2016 Apache BlazeDS Library Deserialization privilege escalation
2894| [100205] Oracle MySQL Enterprise Monitor up to 3.1.6.8003/3.2.1182/3.3.2.1162 Apache Commons FileUpload denial of service
2895| [100191] Oracle Secure Global Desktop 4.71/5.2/5.3 Web Server (Apache HTTP Server) information disclosure
2896| [100162] Oracle StorageTek Tape Analytics SW Tool up to 2.2.0 Apache Commons Collections privilege escalation
2897| [100160] Oracle StorageTek Tape Analytics SW Tool up to 2.2.0 Apache Trinidad unknown vulnerability
2898| [99969] Oracle WebCenter Sites 11.1.1.8.0 Apache Tomcat memory corruption
2899| [99937] Apache Batik up to 1.8 privilege escalation
2900| [99936] Apache FOP up to 2.1 privilege escalation
2901| [99935] Apache CXF up to 3.0.12/3.1.10 STSClient Cache information disclosure
2902| [99934] Apache CXF up to 3.0.12/3.1.10 JAX-RS XML Security Streaming Client spoofing
2903| [99930] Apache Traffic Server up to 6.2.0 denial of service
2904| [99929] Apache Log4j up to 2.8.1 Socket Server Deserialization privilege escalation
2905| [99925] Apache Traffic Server 6.0.0/6.1.0/6.2.0 HPACK Bomb denial of service
2906| [99738] Ping Identity OpenID Connect Authentication Module up to 2.13 on Apache Mod_auth_openidc.c spoofing
2907| [117569] Apache Hadoop up to 2.7.3 privilege escalation
2908| [99591] Apache TomEE up to 1.7.3/7.0.0-M2 EjbObjectInputStream Serialized Object privilege escalation
2909| [99370] Apache Ignite up to 1.8 update-notifier Document XML External Entity
2910| [99299] Apache Geode up to 1.1.0 Pulse OQL Query privilege escalation
2911| [99572] Apache Tomcat up to 7.0.75/8.0.41/8.5.11/9.0.0.M17 Application Listener privilege escalation
2912| [99570] Apache Tomcat up to 6.0.52/7.0.76/8.0.42/8.5.12/9.0.0.M18 HTTP Connector Cache information disclosure
2913| [99569] Apache Tomcat up to 6.0.52/7.0.76/8.0.42/8.5.12/9.0.0.M18 HTTP/2 GOAWAY Frame Resource Exhaustion denial of service
2914| [99568] Apache Tomcat up to 6.0.52/7.0.76/8.0.42/8.5.12/9.0.0.M18 Pipelined Request information disclosure
2915| [99048] Apache Ambari up to 2.3.x REST API Shell Metacharacter privilege escalation
2916| [99014] Apache Camel Jackson/JacksonXML privilege escalation
2917| [98610] Apple macOS up to 10.12.3 apache_mod_php memory corruption
2918| [98609] Apple macOS up to 10.12.3 apache_mod_php denial of service
2919| [98608] Apple macOS up to 10.12.3 apache_mod_php memory corruption
2920| [98607] Apple macOS up to 10.12.3 apache_mod_php denial of service
2921| [98606] Apple macOS up to 10.12.3 apache_mod_php denial of service
2922| [98605] Apple macOS up to 10.12.3 Apache denial of service
2923| [98604] Apple macOS up to 10.12.3 Apache denial of service
2924| [98603] Apple macOS up to 10.12.3 Apache denial of service
2925| [98602] Apple macOS up to 10.12.3 Apache denial of service
2926| [98601] Apple macOS up to 10.12.3 Apache denial of service
2927| [98517] Apache POI up to 3.14 OOXML File XXE denial of service
2928| [98405] Apache Hadoop up to 0.23.10 privilege escalation
2929| [98199] Apache Camel Validation XML External Entity
2930| [97892] Apache Tomcat up to 9.0.0.M15 Reverse-Proxy Http11InputBuffer.java information disclosure
2931| [97617] Apache Camel camel-snakeyaml Deserialization privilege escalation
2932| [97602] Apache Camel camel-jackson/camel-jacksonxml CamelJacksonUnmarshalType privilege escalation
2933| [97732] Apache Struts up to 2.3.31/2.5.10 Jakarta Multipart Parser Content-Type privilege escalation
2934| [97466] mod_auth_openidc up to 2.1.5 on Apache weak authentication
2935| [97455] mod_auth_openidc up to 2.1.4 on Apache weak authentication
2936| [97081] Apache Tomcat HTTPS Request denial of service
2937| [97162] EMC OpenText Documentum D2 BeanShell/Apache Commons privilege escalation
2938| [96949] Hanwha Techwin Smart Security Manager up to 1.5 Redis/Apache Felix Gogo privilege escalation
2939| [96314] Apache Cordova up to 6.1.1 on Android weak authentication
2940| [95945] Apple macOS up to 10.12.2 apache_mod_php denial of service
2941| [95944] Apple macOS up to 10.12.2 apache_mod_php denial of service
2942| [95943] Apple macOS up to 10.12.2 apache_mod_php memory corruption
2943| [95666] Oracle FLEXCUBE Direct Banking 12.0.0/12.0.1/12.0.2/12.0.3 Apache Commons Collections privilege escalation
2944| [95455] Apache NiFi up to 1.0.0/1.1.0 Connection Details Dialogue cross site scripting
2945| [95311] Apache Storm UI Daemon privilege escalation
2946| [95291] ZoneMinder 1.30.0 Apache httpd privilege escalation
2947| [94800] Apache Wicket up to 1.5.16/6.24.x Deserialize DiskFileItem denial of service
2948| [94705] Apache Qpid Broker for Java up to 6.1.0 SCRAM-SHA-1/SCRAM-SHA-256 User information disclosure
2949| [94627] Apache HTTP Server up to 2.4.24 mod_auth_digest Crash denial of service
2950| [94626] Apache HTTP Server up to 2.4.24 mod_session_crypto Padding weak encryption
2951| [94625] Apache HTTP Server up to 2.4.24 Response Split privilege escalation
2952| [94540] Apache Tika 1.9 tika-server File information disclosure
2953| [94600] Apache ActiveMQ up to 5.14.1 Administration Console cross site scripting
2954| [94348] Apple macOS up to 10.12.1 apache_mod_php denial of service
2955| [94347] Apple macOS up to 10.12.1 apache_mod_php denial of service
2956| [94346] Apple macOS up to 10.12.1 apache_mod_php denial of service
2957| [94345] Apple macOS up to 10.12.1 apache_mod_php denial of service
2958| [94344] Apple macOS up to 10.12.1 apache_mod_php denial of service
2959| [94343] Apple macOS up to 10.12.1 apache_mod_php memory corruption
2960| [94342] Apple macOS up to 10.12.1 apache_mod_php memory corruption
2961| [94128] Apache Tomcat up to 9.0.0.M13 Error information disclosure
2962| [93958] Apache HTTP Server up to 2.4.23 mod_http2 h2_stream.c denial of service
2963| [93874] Apache Subversion up to 1.8.16/1.9.4 mod_dontdothat XXE denial of service
2964| [93855] Apache Hadoop up to 2.6.4/2.7.2 HDFS Service privilege escalation
2965| [93609] Apache OpenMeetings 3.1.0 RMI Registry privilege escalation
2966| [93555] Apache Tika 1.6-1.13 jmatio MATLAB File privilege escalation
2967| [93799] Apache Tomcat up to 6.0.47/7.0.72/8.0.38/8.5.6/9.0.0.M11 JmxRemoteLifecycleListener privilege escalation
2968| [93798] Apache Tomcat up to 6.0.47/7.0.72/8.0.38/8.5.6/9.0.0.M11 JmxRemoteLifecycleListener privilege escalation
2969| [93797] Apache Tomcat up to 6.0.47/7.0.72/8.0.38/8.5.6/9.0.0.M11 HTTP Split privilege escalation
2970| [93796] Apache Tomcat up to 8.5.6/9.0.0.M11 HTTP/2 Header Parser denial of service
2971| [93532] Apache Commons Collections Library Java privilege escalation
2972| [93210] Apache Tomcat up to 6.0.45/7.0.70/8.0.36/8.5.4/9.0.0.M9 ResourceLinkFactory privilege escalation
2973| [93209] Apache Tomcat up to 6.0.45/7.0.70/8.0.36/8.5.4/9.0.0.M9 Realm Authentication User information disclosure
2974| [93208] Apache Tomcat up to 6.0.45/7.0.70/8.0.36/8.5.4/9.0.0.M9 System Property Replacement information disclosure
2975| [93207] Apache Tomcat up to 6.0.45/7.0.70/8.0.36/8.5.4/9.0.0.M9 Utility Method privilege escalation
2976| [93206] Apache Tomcat up to 6.0.45/7.0.70/8.0.36/8.5.4/9.0.0.M9 Configuration privilege escalation
2977| [93098] Apache Commons FileUpload privilege escalation
2978| [92987] Oracle Virtual Desktop Infrastructure up to 3.5.2 Apache Commons Collection memory corruption
2979| [92986] Oracle Virtual Desktop Infrastructure up to 3.5.2 Apache Tomcat memory corruption
2980| [92982] Oracle Insurance IStream 4.3.2 Apache Commons Collections memory corruption
2981| [92981] Oracle Financial Services Lending and Leasing 14.1.0/14.2.0 Apache Commons Collections memory corruption
2982| [92979] Oracle up to 8.0.3 Apache Commons Collections memory corruption
2983| [92977] Oracle FLEXCUBE Universal Banking up to 12.2.0 Apache Commons Collections memory corruption
2984| [92976] Oracle FLEXCUBE Universal Banking 12.87.1/12.87.2 Apache Commons Collections memory corruption
2985| [92975] Oracle FLEXCUBE Private Banking up to 12.1.0 Apache Commons Collections memory corruption
2986| [92974] Oracle FLEXCUBE Investor Servicing 12.0.1 Apache Commons Collections memory corruption
2987| [92973] Oracle 12.0.0/12.1.0 Apache Commons Collections memory corruption
2988| [92972] Oracle FLEXCUBE Core Banking 11.5.0.0.0/11.6.0.0.0 Apache Commons Collections memory corruption
2989| [92962] Oracle Agile PLM 9.3.4/9.3.5 Apache Commons Collections memory corruption
2990| [92909] Oracle Agile PLM 9.3.4/9.3.5 Apache Tomcat unknown vulnerability
2991| [92786] Oracle Banking Digital Experience 15.1 Apache Commons Collections information disclosure
2992| [92549] Apache Tomcat on Red Hat privilege escalation
2993| [92509] Apache Tomcat JK ISAPI Connector up to 1.2.41 jk_uri_worker_map.c memory corruption
2994| [92314] Apache MyFaces Trinidad up to 1.0.13/1.2.15/2.0.1/2.1.1 CoreResponseStateManager memory corruption
2995| [92313] Apache Struts2 up to 2.3.28/2.5.0 Action Name Cleanup cross site request forgery
2996| [92299] Apache Derby up to 10.12.1.0 SqlXmlUtil XML External Entity
2997| [92217] Apache ActiveMQ Artemis up to 1.3.x Broker/REST GetObject privilege escalation
2998| [92174] Apache Ranger up to 0.6.0 Policy cross site scripting
2999| [91831] Apache Jackrabbit up to 2.13.2 HTTP Header cross site request forgery
3000| [91825] Apache Zookeeper up to 3.4.8/3.5.2 C CLI Shell memory corruption
3001| [91818] Apache CXF Fediz up to 1.2.2/1.3.0 Application Plugin privilege escalation
3002| [92056] Apple macOS up to 10.11 apache_mod_php memory corruption
3003| [92055] Apple macOS up to 10.11 apache_mod_php memory corruption
3004| [92054] Apple macOS up to 10.11 apache_mod_php denial of service
3005| [92053] Apple macOS up to 10.11 apache_mod_php denial of service
3006| [92052] Apple macOS up to 10.11 apache_mod_php denial of service
3007| [92051] Apple macOS up to 10.11 apache_mod_php memory corruption
3008| [92050] Apple macOS up to 10.11 apache_mod_php denial of service
3009| [92049] Apple macOS up to 10.11 apache_mod_php memory corruption
3010| [92048] Apple macOS up to 10.11 apache_mod_php denial of service
3011| [92047] Apple macOS up to 10.11 apache_mod_php memory corruption
3012| [92046] Apple macOS up to 10.11 apache_mod_php memory corruption
3013| [92045] Apple macOS up to 10.11 apache_mod_php memory corruption
3014| [92044] Apple macOS up to 10.11 apache_mod_php memory corruption
3015| [92043] Apple macOS up to 10.11 apache_mod_php denial of service
3016| [92042] Apple macOS up to 10.11 apache_mod_php memory corruption
3017| [92041] Apple macOS up to 10.11 apache_mod_php memory corruption
3018| [92040] Apple macOS up to 10.11 Apache Proxy privilege escalation
3019| [91785] Apache Shiro up to 1.3.1 Servlet Filter privilege escalation
3020| [90879] Apache OpenMeetings up to 3.1.1 SWF Panel cross site scripting
3021| [90878] Apache Sentry up to 1.6.x Blacklist Filter reflect/reflect2/java_method privilege escalation
3022| [90610] Apache POI up to 3.13 XLSX2CSV Example OpenXML Document XML External Entity
3023| [90584] Apache ActiveMQ up to 5.11.3/5.12.2/5.13/1 Administration Web Console privilege escalation
3024| [90385] Apache Archiva up to 1.3.9 addProxyConnector_commit.action cross site scripting
3025| [90384] Apache Archiva up to 1.3.9 addProxyConnector_commit.action cross site request forgery
3026| [90383] Apache OpenOffice up to 4.1.2 Impress File memory corruption
3027| [89670] Apache Tomcat up to 8.5.4 CGI Servlet Environment Variable Open Redirect
3028| [89669] Apache HTTP Server up to 2.4.23 RFC 3875 Namespace Conflict Environment Variable Open Redirect
3029| [89726] Apple Mac OS X up to 10.11.5 apache_mod_php memory corruption
3030| [89484] Apache Qpid up to 0.13.0 on Windows Proton Library Certificate weak authentication
3031| [89473] HPE iMC PLAT/EAD/APM/iMC NTA/iMC BIMS/iMC UAM_TAM up to 7.2 Apache Commons Collections Library Command privilege escalation
3032| [90263] Apache Archiva Header denial of service
3033| [90262] Apache Archiva Deserialize privilege escalation
3034| [90261] Apache Archiva XML DTD Connection privilege escalation
3035| [88827] Apache Xerces-C++ up to 3.1.3 DTD Stack-Based memory corruption
3036| [88747] Apache HTTP Server 2.4.17/2.4.18 mod_http2 denial of service
3037| [88608] Apache Struts up to 2.3.28.1/2.5.0 URLValidator Null Value denial of service
3038| [88607] Apache Struts up to 2.3.28.1 REST Plugin Expression privilege escalation
3039| [88606] Apache Struts up to 2.3.28.1 Restriction privilege escalation
3040| [88605] Apache Struts up to 2.3.28.1 Restriction privilege escalation
3041| [88604] Apache Struts up to 2.3.28.1 Token Validator cross site request forgery
3042| [88603] Apache Commons FileUpload up to 1.3.1 MultipartStream denial of service
3043| [88602] Apache Struts up to 1.3.10 ActionServlet.java cross site scripting
3044| [88601] Apache Struts up to 1.3.10 Multithreading ActionServlet.java memory corruption
3045| [88600] Apache Struts up to 1.3.10 MultiPageValidator privilege escalation
3046| [89005] Apache Qpid AMQP JMS Client getObject privilege escalation
3047| [87888] Apache Ranger up to 0.5.2 Policy Admin Tool eventTime sql injection
3048| [87835] Apache CloudStack up to 4.5.2.0/4.6.2.0/4.7.1.0/4.8.0.0 SAML-based Authentication privilege escalation
3049| [87806] HPE Discovery and Dependency Mapping Inventory up to 9.32 update 3 Apache Commons Collections Library privilege escalation
3050| [87805] HPE Universal CMDB up to 10.21 Apache Commons Collections Library privilege escalation
3051| [87768] Apache Shiro up to 1.2.4 Cipher Key privilege escalation
3052| [87765] Apache James Server 2.3.2 Command privilege escalation
3053| [88667] Apache HTTP Server up to 2.4.20 mod_http2 Certificate weak authentication
3054| [87718] Apache Struts up to 2.3.24.1 OGNL Caching denial of service
3055| [87717] Apache Struts up to 2.3.28 REST Plugin privilege escalation
3056| [87706] Apache Qpid Java up to 6.0.2 AMQP privilege escalation
3057| [87703] Apache Qbid Java up to 6.0.2 PlainSaslServer.java denial of service
3058| [87702] Apache ActiveMQ up to 5.13.x Fileserver Web Application Upload privilege escalation
3059| [87700] Apache PDFbox up to 1.8.11/2.0.0 XML Parser PDF Document XML External Entity
3060| [87679] HP Release Control 9.13/9.20/9.21 Apache Commons Collections Library Java Object privilege escalation
3061| [87540] Apache Ambari up to 2.2.0 File Browser View information disclosure
3062| [87433] Apple Mac OS X up to 10.11.4 apache_mod_php memory corruption
3063| [87432] Apple Mac OS X up to 10.11.4 apache_mod_php memory corruption
3064| [87431] Apple Mac OS X up to 10.11.4 apache_mod_php Format String
3065| [87430] Apple Mac OS X up to 10.11.4 apache_mod_php denial of service
3066| [87429] Apple Mac OS X up to 10.11.4 apache_mod_php information disclosure
3067| [87428] Apple Mac OS X up to 10.11.4 apache_mod_php memory corruption
3068| [87427] Apple Mac OS X up to 10.11.4 apache_mod_php memory corruption
3069| [87389] Apache Xerces C++ up to 3.1.3 XML Document DTDScanner.cpp memory corruption
3070| [87172] Adobe ColdFusion 11 Update 7/2016/up to 10 Update 18 Apache Commons Collections Library privilege escalation
3071| [87121] Apache Cordova iOS up to 3.x Plugin privilege escalation
3072| [87120] Apache Cordova iOS up to 3.x URL Whitelist privilege escalation
3073| [83806] HPE Network Node Manager i up to 10.01 Apache Commons Collections Library privilege escalation
3074| [83077] Apache Subversion up to 1.8.15/1.9.3 mod_authz_svn mod_authz_svn.c denial of service
3075| [83076] Apache Subversion up to 1.8.15/1.9.3 svnserve svnserve/cyrus_auth.c privilege escalation
3076| [82790] Apache Struts 2.0.0/2.3.24/2.3.28 Dynamic Method privilege escalation
3077| [82789] Apache Struts 2.0.0/2.3.24/2.3.28 XSLTResult privilege escalation
3078| [82725] HPE P9000 Command View up to 7.x/8.4.0 Apache Commons Collections Library privilege escalation
3079| [82444] Apache Camel up to 2.14.x/2.15.4/2.16.0 HTTP Request privilege escalation
3080| [82389] Apache Subversion up to 1.7.x/1.8.14/1.9.2 mod_dav_svn util.c memory corruption
3081| [82280] Apache Struts up to 1.7 JRE URLDecoder cross site scripting
3082| [82260] Apache OFBiz up to 12.04.05/13.07.02 Java Object privilege escalation
3083| [82259] Apache Qpid Proton up to 0.12.0 proton.reactor.Connector weak encryption
3084| [82250] Apache Ranger up to 0.5.0 Admin UI weak authentication
3085| [82214] Apache Wicket up to 1.5.14/6.21.x/7.1.x Input Element cross site scripting
3086| [82213] Apache Wicket up to 1.5.14/6.21.x/7.1.x ModalWindow Title getWindowOpenJavaScript cross site scripting
3087| [82212] Apache Ranger up to 0.5.0 Policy Admin Tool privilege escalation
3088| [82211] Apache OFBiz up to 12.04.06/13.07.02 ModelFormField.java DisplayEntityField.getDescription cross site scripting
3089| [82082] Apache JetSpeed up to 2.3.0 User Manager Service privilege escalation
3090| [82081] Apache OpenMeetings up to 3.1.0 SOAP API information disclosure
3091| [82080] Apache OpenMeetings up to 3.1.0 Event cross site scripting
3092| [82078] Apache OpenMeetings up to 3.1.0 Import/Export System Backup ZIP Archive directory traversal
3093| [82077] Apache OpenMeetings up to 3.1.0 Password Reset sendHashByUser privilege escalation
3094| [82076] Apache Ranger up to 0.5.1 privilege escalation
3095| [82075] Apache JetSpeed up to 2.3.0 Portal cross site scripting
3096| [82074] Apache JetSpeed up to 2.3.0 cross site scripting
3097| [82073] Apache JetSpeed up to 2.3.0 User Manager Service sql injection
3098| [82072] Apache JetSpeed up to 2.3.0 Portal Site Manager ZIP Archive directory traversal
3099| [82058] Apache LDAP Studio/Directory Studio up to 2.0.0-M9 CSV Export privilege escalation
3100| [82053] Apache Ranger up to 0.4.x Policy Admin Tool privilege escalation
3101| [82052] Apache Ranger up to 0.4.x Policy Admin Tool HTTP Request cross site scripting
3102| [81696] Apache ActiveMQ up to 5.13.1 HTTP Header privilege escalation
3103| [81695] Apache Xerces-C up to 3.1.2 internal/XMLReader.cpp memory corruption
3104| [81622] HPE Asset Manager 9.40/9.41/9.50 Apache Commons Collections Library Java Object privilege escalation
3105| [81406] HPE Service Manager up to 9.35 P3/9.41 P1 Apache Commons Collections Library Command privilege escalation
3106| [81405] HPE Operations Orchestration up to 10.50 Apache Commons Collections Library Command privilege escalation
3107| [81427] Apple Mac OS X up to 10.11.3 apache_mod_php PNG File memory corruption
3108| [81426] Apple Mac OS X up to 10.11.3 apache_mod_php PNG File memory corruption
3109| [81372] Apache Struts up to 2.3.24.1 I18NInterceptor cross site scripting
3110| [81371] Apache Struts up to 2.3.24.1 Double OGNL Evaluation privilege escalation
3111| [81370] Apache Struts up to 2.3.24.1 Java URLDecoder cross site scripting
3112| [81084] Apache Tomcat 6.0/7.0/8.0/9.0 ServletContext directory traversal
3113| [81083] Apache Tomcat 7.0/8.0/9.0 Index Page cross site request forgery
3114| [81082] Apache Tomcat 7.0/8.0/9.0 ResourceLinkFactory.setGlobalContext privilege escalation
3115| [81081] Apache Tomcat 6.0/7.0/8.0/9.0 Error information disclosure
3116| [81080] Apache Tomcat 6.0/7.0/8.0/9.0 Session Persistence privilege escalation
3117| [81079] Apache Tomcat 6.0/7.0/8.0/9.0 StatusManagerServlet information disclosure
3118| [81078] Apache Tomcat 7.0/8.0/9.0 Session privilege escalation
3119| [80970] Apache Solr up to 5.3.0 Admin UI plugins.js cross site scripting
3120| [80969] Apache Solr up to 5.2 Schema schema-browser.js cross site scripting
3121| [80968] Apache Solr up to 5.0 analysis.js cross site scripting
3122| [80940] HP Continuous Delivery Automation 1.30 Apache Commons Collections Library privilege escalation
3123| [80823] Apache CloudStack up to 4.5.1 KVM Virtual Machine Migration privilege escalation
3124| [80822] Apache CloudStack up to 4.5.1 API Call information disclosure
3125| [80778] Apache Camel up to 2.15.4/2.16.0 camel-xstream privilege escalation
3126| [80750] HPE Operations Manager 8.x/9.0 on Windows Apache Commons Collections Library privilege escalation
3127| [80724] Apache Hive up to 1.2.1 Authorization Framework privilege escalation
3128| [80577] Oracle Secure Global Desktop 4.63/4.71/5.2 Apache HTTP Server denial of service
3129| [80165] Intel McAfee ePolicy Orchestrator up to 4.6.9/5.0.3/5.3.1 Apache Commons Collections Library privilege escalation
3130| [80116] Apache Subversion up to 1.9.2 svn Protocol libsvn_ra_svn/marshal.c read_string memory corruption
3131| [80115] Apache ActiveMQ up to 5.12.x Broker Service privilege escalation
3132| [80036] IBM Cognos Business Intelligence Apache Commons Collections Library InvokerTransformer privilege escalation
3133| [79873] VMware vCenter Operations/vRealize Orchestrator Apache Commons Collections Library Serialized Java Object privilege escalation
3134| [79840] Apache Cordova File Transfer Plugin up to 1.2.x on Android unknown vulnerability
3135| [79839] Apache TomEE Serialized Java Stream EjbObjectInputStream privilege escalation
3136| [79791] Cisco Products Apache Commons Collections Library privilege escalation
3137| [79539] Apple Mac OS X up to 10.11.1 apache_mod_php memory corruption
3138| [79538] Apple Mac OS X up to 10.11.1 apache_mod_php memory corruption
3139| [79294] Apache Cordova-Android up to 3.6 BridgeSecret Random Generator weak encryption
3140| [79291] Apache Cordova-Android up to 4.0 Javascript Whitelist privilege escalation
3141| [79244] Apache CXF up to 2.7.17/3.0.7/3.1.2 SAML Web SSO Module SAML Response weak authentication
3142| [79243] Oracle WebLogic Server 10.3.6.0/12.1.2.0/12.1.3.0/12.2.1.0 WLS Security com.bea.core.apache.commons.collections.jar privilege escalation
3143| [78989] Apache Ambari up to 2.1.1 Open Redirect
3144| [78988] Apache Ambari up to 2.0.1/2.1.0 Password privilege escalation
3145| [78987] Apache Ambari up to 2.0.x cross site scripting
3146| [78986] Apache Ambari up to 2.0.x Proxy Endpoint api/v1/proxy privilege escalation
3147| [78780] Apple Mac OS X up to 10.11.0 apache_mod_php denial of service
3148| [78779] Apple Mac OS X up to 10.11.0 apache_mod_php denial of service
3149| [78778] Apple Mac OS X up to 10.11.0 apache_mod_php memory corruption
3150| [78777] Apple Mac OS X up to 10.11.0 apache_mod_php memory corruption
3151| [78776] Apple Mac OS X up to 10.11.0 apache_mod_php memory corruption
3152| [78775] Apple Mac OS X up to 10.11.0 apache_mod_php memory corruption
3153| [78774] Apple Mac OS X up to 10.11.0 apache_mod_php memory corruption
3154| [78297] Apache Commons Components HttpClient up to 4.3.5 HTTPS Timeout denial of service
3155| [77406] Apache Flex BlazeDS AMF Message XML External Entity
3156| [77429] Apache ActiveMQ up to 5.10.0 LDAPLoginModule privilege escalation
3157| [77399] Apache ActiveMQ up to 5.10.0 LDAPLoginModule weak authentication
3158| [77375] Apache Tapestry up to 5.3.5 Client-Side Object Storage privilege escalation
3159| [77331] Apache ActiveMQ up to 5.11.1 on Windows Fileserver Upload/Download directory traversal
3160| [77299] Apache Solr Real-Time Module up to 7.x-1.1 Index Content information disclosure
3161| [77247] Apache ActiveMQ up to 5.10 TransportConnection.java processControlCommand denial of service
3162| [77083] Apache Groovy up to 2.4.3 MethodClosure.java MethodClosure memory corruption
3163| [76953] Apache Subversion 1.7.0/1.8.0/1.8.10 svn_repos_trace_node_locations information disclosure
3164| [76952] Apache Subversion 1.7.0/1.8.0/1.8.10 mod_authz_svn anonymous/authenticated information disclosure
3165| [76567] Apache Struts 2.3.20 unknown vulnerability
3166| [76733] Apache HTTP Server 2.4.7/2.4.8/2.4.9/2.4.10/2.4.12 ap_some_auth_required unknown vulnerability
3167| [76732] Apache HTTP Server 2.4.7/2.4.8/2.4.9/2.4.10/2.4.12 Request apr_brigade_flatten privilege escalation
3168| [76731] Apache HTTP Server 2.4.12 ErrorDocument 400 Crash denial of service
3169| [75690] Apache Camel up to 2.13.3/2.14.1 XPathBuilder.java XML External Entity
3170| [75689] Apache Camel up to 2.13.3/2.14.1 XML Converter Setup XmlConverter.java SAXSource privilege escalation
3171| [75668] Apache Sling API/Sling Servlets Post up to 2.2.1 HtmlResponse cross site scripting
3172| [75601] Apache Jackrabbit up to 2.10.0 WebDAV Request XML External Entity
3173| [75420] Apache Tomcat up to 6.0.43/7.0.58/8.0.16 Security Manager privilege escalation
3174| [75145] Apache OpenOffice up to 4.1.1 HWP Filter Crash denial of service
3175| [75032] Apache Tomcat Connectors up to 1.2.40 mod_jk privilege escalation
3176| [75135] PHP 5.4/5.5 HTTP Request sapi_apache2.c apache2handler privilege escalation
3177| [74793] Apache Tomcat File Upload denial of service
3178| [74708] Apple MacOS X up to 10.10.2 Apache denial of service
3179| [74707] Apple MacOS X up to 10.10.2 Apache denial of service
3180| [74706] Apple MacOS X up to 10.10.2 Apache memory corruption
3181| [74705] Apple MacOS X up to 10.10.2 Apache denial of service
3182| [74704] Apple MacOS X up to 10.10.2 Apache denial of service
3183| [74703] Apple MacOS X up to 10.10.2 Apache denial of service
3184| [74702] Apple MacOS X up to 10.10.2 Apache denial of service
3185| [74701] Apple MacOS X up to 10.10.2 Apache cross site request forgery
3186| [74700] Apple MacOS X up to 10.10.2 Apache unknown vulnerability
3187| [74661] Apache Flex up to 4.14.0 asdoc index.html cross site scripting
3188| [74609] Apache Cassandra up to 1.2.19/2.0.13/2.1.3 JMX/RMI Interface privilege escalation
3189| [74469] Apache Xerces-C up to 7.0 internal/XMLReader.cpp denial of service
3190| [74468] Apache Batik up to 1.6 denial of service
3191| [74414] Apache Mod-gnutls up to 0.5.1 Authentication spoofing
3192| [74371] Apache Standard Taglibs up to 1.2.0 memory corruption
3193| [74367] Apache HTTP Server up to 2.4.12 mod_lua lua_request.c wsupgrade denial of service
3194| [74174] Apache WSS4J up to 2.0.0 privilege escalation
3195| [74172] Apache ActiveMQ up to 5.5.0 Administration Console cross site scripting
3196| [69092] Apache Tomcat up to 6.0.42/7.0.54/8.0.8 HTTP Request Smuggling privilege escalation
3197| [73831] Apache Qpid up to 0.30 Access Restriction unknown vulnerability
3198| [73731] Apache XML Security unknown vulnerability
3199| [68660] Oracle BI Publisher 10.1.3.4.2/11.1.1.7 Apache Tomcat cross site scripting
3200| [73659] Apache CloudStack up to 4.3.0 Stack-Based unknown vulnerability
3201| [73593] Apache Traffic Server up to 5.1.0 denial of service
3202| [73511] Apache POI up to 3.10 Deadlock denial of service
3203| [73510] Apache Solr up to 4.3.0 cross site scripting
3204| [68447] Apache Subversion up to 1.7.18/1.8.10 mod_dav_svn Crash denial of service
3205| [68446] Apache Subversion up to 1.7.18/1.8.10 REPORT Request Crash denial of service
3206| [73173] Apache CloudStack Stack-Based unknown vulnerability
3207| [68357] Apache Struts up to 2.3.16.3 Random Number Generator cross site request forgery
3208| [73106] Apache Hadoop up to 2.4.0 Symlink privilege escalation
3209| [68575] Apache HTTP Server up to 2.4.10 LuaAuthzProvider mod_lua.c privilege escalation
3210| [72890] Apache Qpid 0.30 unknown vulnerability
3211| [72887] Apache Hive 0.13.0 File Permission privilege escalation
3212| [72878] Apache Cordova 3.5.0 cross site request forgery
3213| [72877] Apache Cordova 3.5.0 cross site request forgery
3214| [72876] Apache Cordova 3.5.0 cross site request forgery
3215| [68435] Apache HTTP Server 2.4.10 mod_proxy_fcgi.c handle_headers denial of service
3216| [68065] Apache CXF up to 3.0.1 JAX-RS SAML denial of service
3217| [68064] Apache CXF up to 3.0.0 SAML Token denial of service
3218| [67913] Oracle Retail Markdown Optimization 12.0/13.0/13.1/13.2/13.4 Apache commons-beanutils-1.8.0.jar memory corruption
3219| [67912] Oracle Retail Invoice Matching up to 14.0 Apache commons-beanutils-1.8.0.jar memory corruption
3220| [67911] Oracle Retail Clearance Optimization Engine 13.3/13.4/14.0 Apache commons-beanutils-1.8.0.jar memory corruption
3221| [67910] Oracle Retail Allocation up to 13.2 Apache commons-beanutils-1.8.0.jar memory corruption
3222| [71835] Apache Shiro 1.0.0/1.1.0/1.2.0/1.2.1/1.2.2 unknown vulnerability
3223| [71633] Apachefriends XAMPP 1.8.1 cross site scripting
3224| [71629] Apache Axis2/C spoofing
3225| [67633] Apple Mac OS X up to 10.9.4 apache_mod_php ext/standard/dns.c dns_get_record memory corruption
3226| [67631] Apple Mac OS X up to 10.9.4 apache_mod_php Symlink memory corruption
3227| [67630] Apple Mac OS X up to 10.9.4 apache_mod_php cdf_read_property_info denial of service
3228| [67629] Apple Mac OS X up to 10.9.4 apache_mod_php cdf.c cdf_count_chain denial of service
3229| [67628] Apple Mac OS X up to 10.9.4 apache_mod_php cdf.c cdf_check_stream_offset denial of service
3230| [67627] Apple Mac OS X up to 10.9.4 apache_mod_php softmagic.c mconvert memory corruption
3231| [67626] Apple Mac OS X up to 10.9.4 apache_mod_php softmagic.c denial of service
3232| [67625] Apple Mac OS X up to 10.9.4 apache_mod_php Crash denial of service
3233| [67624] Apple Mac OS X up to 10.9.4 apache_mod_php cdf.c cdf_read_property_info denial of service
3234| [67623] Apple Mac OS X up to 10.9.4 apache_mod_php cdf.c cdf_unpack_summary_info denial of service
3235| [67622] Apple Mac OS X up to 10.9.4 apache_mod_php cdf.c cdf_read_short_sector denial of service
3236| [67620] Apple Mac OS X up to 10.9.4 apache_mod_php magic/Magdir/commands denial of service
3237| [67790] Apache HTTP Server mod_cache NULL Pointer Dereference denial of service
3238| [67522] Apache Tomcat up to 7.0.39 JSP Upload privilege escalation
3239| [70809] Apache POI up to 3.11 Crash denial of service
3240| [70808] Apache POI up to 3.10 unknown vulnerability
3241| [70806] Apache Commons-httpclient 4.2/4.2.1/4.2.2 spoofing
3242| [70749] Apache Axis up to 1.4 getCN spoofing
3243| [70701] Apache Traffic Server up to 3.3.5 denial of service
3244| [70700] Apache OFBiz up to 12.04.03 cross site scripting
3245| [67402] Apache OpenOffice 4.0.0/4.0.1/4.1.0 Calc privilege escalation
3246| [67401] Apache OpenOffice up to 4.1.0 OLE Object information disclosure
3247| [70661] Apache Subversion up to 1.6.17 denial of service
3248| [70660] Apache Subversion up to 1.6.17 spoofing
3249| [70659] Apache Subversion up to 1.6.17 spoofing
3250| [67183] Apache HTTP Server up to 2.4.9 mod_proxy denial of service
3251| [67180] Apache HTTP Server up to 2.4.9 WinNT MPM Memory Leak denial of service
3252| [67185] Apache HTTP Server up to 2.4.9 mod_status Heap-Based memory corruption
3253| [67184] Apache HTTP Server 2.4.5/2.4.6 mod_cache NULL Pointer Dereference denial of service
3254| [67182] Apache HTTP Server up to 2.4.9 mod_deflate Memory Consumption denial of service
3255| [67181] Apache HTTP Server up to 2.4.9 mod_cgid denial of service
3256| [70338] Apache Syncope up to 1.1.7 unknown vulnerability
3257| [70295] Apache CXF up to 2.7.9 Cleartext information disclosure
3258| [70106] Apache Open For Business Project up to 10.04.0 getServerError cross site scripting
3259| [70105] Apache MyFaces up to 2.1.5 JavaServer Faces directory traversal
3260| [69846] Apache HBase up to 0.94.8 information disclosure
3261| [69783] Apache CouchDB up to 1.2.0 memory corruption
3262| [13383] Apache Tomcat up to 6.0.39/7.0.53/8.0.5 XML Parser privilege escalation
3263| [13300] Apache HTTP Server 2.4.1/2.4.2 mod_wsgi setuid privilege escalation
3264| [13299] Apache HTTP Server 2.4.1/2.4.2 mod_wsgi Content-Type Header information disclosure
3265| [13164] Apache CXF up to 2.6.13/2.7.10 SOAP OutgoingChainInterceptor.java Invalid Content denial of service
3266| [13163] Apache CXF up to 2.6.13/2.7.10 SOAP HTML Content denial of service
3267| [13158] Apache Struts up to 2.3.16.2 ParametersInterceptor getClass privilege escalation
3268| [69515] Apache Struts up to 2.3.15.0 CookieInterceptor memory corruption
3269| [13086] Apache Struts up to 1.3.10 Class Loader privilege escalation
3270| [13067] Apache Struts up to 2.3.16.1 Class Loader privilege escalation
3271| [69431] Apache Archiva up to 1.3.6 cross site scripting
3272| [69385] Apache Syncope up to 1.1.6 unknown vulnerability
3273| [69338] Apache Xalan-Java up to 2.7.1 system-property unknown vulnerability
3274| [12742] Trustwave ModSecurity up to 2.7.5 Chunk Extension apache2/modsecurity.c modsecurity_tx_init privilege escalation
3275| [12741] Trustwave ModSecurity up to 2.7.6 Chunked HTTP Transfer apache2/modsecurity.c modsecurity_tx_init Trailing Header privilege escalation
3276| [13387] Apache Tomcat up to 6.0.39/7.0.53/8.0.5 Content-Length Header privilege escalation
3277| [13386] Apache Tomcat Security Manager up to 6.0.39/7.0.53/8.0.5 XSLT privilege escalation
3278| [13385] Apache Tomcat 8.0.0/8.0.1/8.0.3 AJP Request Zero Length denial of service
3279| [13384] Apache Tomcat up to 6.0.39/7.0.53/8.0.5 Chunked HTTP Request denial of service
3280| [12748] Apache CouchDB 1.5.0 UUIDS /_uuids denial of service
3281| [66739] Apache Camel up to 2.12.2 unknown vulnerability
3282| [66738] Apache Camel up to 2.12.2 unknown vulnerability
3283| [12667] Apache HTTP Server 2.4.7 mod_log_config.c log_cookie denial of service
3284| [66695] Apache CouchDB up to 1.2.0 cross site scripting
3285| [66694] Apache CouchDB up to 1.2.0 Partition partition2 directory traversal
3286| [66689] Apache HTTP Server up to 2.0.33 mod_dav dav_xml_get_cdata denial of service
3287| [12518] Apache Tomcat up to 6.0.38/7.0.49/8.0.0-RC9 HTTP Header denial of service
3288| [66498] Apache expressions up to 3.3.0 Whitelist unknown vulnerability
3289| [12781] Apache Struts up to 2.3.8 ParametersInterceptor getClass denial of service
3290| [12439] Apache Tomcat 6.0.33 XML XXE information disclosure
3291| [12438] Apache Tomcat 6.0.33/6.0.34/6.0.35/6.0.36/6.0.37 coyoteadapter.java disableURLRewriting privilege escalation
3292| [66356] Apache Wicket up to 6.8.0 information disclosure
3293| [12209] Apache Tomcat 7.0.0/7.0.50/8.0.0-RC1/8.0.1 Content-Type Header for Multi-Part Request Infinite Loop denial of service
3294| [66322] Apache ActiveMQ up to 5.8.0 cross site scripting
3295| [12291] Apache Struts up to 2.2.3 DebuggingInterceptor privilege escalation
3296| [66255] Apache Open For Business Project up to 10.04.3 cross site scripting
3297| [66200] Apache Hadoop up to 2.0.5 Security Feature information disclosure
3298| [66072] Apache CloudStack up to 4.2.0 Stack-Based unknown vulnerability
3299| [66068] Apache CloudStack up to 4.2.0 Stack-Based unknown vulnerability
3300| [11928] Oracle Secure Global Desktop up to 4.71 Apache Tomcat unknown vulnerability
3301| [11924] Oracle Secure Global Desktop up to 4.63 Apache Tomcat denial of service
3302| [11922] Oracle Secure Global Desktop up to 4.63 Apache Tomcat unknown vulnerability
3303| [66049] Apache XML Security for Java up to 1.4.6 Memory Consumption denial of service
3304| [12199] Apache Subversion up to 1.8.5 mod_dav_svn/repos.c get_resource denial of service
3305| [65946] askapache Firefox Adsense up to 3.0 askapache-firefox-adsense.php cross site request forgery
3306| [65668] Apache Solr 4.0.0 Updater denial of service
3307| [65665] Apache Solr up to 4.3.0 denial of service
3308| [65664] Apache Solr 3.6.0/3.6.1/3.6.2/4.0.0 Updater denial of service
3309| [65663] Apache Solr up to 4.5.1 ResourceLoader directory traversal
3310| [65658] Apache roller 4.0/4.0.1/5.0/5.0.1 unknown vulnerability
3311| [65657] Apache Roller 4.0/4.0.1/5.0/5.0.1 cross site scripting
3312| [11325] Apache Subversion 1.7.13 mod_dontdothat Bypass denial of service
3313| [11324] Apache Subversion up to 1.8.4 mod_dav_svn denial of service
3314| [11098] Apache Tomcat 5.5.25 HTTP Request cross site request forgery
3315| [65410] Apache Struts 2.3.15.3 cross site scripting
3316| [65386] Apache Solr up to 2.2.1 on TYPO3 cross site scripting
3317| [65385] Apache Solr up to 2.2.1 on TYPO3 unknown vulnerability
3318| [11044] Apache Struts 2.3.15.3 showConfig.action cross site scripting
3319| [11043] Apache Struts 2.3.15.3 actionNames.action cross site scripting
3320| [11018] cPanel WHM up to 11.40.0.11 Apache mod_userdir Tweak Interface privilege escalation
3321| [65342] Apache Sling 1.0.2/1.0.4/1.0.6/1.1.0/1.1.2 Auth Core cross site scripting
3322| [65340] Apache Shindig 2.5.0 information disclosure
3323| [65316] Apache Mod Fcgid up to 2.3.7 mod_fcgid fcgid_bucket.c fcgid_header_bucket_read memory corruption
3324| [65313] Apache Sling 2.2.0/2.3.0 AbstractCreateOperation.java deepGetOrCreateNode denial of service
3325| [10826] Apache Struts 2 File privilege escalation
3326| [65204] Apache Camel up to 2.10.1 unknown vulnerability
3327| [10460] Apache Struts 2.0.0/2.3.15.1 Action Mapping Mechanism Bypass privilege escalation
3328| [10459] Apache Struts 2.0.0/2.3.15 Dynamic Method Invocation unknown vulnerability
3329| [10160] Apache Subversion 1.8.0/1.8.1/1.8.2 svnwcsub.py handle_options race condition
3330| [10159] Apache Subversion up to 1.8.2 svnserve write_pid_file race condition
3331| [10158] Apache Subversion 1.8.0/1.8.1/1.8.2 daemonize.py daemon::daemonize race condition
3332| [10157] Apache Subversion up to 1.8.1 FSFS Repository Symlink privilege escalation
3333| [64808] Fail2ban up to 0.8.9 apache-auth.conf denial of service
3334| [64760] Best Practical RT up to 4.0.12 Apache::Session::File information disclosure
3335| [64722] Apache XML Security for C++ Heap-based memory corruption
3336| [64719] Apache XML Security for C++ Heap-based memory corruption
3337| [64718] Apache XML Security for C++ verify denial of service
3338| [64717] Apache XML Security for C++ getURIBaseTXFM memory corruption
3339| [64716] Apache XML Security for C++ spoofing
3340| [64701] Apache CXF up to 2.7.3 XML Parser Memory Consumption denial of service
3341| [64700] Apache CloudStack up to 4.1.0 Stack-Based cross site scripting
3342| [64667] Apache Open For Business Project up to 10.04.04 unknown vulnerability
3343| [64666] Apache Open For Business Project up to 10.04.04 cross site scripting
3344| [9891] Apache HTTP Server 2.2.22 suEXEC Feature .htaccess information disclosure
3345| [64509] Apache ActiveMQ up to 5.8.0 scheduled.jsp cross site scripting
3346| [9826] Apache Subversion up to 1.8.0 mod_dav_svn denial of service
3347| [9683] Apache HTTP Server 2.4.5 mod_session_dbd denial of service
3348| [64485] Apache Struts up to 2.2.3.0 privilege escalation
3349| [9568] Apache Struts up to 2.3.15 DefaultActionMapper cross site request forgery
3350| [9567] Apache Struts up to 2.3.15 DefaultActionMapper memory corruption
3351| [64467] Apache Geronimo 3.0 memory corruption
3352| [64466] Apache OpenJPA up to 2.2.1 Serialization memory corruption
3353| [64457] Apache Struts up to 2.2.3.0 cross site scripting
3354| [64326] Alejandro Garza Apachesolr Autocomplete up to 7.x-1.1 cross site scripting
3355| [9184] Apache Qpid up to 0.20 SSL misconfiguration
3356| [8935] Apache Subversion up to 1.7.9 FSFS Format Repository denial of service
3357| [8934] Apache Subversion up to 1.7.9 Svnserve Server denial of service
3358| [8933] Apache Subversion up to 1.6.21 check-mime-type.pl svnlook memory corruption
3359| [8932] Apache Subversion up to 1.6.21 svn-keyword-check.pl svnlook changed memory corruption
3360| [9022] Apache Struts up to 2.3.14.2 OGNL Expression memory corruption
3361| [8873] Apache Struts 2.3.14 privilege escalation
3362| [8872] Apache Struts 2.3.14 privilege escalation
3363| [8746] Apache HTTP Server Log File Terminal Escape Sequence Filtering mod_rewrite.c do_rewritelog privilege escalation
3364| [8666] Apache Tomcat up to 7.0.32 AsyncListener information disclosure
3365| [8665] Apache Tomcat up to 7.0.29 Chunked Transfer Encoding Extension Size denial of service
3366| [8664] Apache Tomcat up to 7.0.32 FORM Authentication weak authentication
3367| [64075] Apache Subversion up to 1.7.7 mod_dav_svn Crash denial of service
3368| [64074] Apache Subversion up to 1.7.8 mod_dav_svn NULL Pointer Dereference denial of service
3369| [64073] Apache Subversion up to 1.7.8 mod_dav_svn NULL Pointer Dereference denial of service
3370| [64072] Apache Subversion up to 1.7.7 mod_dav_svn NULL Pointer Dereference denial of service
3371| [64071] Apache Subversion up to 1.7.8 mod_dav_svn Memory Consumption denial of service
3372| [8768] Apache Struts up to 2.3.14 on Mac EL and OGNL Interpreter memory corruption
3373| [64006] Apache ActiveMQ up to 5.7.0 denial of service
3374| [64005] Apache ActiveMQ up to 5.7.0 Default Configuration denial of service
3375| [64004] Apache ActiveMQ up to 5.7.0 PortfolioPublishServlet.java cross site scripting
3376| [8427] Apache Tomcat Session Transaction weak authentication
3377| [63960] Apache Maven 3.0.4 Default Configuration spoofing
3378| [63751] Apache qpid up to 0.20 qpid::framing::Buffer denial of service
3379| [63750] Apache qpid up to 0.20 checkAvailable denial of service
3380| [63749] Apache Qpid up to 0.20 Memory Consumption denial of service
3381| [63748] Apache Qpid up to 0.20 Default Configuration denial of service
3382| [63747] Apache Rave up to 0.20 User Account information disclosure
3383| [7889] Apache Subversion up to 1.6.17 mod_dav_svn/svn_fs_file_length() denial of service
3384| [63646] Apache HTTP Server up to 2.2.23/2.4.3 mod_proxy_balancer.c balancer_handler cross site scripting
3385| [7688] Apache CXF up to 2.7.1 WSS4JInterceptor Bypass weak authentication
3386| [7687] Apache CXF up to 2.7.2 Token weak authentication
3387| [63334] Apache CXF up to 2.6.0 WS-Security unknown vulnerability
3388| [63299] Apache CXF up to 2.6.0 WS-Security unknown vulnerability
3389| [7202] Apache HTTP Server 2.4.2 on Oracle Solaris ld_library_path cross site scripting
3390| [7075] Apache Tomcat up to 6.0.35/7.0.27 NIO Connector NioEndpoint.java denial of service
3391| [7074] Apache Tomcat up to 6.0.35/7.0.29 FORM Authentication RealmBase.java weak authentication
3392| [7073] Apache Tomcat up to 6.0.35/7.0.31 CSRF Prevention Filter cross site request forgery
3393| [63090] Apache Tomcat up to 4.1.24 denial of service
3394| [63089] Apache HTTP Server up to 2.2.13 mod_proxy_ajp denial of service
3395| [62933] Apache Tomcat up to 5.5.0 Access Restriction unknown vulnerability
3396| [62929] Apache Tomcat up to 6.0.35/7.0.27 NIO Connector Memory Consumption denial of service
3397| [62833] Apache CXF -/2.6.0 spoofing
3398| [62832] Apache Axis2 up to 1.6.2 spoofing
3399| [62831] Apache Axis up to 1.4 Java Message Service spoofing
3400| [62830] Apache Commons-httpclient 3.0 Payments spoofing
3401| [62826] Apache Libcloud up to 0.11.0 spoofing
3402| [62757] Apache Open For Business Project up to 10.04.0 unknown vulnerability
3403| [8830] Red Hat JBoss Enterprise Application Platform 6.0.1 org.apache.catalina.connector.Response.encodeURL information disclosure
3404| [62661] Apache Axis2 unknown vulnerability
3405| [62658] Apache Axis2 unknown vulnerability
3406| [62467] Apache Qpid up to 0.17 denial of service
3407| [62417] Apache CXF 2.4.7/2.4.8/2.5.3/2.5.4/2.6.1 spoofing
3408| [6301] Apache HTTP Server mod_pagespeed cross site scripting
3409| [6300] Apache HTTP Server mod_pagespeed Hostname information disclosure
3410| [6123] Apache Wicket up to 1.5.7 Ajax Link cross site scripting
3411| [62035] Apache Struts up to 2.3.4 denial of service
3412| [61916] Apache QPID 0.5/0.6/0.14/0.16 unknown vulnerability
3413| [6998] Apache Tomcat 5.5.35/6.0.35/7.0.28 DIGEST Authentication Session State Caching privilege escalation
3414| [6997] Apache Tomcat 5.5.35/6.0.35/7.0.28 HTTP Digest Authentication Implementation privilege escalation
3415| [6092] Apache HTTP Server 2.4.0/2.4.1/2.4.2 mod_proxy_ajp.c information disclosure
3416| [6090] Apache HTTP Server 2.4.0/2.4.1/2.4.2 mod_proxy_http.c information disclosure
3417| [61507] Apache POI up to 3.8 UnhandledDataStructure denial of service
3418| [6070] Apache Struts up to 2.3.4 Token Name Configuration Parameter privilege escalation
3419| [6069] Apache Struts up to 2.3.4 Request Parameter OGNL Expression denial of service
3420| [5764] Oracle Solaris 10 Apache HTTP Server information disclosure
3421| [5700] Oracle Secure Backup 10.3.0.3/10.4.0.1 Apache denial of service
3422| [61255] Apache Hadoop 2.0.0 Kerberos unknown vulnerability
3423| [61229] Apache Sling up to 2.1.1 denial of service
3424| [61152] Apache Commons-compress 1.0/1.1/1.2/1.3/1.4 denial of service
3425| [61094] Apache Roller up to 5.0 cross site scripting
3426| [61093] Apache Roller up to 5.0 cross site request forgery
3427| [61005] Apache OpenOffice 3.3/3.4 unknown vulnerability
3428| [9673] Apache HTTP Server up to 2.4.4 mod_dav mod_dav.c Request denial of service
3429| [5436] Apache OpenOffice 3.3/3.4 WPXContentListener.cpp _closeTableRow File memory corruption
3430| [5435] Apache OpenOffice 3.3/3.4 vclmi.dll File memory corruption
3431| [60730] PHP 5.4.0/5.4.1/5.4.2 apache_request_headers memory corruption
3432| [60708] Apache Qpid 0.12 unknown vulnerability
3433| [5032] Apache Hadoop up to 0.20.205.0/1.0.1/0.23.1 Kerberos/MapReduce Security Feature privilege escalation
3434| [4949] Apache Struts File Upload XSLTResult.java XSLT File privilege escalation
3435| [4955] Apache Traffic Server 3.0.3/3.1.2 HTTP Header Parser memory corruption
3436| [4882] Apache Wicket up to 1.5.4 directory traversal
3437| [4881] Apache Wicket up to 1.4.19 cross site scripting
3438| [4884] Apache HTTP Server up to 2.3.6 mod_fcgid fcgid_spawn_ctl.c FcgidMaxProcessesPerClass HTTP Requests denial of service
3439| [60352] Apache Struts up to 2.2.3 memory corruption
3440| [60153] Apache Portable Runtime up to 1.4.3 denial of service
3441| [4598] Apache Struts 1.3.10 upload-submit.do cross site scripting
3442| [4597] Apache Struts 1.3.10 processSimple.do cross site scripting
3443| [4596] Apache Struts 2.0.14/2.2.3 struts2-rest-showcase/orders cross site scripting
3444| [4595] Apache Struts 2.0.14/2.2.3 struts2-showcase/person/editPerson.action cross site scripting
3445| [4583] Apache HTTP Server up to 2.2.21 Threaded MPM denial of service
3446| [4582] Apache HTTP Server up to 2.2.21 protocol.c information disclosure
3447| [4571] Apache Struts up to 2.3.1.2 privilege escalation
3448| [4557] Apache Tomcat up to 7.0.21 Caching/Recycling information disclosure
3449| [59934] Apache Tomcat up to 6.0.9 DigestAuthenticator.java unknown vulnerability
3450| [59933] Apache Tomcat up to 6.0.9 Access Restriction unknown vulnerability
3451| [59932] Apache Tomcat up to 6.0.9 unknown vulnerability
3452| [59931] Apache Tomcat up to 6.0.9 Access Restriction information disclosure
3453| [59902] Apache Struts up to 2.2.3 Interfaces unknown vulnerability
3454| [4528] Apache Struts up to 2.2.3 DebuggingInterceptor privilege escalation
3455| [4527] Apache Struts up to 2.2.3 ExceptionDelegator cross site scripting
3456| [59888] Apache Tomcat up to 6.0.6 denial of service
3457| [59886] Apache ActiveMQ up to 5.5.1 Crash denial of service
3458| [4513] Apache Struts up to 2.3.1 ParameterInterceptor directory traversal
3459| [4512] Apache Struts up to 2.2.3 CookieInterceptor privilege escalation
3460| [59850] Apache Geronimo up to 2.2.1 denial of service
3461| [59825] Apache HTTP Server up to 2.1.7 mod_reqtimeout denial of service
3462| [59556] Apache HTTP Server up to 2.0.53 mod_proxy information disclosure
3463| [58467] Apache libcloud 0.2.0/0.3.0/0.3.1/0.4.0 Access Restriction spoofing
3464| [58413] Apache Tomcat up to 6.0.10 spoofing
3465| [58381] Apache Wicket up to 1.4.17 cross site scripting
3466| [58296] Apache Tomcat up to 7.0.19 unknown vulnerability
3467| [57888] Apache HttpClient 4.0/4.0.1/4.1 Authorization information disclosure
3468| [57587] Apache Subversion up to 1.6.16 mod_dav_svn information disclosure
3469| [57585] Apache Subversion up to 1.6.16 mod_dav_svn Memory Consumption denial of service
3470| [57584] Apache Subversion up to 1.6.4 mod_dav_svn NULL Pointer Dereference denial of service
3471| [57577] Apache Rampart-C 1.3.0 Access Restriction rampart_timestamp_token_validate privilege escalation
3472| [57568] Apache Archiva up to 1.3.4 cross site scripting
3473| [57567] Apache Archiva up to 1.3.4 cross site request forgery
3474| [57481] Apache Tomcat 7.0.12/7.0.13 Access Restriction unknown vulnerability
3475| [4355] Apache HTTP Server APR apr_fnmatch denial of service
3476| [57435] Apache Struts up to 2.2.1.1 FileHandler.java cross site scripting
3477| [57425] Apache Struts up to 2.2.1.1 cross site scripting
3478| [4352] Apache HTTP Server 2.2.x APR apr_fnmatch denial of service
3479| [57025] Apache Tomcat up to 7.0.11 information disclosure
3480| [57024] Apache Tomcat 7.0.11 Access Restriction information disclosure
3481| [56774] IBM WebSphere Application Server up to 7.0.0.14 org.apache.jasper.runtime.JspWriterImpl.response denial of service
3482| [56824] Apache Subversion up to 1.6.4 mod_dav_svn NULL Pointer Dereference denial of service
3483| [56832] Apache Tomcat up to 7.0.10 Access Restriction information disclosure
3484| [56830] Apache Tomcat up to 7.0.9 Access Restriction privilege escalation
3485| [12440] Apache Tomcat 6.0.33 Malicious Request cross site scripting
3486| [56512] Apache Continuum up to 1.4.0 cross site scripting
3487| [4285] Apache Tomcat 5.x JVM getLocale denial of service
3488| [4284] Apache Tomcat 5.x HTML Manager Infinite Loop cross site scripting
3489| [4283] Apache Tomcat 5.x ServletContect privilege escalation
3490| [56441] Apache Tomcat up to 7.0.6 denial of service
3491| [56300] Apache CouchDB up to 1.0.1 Web Administration Interface cross site scripting
3492| [55967] Apache Subversion up to 1.6.4 rev_hunt.c denial of service
3493| [55966] Apache Subversion up to 1.6.4 mod_dav_svn repos.c walk denial of service
3494| [55095] Apache Axis2 up to 1.6 Default Password memory corruption
3495| [55631] Apache Archiva up to 1.3.1 User Account cross site request forgery
3496| [55556] Apache Tomcat up to 6.0.29 Default Configuration information disclosure
3497| [55553] Apache Tomcat up to 7.0.4 sessionsList.jsp cross site scripting
3498| [55162] Apache MyFaces up to 2.0.0 Authentication Code unknown vulnerability
3499| [54881] Apache Subversion up to 1.6.12 mod_dav_svn authz.c privilege escalation
3500| [54879] Apache APR-util up to 0.9.14 mod_reqtimeout apr_brigade_split_line denial of service
3501| [54693] Apache Traffic Server DNS Cache unknown vulnerability
3502| [54416] Apache CouchDB up to 0.11.0 cross site request forgery
3503| [54394] Apache CXF up to 2.2.8 Memory Consumption denial of service
3504| [54261] Apache Tomcat jsp/cal/cal2.jsp cross site scripting
3505| [54166] Apache HTTP Server up to 2.2.12 mod_cache Crash denial of service
3506| [54385] Apache Struts up to 2.1.8.1 ParameterInterceptor unknown vulnerability
3507| [54012] Apache Tomcat up to 6.0.10 denial of service
3508| [53763] Apache Axis2 1.3/1.4/1.4.1/1.5/1.5.1 Memory Consumption denial of service
3509| [53368] Apache MyFaces 1.1.7/1.2.8 cross site scripting
3510| [53397] Apache axis2 1.4.1/1.5.1 Administration Console cross site scripting
3511| [52894] Apache Tomcat up to 6.0.7 information disclosure
3512| [52960] Apache ActiveMQ up to 5.4-snapshot information disclosure
3513| [52843] Apache HTTP Server mod_auth_shadow unknown vulnerability
3514| [52786] Apache Open For Business Project up to 09.04 cross site scripting
3515| [52587] Apache ActiveMQ up to 5.3.0 cross site request forgery
3516| [52586] Apache ActiveMQ up to 5.3.0 cross site scripting
3517| [52584] Apache CouchDB up to 0.10.1 information disclosure
3518| [51757] Apache HTTP Server 2.0.44 cross site scripting
3519| [51756] Apache HTTP Server 2.0.44 spoofing
3520| [51717] Apache HTTP Server up to 1.3.3 mod_proxy ap_proxy_send_fb memory corruption
3521| [51690] Apache Tomcat up to 6.0 directory traversal
3522| [51689] Apache Tomcat up to 6.0 information disclosure
3523| [51688] Apache Tomcat up to 6.0 directory traversal
3524| [50886] HP Operations Manager 8.10 on Windows File Upload org.apache.catalina.manager.HTMLManagerServlet memory corruption
3525| [50802] Apache Tomcat up to 3.3 Default Password weak authentication
3526| [50626] Apache Solr 1.0.0 cross site scripting
3527| [49857] Apache HTTP Server mod_proxy_ftp cross site scripting
3528| [49856] Apache HTTP Server 2.2.13 mod_proxy_ftp ap_proxy_ftp_handler denial of service
3529| [49348] Apache Xerces-C++ 2.7.0 Stack-Based denial of service
3530| [86789] Apache Portable Runtime memory/unix/apr_pools.c unknown vulnerability
3531| [49283] Apache APR-util up to 1.3.8 apr-util misc/apr_rmm.c apr_rmm_realloc memory corruption
3532| [48952] Apache HTTP Server up to 1.3.6 mod_deflate denial of service
3533| [48626] Apache Tomcat up to 4.1.23 Access Restriction directory traversal
3534| [48431] Apache Tomcat up to 4.1.23 j_security_check cross site scripting
3535| [48430] Apache Tomcat up to 4.1.23 mod_jk denial of service
3536| [47801] Apache Geronimo 2.1/2.1.1/2.1.2/2.1.3 Administration Console cross site request forgery
3537| [47800] Apache Geronimo 2.1/2.1.1/2.1.2/2.1.3 Administration Console cross site scripting
3538| [47799] Apache Geronimo 2.1/2.1.1/2.1.2/2.1.3 Administration Console directory traversal
3539| [47648] Apache Tiles 2.1.0/2.1.1 cross site scripting
3540| [47640] Apache Struts 2.0.6/2.0.8/2.0.9/2.0.11/2.1 cross site scripting
3541| [47638] Apache Tomcat up to 4.1.23 mod_jk information disclosure
3542| [47636] Apache Struts 2.0.9 xip_client.html cross site scripting
3543| [47593] Apache Mod Perl 1 perl-status Apache::Status cross site scripting
3544| [47637] Apache Struts 1.0.2/1.1/1.2.4/1.2.7/1.2.8 cross site scripting
3545| [47239] Apache Struts up to 2.1.2 Beta struts directory traversal
3546| [47214] Apachefriends xampp 1.6.8 spoofing
3547| [47213] Apachefriends xampp 1.6.8 htaccess cross site request forgery
3548| [47162] Apachefriends XAMPP 1.4.4 weak authentication
3549| [47065] Apache Tomcat 4.1.23 cross site scripting
3550| [46834] Apache Tomcat up to 5.5.20 cross site scripting
3551| [46004] Apache Jackrabbit 1.4/1.5.0 search.jsp cross site scripting
3552| [49205] Apache Roller 2.3/3.0/3.1/4.0 Search cross site scripting
3553| [86625] Apache Struts directory traversal
3554| [44461] Apache Tomcat up to 5.5.0 information disclosure
3555| [44389] Apache Xerces-C++ XML Parser Memory Consumption denial of service
3556| [44352] Apache Friends XAMPP 1.6.8 adodb.php cross site scripting
3557| [43663] Apache Tomcat up to 6.0.16 directory traversal
3558| [43612] Apache Friends XAMPP 1.6.7 iart.php cross site scripting
3559| [43556] Apache HTTP Server up to 2.1.8 mod_proxy_ftp proxy_ftp.c cross site scripting
3560| [43516] Apache Tomcat up to 4.1.20 directory traversal
3561| [43509] Apache Tomcat up to 6.0.13 cross site scripting
3562| [42637] Apache Tomcat up to 6.0.16 cross site scripting
3563| [42325] Apache HTTP Server up to 2.1.8 Error Page cross site scripting
3564| [41838] Apache-SSL 1.3.34 1.57 expandcert privilege escalation
3565| [41091] Apache Software Foundation Mod Jk up to 2.0.1 mod_jk2 Stack-based memory corruption
3566| [40924] Apache Tomcat up to 6.0.15 information disclosure
3567| [40923] Apache Tomcat up to 6.0.15 unknown vulnerability
3568| [40922] Apache Tomcat up to 6.0 information disclosure
3569| [40710] Apache HTTP Server up to 2.0.61 mod_negotiation cross site scripting
3570| [40709] Apache HTTP Server up to 2.0.53 mod_negotiation cross site scripting
3571| [40656] Apache Tomcat 5.5.20 information disclosure
3572| [40503] Apache HTTP Server mod_proxy_ftp cross site scripting
3573| [40502] Apache HTTP Server up to 2.2.5 mod_proxy_balancer memory corruption
3574| [40501] Apache HTTP Server 2.2.6 mod_proxy_balancer cross site request forgery
3575| [40398] Apache HTTP Server up to 2.2 mod_proxy_balancer cross site scripting
3576| [40397] Apache HTTP Server up to 2.2 mod_proxy_balancer balancer_handler denial of service
3577| [40234] Apache Tomcat up to 6.0.15 directory traversal
3578| [40221] Apache HTTP Server 2.2.6 information disclosure
3579| [40027] David Castro Apache Authcas 0.4 sql injection
3580| [3495] Apache OpenOffice up to 2.3 Database Document Processor unknown vulnerability
3581| [3489] Apache HTTP Server 2.x HTTP Header cross site scripting
3582| [3414] Apache Tomcat WebDAV Stored privilege escalation
3583| [39489] Apache Jakarta Slide up to 2.1 directory traversal
3584| [39540] Apache Geronimo 2.0/2.0.1/2.0.2/2.1 unknown vulnerability
3585| [3310] Apache OpenOffice 1.1.3/2.0.4/2.2.1 TIFF Image Parser Heap-based memory corruption
3586| [38768] Apache HTTP Server up to 2.1.7 mod_autoindex.c cross site scripting
3587| [38952] Apache Geronimo 2.0.1/2.1 unknown vulnerability
3588| [38658] Apache Tomcat 4.1.31 cal2.jsp cross site request forgery
3589| [38524] Apache Geronimo 2.0 unknown vulnerability
3590| [3256] Apache Tomcat up to 6.0.13 cross site scripting
3591| [38331] Apache Tomcat 4.1.24 information disclosure
3592| [38330] Apache Tomcat 4.1.24 information disclosure
3593| [38185] Apache Tomcat 3.3/3.3.1/3.3.1a/3.3.2 Error Message CookieExample cross site scripting
3594| [37967] Apache Tomcat up to 4.1.36 Error Message sendmail.jsp cross site scripting
3595| [37647] Apache Derby 10.1.1.0/10.1.2.1/10.1.3.1 Authorization unknown vulnerability
3596| [37646] Apache Derby 10.1.1.0/10.1.2.1/10.1.3.1 unknown vulnerability
3597| [3141] Apache Tomcat up to 4.1.31 Accept-Language Header cross site scripting
3598| [3133] Apache Tomcat up to 6.0 HTTP cross site scripting
3599| [37292] Apache Tomcat up to 5.5.1 cross site scripting
3600| [3130] Apache OpenOffice 2.2.1 RTF Document Heap-based memory corruption
3601| [36981] Apache Tomcat JK Web Server Connector up to 1.2.22 mod_jk directory traversal
3602| [36892] Apache Tomcat up to 4.0.0 hello.jsp cross site scripting
3603| [37320] Apache MyFaces Tomahawk up to 1.1.4 cross site scripting
3604| [36697] Apache Tomcat up to 5.5.17 implicit-objects.jsp cross site scripting
3605| [36491] Apache Axis 1.0 Installation javaioFileNotFoundException information disclosure
3606| [36400] Apache Tomcat 5.5.15 mod_jk cross site scripting
3607| [36698] Apache Tomcat up to 4.0.0 cal2.jsp cross site scripting
3608| [36224] XAMPP Apache Distribution up to 1.6.0a adodb.php connect memory corruption
3609| [36225] XAMPP Apache Distribution 1.6.0a sql injection
3610| [2997] Apache httpd/Tomcat 5.5/6.0 directory traversal
3611| [35896] Apache Apache Test up to 1.29 mod_perl denial of service
3612| [35653] Avaya S8300 Cm 3.1.2 Apache Tomcat unknown vulnerability
3613| [35402] Apache Tomcat JK Web Server Connector 1.2.19 mod_jk.so map_uri_to_worker memory corruption
3614| [35067] Apache Stats up to 0.0.2 extract unknown vulnerability
3615| [35025] Apache Stats up to 0.0.3 extract unknown vulnerability
3616| [34252] Apache HTTP Server denial of service
3617| [2795] Apache OpenOffice 2.0.4 WMF/EMF File Heap-based memory corruption
3618| [33877] Apache Opentaps 0.9.3 cross site scripting
3619| [33876] Apache Open For Business Project unknown vulnerability
3620| [33875] Apache Open For Business Project cross site scripting
3621| [2703] Apache Jakarta Tomcat up to 5.x der_get_oid memory corruption
3622| [2611] Apache HTTP Server up to 1.0.1 set_var Format String
3623|
3624| MITRE CVE - https://cve.mitre.org:
3625| [CVE-2013-4156] Apache OpenOffice.org (OOo) before 4.0 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted element in an OOXML document file.
3626| [CVE-2013-4131] The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.10 and 1.8.x before 1.8.1 allows remote authenticated users to cause a denial of service (assertion failure or out-of-bounds read) via a certain (1) COPY, (2) DELETE, or (3) MOVE request against a revision root.
3627| [CVE-2013-3239] phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir directory is configured, allows remote authenticated users to execute arbitrary code by using a double extension in the filename of an export file, leading to interpretation of this file as an executable file by the Apache HTTP Server, as demonstrated by a .php.sql filename.
3628| [CVE-2013-3060] The web console in Apache ActiveMQ before 5.8.0 does not require authentication, which allows remote attackers to obtain sensitive information or cause a denial of service via HTTP requests.
3629| [CVE-2013-2765] The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.
3630| [CVE-2013-2251] Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
3631| [CVE-2013-2249] mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.
3632| [CVE-2013-2248] Multiple open redirect vulnerabilities in Apache Struts 2.0.0 through 2.3.15 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in a parameter using the (1) redirect: or (2) redirectAction: prefix.
3633| [CVE-2013-2189] Apache OpenOffice.org (OOo) before 4.0 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via invalid PLCF data in a DOC document file.
3634| [CVE-2013-2135] Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice.
3635| [CVE-2013-2134] Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted action name that is not properly handled during wildcard matching, a different vulnerability than CVE-2013-2135.
3636| [CVE-2013-2115] Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag. NOTE: this issue is due to an incomplete fix for CVE-2013-1966.
3637| [CVE-2013-2071] java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.
3638| [CVE-2013-2067] java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack.
3639| [CVE-2013-1966] Apache Struts 2 before 2.3.14.1 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag.
3640| [CVE-2013-1965] Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.1, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect.
3641| [CVE-2013-1896] mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.
3642| [CVE-2013-1884] The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (segmentation fault and crash) via a log REPORT request with an invalid limit, which triggers an access of an uninitialized variable.
3643| [CVE-2013-1879] Cross-site scripting (XSS) vulnerability in scheduled.jsp in Apache ActiveMQ 5.8.0 and earlier allows remote attackers to inject arbitrary web script or HTML via vectors involving the "cron of a message."
3644| [CVE-2013-1862] mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator.
3645| [CVE-2013-1849] The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL.
3646| [CVE-2013-1847] The mod_dav_svn Apache HTTPD server module in Subversion 1.6.0 through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an anonymous LOCK for a URL that does not exist.
3647| [CVE-2013-1846] The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a LOCK on an activity URL.
3648| [CVE-2013-1845] The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (memory consumption) by (1) setting or (2) deleting a large number of properties for a file or directory.
3649| [CVE-2013-1814] The users/get program in the User RPC API in Apache Rave 0.11 through 0.20 allows remote authenticated users to obtain sensitive information about all user accounts via the offset parameter, as demonstrated by discovering password hashes in the password field of a response.
3650| [CVE-2013-1777] The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not property implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object.
3651| [CVE-2013-1768] The BrokerFactory functionality in Apache OpenJPA 1.x before 1.2.3 and 2.x before 2.2.2 creates local executable JSP files containing logging trace data produced during deserialization of certain crafted OpenJPA objects, which makes it easier for remote attackers to execute arbitrary code by creating a serialized object and leveraging improperly secured server programs.
3652| [CVE-2013-1088] Cross-site request forgery (CSRF) vulnerability in Novell iManager 2.7 before SP6 Patch 1 allows remote attackers to hijack the authentication of arbitrary users by leveraging improper request validation by iManager code deployed within an Apache Tomcat container.
3653| [CVE-2013-1048] The Debian apache2ctl script in the apache2 package squeeze before 2.2.16-6+squeeze11, wheezy before 2.2.22-13, and sid before 2.2.22-13 for the Apache HTTP Server on Debian GNU/Linux does not properly create the /var/lock/apache2 lock directory, which allows local users to gain privileges via an unspecified symlink attack.
3654| [CVE-2013-0966] The Apple mod_hfs_apple module for the Apache HTTP Server in Apple Mac OS X before 10.8.3 does not properly handle ignorable Unicode characters, which allows remote attackers to bypass intended directory authentication requirements via a crafted pathname in a URI.
3655| [CVE-2013-0942] Cross-site scripting (XSS) vulnerability in EMC RSA Authentication Agent 7.1 before 7.1.1 for Web for Internet Information Services, and 7.1 before 7.1.1 for Web for Apache, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
3656| [CVE-2013-0941] EMC RSA Authentication API before 8.1 SP1, RSA Web Agent before 5.3.5 for Apache Web Server, RSA Web Agent before 5.3.5 for IIS, RSA PAM Agent before 7.0, and RSA Agent before 6.1.4 for Microsoft Windows use an improper encryption algorithm and a weak key for maintaining the stored data of the node secret for the SecurID Authentication API, which allows local users to obtain sensitive information via cryptographic attacks on this data.
3657| [CVE-2013-0253] The default configuration of Apache Maven 3.0.4, when using Maven Wagon 2.1, disables SSL certificate checks, which allows remote attackers to spoof servers via a man-in-the-middle (MITM) attack.
3658| [CVE-2013-0248] The default configuration of javax.servlet.context.tempdir in Apache Commons FileUpload 1.0 through 1.2.2 uses the /tmp directory for uploaded files, which allows local users to overwrite arbitrary files via an unspecified symlink attack.
3659| [CVE-2013-0239] Apache CXF before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3, when the plaintext UsernameToken WS-SecurityPolicy is enabled, allows remote attackers to bypass authentication via a security header of a SOAP request containing a UsernameToken element that lacks a password child element.
3660| [CVE-2012-6573] Cross-site scripting (XSS) vulnerability in the Apache Solr Autocomplete module 6.x-1.x before 6.x-1.4 and 7.x-1.x before 7.x-1.3 for Drupal allows remote attackers to inject arbitrary web script or HTML via vectors involving autocomplete results.
3661| [CVE-2012-6551] The default configuration of Apache ActiveMQ before 5.8.0 enables a sample web application, which allows remote attackers to cause a denial of service (broker resource consumption) via HTTP requests.
3662| [CVE-2012-6092] Multiple cross-site scripting (XSS) vulnerabilities in the web demos in Apache ActiveMQ before 5.8.0 allow remote attackers to inject arbitrary web script or HTML via (1) the refresh parameter to PortfolioPublishServlet.java (aka demo/portfolioPublish or Market Data Publisher), or vectors involving (2) debug logs or (3) subscribe messages in webapp/websocket/chat.js. NOTE: AMQ-4124 is covered by CVE-2012-6551.
3663| [CVE-2012-5887] The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests.
3664| [CVE-2012-5886] The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID.
3665| [CVE-2012-5885] The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184.
3666| [CVE-2012-5786] The wsdl_first_https sample code in distribution/src/main/release/samples/wsdl_first_https/src/main/ in Apache CXF, possibly 2.6.0, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
3667| [CVE-2012-5785] Apache Axis2/Java 1.6.2 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
3668| [CVE-2012-5784] Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
3669| [CVE-2012-5783] Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
3670| [CVE-2012-5633] The URIMappingInterceptor in Apache CXF before 2.5.8, 2.6.x before 2.6.5, and 2.7.x before 2.7.2, when using the WSS4JInInterceptor, bypasses WS-Security processing, which allows remote attackers to obtain access to SOAP services via an HTTP GET request.
3671| [CVE-2012-5616] Apache CloudStack 4.0.0-incubating and Citrix CloudPlatform (formerly Citrix CloudStack) before 3.0.6 stores sensitive information in the log4j.conf log file, which allows local users to obtain (1) the SSH private key as recorded by the createSSHKeyPair API, (2) the password of an added host as recorded by the AddHost API, or the password of an added VM as recorded by the (3) DeployVM or (4) ResetPasswordForVM API.
3672| [CVE-2012-5568] Apache Tomcat through 7.0.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris.
3673| [CVE-2012-5351] Apache Axis2 allows remote attackers to forge messages and bypass authentication via a SAML assertion that lacks a Signature element, aka a "Signature exclusion attack," a different vulnerability than CVE-2012-4418.
3674| [CVE-2012-4558] Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.
3675| [CVE-2012-4557] The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.
3676| [CVE-2012-4556] The token processing system (pki-tps) in Red Hat Certificate System (RHCS) before 8.1.3 allows remote attackers to cause a denial of service (Apache httpd web server child process restart) via certain unspecified empty search fields in a user certificate search query.
3677| [CVE-2012-4555] The token processing system (pki-tps) in Red Hat Certificate System (RHCS) before 8.1.3 does not properly handle interruptions of token format operations, which allows remote attackers to cause a denial of service (NULL pointer dereference and Apache httpd web server child process crash) via unspecified vectors.
3678| [CVE-2012-4534] org/apache/tomcat/util/net/NioEndpoint.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28, when the NIO connector is used in conjunction with sendfile and HTTPS, allows remote attackers to cause a denial of service (infinite loop) by terminating the connection during the reading of a response.
3679| [CVE-2012-4528] The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass rules, and deliver arbitrary POST data to a PHP application, via a multipart request in which an invalid part precedes the crafted data.
3680| [CVE-2012-4501] Citrix Cloud.com CloudStack, and Apache CloudStack pre-release, allows remote attackers to make arbitrary API calls by leveraging the system user account, as demonstrated by API calls to delete VMs.
3681| [CVE-2012-4460] The serializing/deserializing functions in the qpid::framing::Buffer class in Apache Qpid 0.20 and earlier allow remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors. NOTE: this issue could also trigger an out-of-bounds read, but it might not trigger a crash.
3682| [CVE-2012-4459] Integer overflow in the qpid::framing::Buffer::checkAvailable function in Apache Qpid 0.20 and earlier allows remote attackers to cause a denial of service (crash) via a crafted message, which triggers an out-of-bounds read.
3683| [CVE-2012-4458] The AMQP type decoder in Apache Qpid 0.20 and earlier allows remote attackers to cause a denial of service (memory consumption and server crash) via a large number of zero width elements in the client-properties map in a connection.start-ok message.
3684| [CVE-2012-4446] The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request.
3685| [CVE-2012-4431] org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.32 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism via a request that lacks a session identifier.
3686| [CVE-2012-4418] Apache Axis2 allows remote attackers to forge messages and bypass authentication via an "XML Signature wrapping attack."
3687| [CVE-2012-4387] Apache Struts 2.0.0 through 2.3.4 allows remote attackers to cause a denial of service (CPU consumption) via a long parameter name, which is processed as an OGNL expression.
3688| [CVE-2012-4386] The token check mechanism in Apache Struts 2.0.0 through 2.3.4 does not properly validate the token name configuration parameter, which allows remote attackers to perform cross-site request forgery (CSRF) attacks by setting the token name configuration parameter to a session attribute.
3689| [CVE-2012-4360] Cross-site scripting (XSS) vulnerability in the mod_pagespeed module 0.10.19.1 through 0.10.22.4 for the Apache HTTP Server allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
3690| [CVE-2012-4063] The Apache Santuario configuration in Eucalyptus before 3.1.1 does not properly restrict applying XML Signature transforms to documents, which allows remote attackers to cause a denial of service via unspecified vectors.
3691| [CVE-2012-4001] The mod_pagespeed module before 0.10.22.6 for the Apache HTTP Server does not properly verify its host name, which allows remote attackers to trigger HTTP requests to arbitrary hosts via unspecified vectors, as demonstrated by requests to intranet servers.
3692| [CVE-2012-3908] Multiple cross-site request forgery (CSRF) vulnerabilities in the ISE Administrator user interface (aka the Apache Tomcat interface) on Cisco Identity Services Engine (ISE) 3300 series appliances before 1.1.0.665 Cumulative Patch 1 allow remote attackers to hijack the authentication of administrators, aka Bug ID CSCty46684.
3693| [CVE-2012-3546] org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.30, when FORM authentication is used, allows remote attackers to bypass security-constraint checks by leveraging a previous setUserPrincipal call and then placing /j_security_check at the end of a URI.
3694| [CVE-2012-3544] Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.
3695| [CVE-2012-3526] The reverse proxy add forward module (mod_rpaf) 0.5 and 0.6 for the Apache HTTP Server allows remote attackers to cause a denial of service (server or application crash) via multiple X-Forwarded-For headers in a request.
3696| [CVE-2012-3513] munin-cgi-graph in Munin before 2.0.6, when running as a CGI module under Apache, allows remote attackers to load new configurations and create files in arbitrary directories via the logdir command.
3697| [CVE-2012-3506] Unspecified vulnerability in the Apache Open For Business Project (aka OFBiz) 10.04.x before 10.04.03 has unknown impact and attack vectors.
3698| [CVE-2012-3502] The proxy functionality in (1) mod_proxy_ajp.c in the mod_proxy_ajp module and (2) mod_proxy_http.c in the mod_proxy_http module in the Apache HTTP Server 2.4.x before 2.4.3 does not properly determine the situations that require closing a back-end connection, which allows remote attackers to obtain sensitive information in opportunistic circumstances by reading a response that was intended for a different client.
3699| [CVE-2012-3499] Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
3700| [CVE-2012-3467] Apache QPID 0.14, 0.16, and earlier uses a NullAuthenticator mechanism to authenticate catch-up shadow connections to AMQP brokers, which allows remote attackers to bypass authentication.
3701| [CVE-2012-3451] Apache CXF before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 allows remote attackers to execute unintended web-service operations by sending a header with a SOAP Action String that is inconsistent with the message body.
3702| [CVE-2012-3446] Apache Libcloud before 0.11.1 uses an incorrect regular expression during verification of whether the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
3703| [CVE-2012-3376] DataNodes in Apache Hadoop 2.0.0 alpha does not check the BlockTokens of clients when Kerberos is enabled and the DataNode has checked out the same BlockPool twice from a NodeName, which might allow remote clients to read arbitrary blocks, write to blocks to which they only have read access, and have other unspecified impacts.
3704| [CVE-2012-3373] Cross-site scripting (XSS) vulnerability in Apache Wicket 1.4.x before 1.4.21 and 1.5.x before 1.5.8 allows remote attackers to inject arbitrary web script or HTML via vectors involving a %00 sequence in an Ajax link URL associated with a Wicket app.
3705| [CVE-2012-3126] Unspecified vulnerability in the Solaris Cluster component in Oracle Sun Products Suite 3.3 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Apache Tomcat Agent.
3706| [CVE-2012-3123] Unspecified vulnerability in Oracle Sun Solaris 10 allows remote attackers to affect confidentiality, related to Apache HTTP Server.
3707| [CVE-2012-2760] mod_auth_openid before 0.7 for Apache uses world-readable permissions for /tmp/mod_auth_openid.db, which allows local users to obtain session ids.
3708| [CVE-2012-2733] java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.
3709| [CVE-2012-2687] Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.
3710| [CVE-2012-2381] Multiple cross-site scripting (XSS) vulnerabilities in Apache Roller before 5.0.1 allow remote authenticated users to inject arbitrary web script or HTML by leveraging the blogger role.
3711| [CVE-2012-2380] Multiple cross-site request forgery (CSRF) vulnerabilities in the admin/editor console in Apache Roller before 5.0.1 allow remote attackers to hijack the authentication of admins or editors by leveraging the HTTP POST functionality.
3712| [CVE-2012-2379] Apache CXF 2.4.x before 2.4.8, 2.5.x before 2.5.4, and 2.6.x before 2.6.1, when a Supporting Token specifies a child WS-SecurityPolicy 1.1 or 1.2 policy, does not properly ensure that an XML element is signed or encrypted, which has unspecified impact and attack vectors.
3713| [CVE-2012-2378] Apache CXF 2.4.5 through 2.4.7, 2.5.1 through 2.5.3, and 2.6.x before 2.6.1, does not properly enforce child policies of a WS-SecurityPolicy 1.1 SupportingToken policy on the client side, which allows remote attackers to bypass the (1) AlgorithmSuite, (2) SignedParts, (3) SignedElements, (4) EncryptedParts, and (5) EncryptedElements policies.
3714| [CVE-2012-2329] Buffer overflow in the apache_request_headers function in sapi/cgi/cgi_main.c in PHP 5.4.x before 5.4.3 allows remote attackers to cause a denial of service (application crash) via a long string in the header of an HTTP request.
3715| [CVE-2012-2145] Apache Qpid 0.17 and earlier does not properly restrict incoming client connections, which allows remote attackers to cause a denial of service (file descriptor consumption) via a large number of incomplete connections.
3716| [CVE-2012-2138] The @CopyFrom operation in the POST servlet in the org.apache.sling.servlets.post bundle before 2.1.2 in Apache Sling does not prevent attempts to copy an ancestor node to a descendant node, which allows remote attackers to cause a denial of service (infinite loop) via a crafted HTTP request.
3717| [CVE-2012-2098] Algorithmic complexity vulnerability in the sorting algorithms in bzip2 compressing stream (BZip2CompressorOutputStream) in Apache Commons Compress before 1.4.1 allows remote attackers to cause a denial of service (CPU consumption) via a file with many repeating inputs.
3718| [CVE-2012-1574] The Kerberos/MapReduce security functionality in Apache Hadoop 0.20.203.0 through 0.20.205.0, 0.23.x before 0.23.2, and 1.0.x before 1.0.2, as used in Cloudera CDH CDH3u0 through CDH3u2, Cloudera hadoop-0.20-sbin before 0.20.2+923.197, and other products, allows remote authenticated users to impersonate arbitrary cluster user accounts via unspecified vectors.
3719| [CVE-2012-1181] fcgid_spawn_ctl.c in the mod_fcgid module 2.3.6 for the Apache HTTP Server does not recognize the FcgidMaxProcessesPerClass directive for a virtual host, which makes it easier for remote attackers to cause a denial of service (memory consumption) via a series of HTTP requests that triggers a process count higher than the intended limit.
3720| [CVE-2012-1089] Directory traversal vulnerability in Apache Wicket 1.4.x before 1.4.20 and 1.5.x before 1.5.5 allows remote attackers to read arbitrary web-application files via a relative pathname in a URL for a Wicket resource that corresponds to a null package.
3721| [CVE-2012-1007] Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 1.3.10 allow remote attackers to inject arbitrary web script or HTML via (1) the name parameter to struts-examples/upload/upload-submit.do, or the message parameter to (2) struts-cookbook/processSimple.do or (3) struts-cookbook/processDyna.do.
3722| [CVE-2012-1006] Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.14 and 2.2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) lastName parameter to struts2-showcase/person/editPerson.action, or the (3) clientName parameter to struts2-rest-showcase/orders.
3723| [CVE-2012-0883] envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.
3724| [CVE-2012-0840] tables/apr_hash.c in the Apache Portable Runtime (APR) library through 1.4.5 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
3725| [CVE-2012-0838] Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.
3726| [CVE-2012-0788] The PDORow implementation in PHP before 5.3.9 does not properly interact with the session feature, which allows remote attackers to cause a denial of service (application crash) via a crafted application that uses a PDO driver for a fetch and then calls the session_start function, as demonstrated by a crash of the Apache HTTP Server.
3727| [CVE-2012-0394] ** DISPUTED ** The DebuggingInterceptor component in Apache Struts before 2.3.1.1, when developer mode is used, allows remote attackers to execute arbitrary commands via unspecified vectors. NOTE: the vendor characterizes this behavior as not "a security vulnerability itself."
3728| [CVE-2012-0393] The ParameterInterceptor component in Apache Struts before 2.3.1.1 does not prevent access to public constructors, which allows remote attackers to create or overwrite arbitrary files via a crafted parameter that triggers the creation of a Java object.
3729| [CVE-2012-0392] The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method.
3730| [CVE-2012-0391] The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter.
3731| [CVE-2012-0256] Apache Traffic Server 2.0.x and 3.0.x before 3.0.4 and 3.1.x before 3.1.3 does not properly allocate heap memory, which allows remote attackers to cause a denial of service (daemon crash) via a long HTTP Host header.
3732| [CVE-2012-0216] The default configuration of the apache2 package in Debian GNU/Linux squeeze before 2.2.16-6+squeeze7, wheezy before 2.2.22-4, and sid before 2.2.22-4, when mod_php or mod_rivet is used, provides example scripts under the doc/ URI, which might allow local users to conduct cross-site scripting (XSS) attacks, gain privileges, or obtain sensitive information via vectors involving localhost HTTP requests to the Apache HTTP Server.
3733| [CVE-2012-0213] The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document.
3734| [CVE-2012-0053] protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.
3735| [CVE-2012-0047] Cross-site scripting (XSS) vulnerability in Apache Wicket 1.4.x before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via the wicket:pageMapName parameter.
3736| [CVE-2012-0031] scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.
3737| [CVE-2012-0022] Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858.
3738| [CVE-2012-0021] The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.
3739| [CVE-2011-5064] DigestAuthenticator.java in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 uses Catalina as the hard-coded server secret (aka private key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging knowledge of this string, a different vulnerability than CVE-2011-1184.
3740| [CVE-2011-5063] The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check realm values, which might allow remote attackers to bypass intended access restrictions by leveraging the availability of a protection space with weaker authentication or authorization requirements, a different vulnerability than CVE-2011-1184.
3741| [CVE-2011-5062] The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check qop values, which might allow remote attackers to bypass intended integrity-protection requirements via a qop=auth value, a different vulnerability than CVE-2011-1184.
3742| [CVE-2011-5057] Apache Struts 2.3.1.1 and earlier provides interfaces that do not properly restrict access to collections such as the session and request collections, which might allow remote attackers to modify run-time data values via a crafted parameter to an application that implements an affected interface, as demonstrated by the SessionAware, RequestAware, ApplicationAware, ServletRequestAware, ServletResponseAware, and ParameterAware interfaces. NOTE: the vendor disputes the significance of this report because of an "easy work-around in existing apps by configuring the interceptor."
3743| [CVE-2011-5034] Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.
3744| [CVE-2011-4905] Apache ActiveMQ before 5.6.0 allows remote attackers to cause a denial of service (file-descriptor exhaustion and broker crash or hang) by sending many openwire failover:tcp:// connection requests.
3745| [CVE-2011-4858] Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
3746| [CVE-2011-4668] IBM Tivoli Netcool/Reporter 2.2 before 2.2.0.8 allows remote attackers to execute arbitrary code via vectors related to an unspecified CGI program used with the Apache HTTP Server.
3747| [CVE-2011-4449] actions/files/files.php in WikkaWiki 1.3.1 and 1.3.2, when INTRANET_MODE is enabled, supports file uploads for file extensions that are typically absent from an Apache HTTP Server TypesConfig file, which makes it easier for remote attackers to execute arbitrary PHP code by placing this code in a file whose name has multiple extensions, as demonstrated by a (1) .mm or (2) .vpp file.
3748| [CVE-2011-4415] The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the "len +=" statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607.
3749| [CVE-2011-4317] The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
3750| [CVE-2011-3639] The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
3751| [CVE-2011-3620] Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username.
3752| [CVE-2011-3607] Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.
3753| [CVE-2011-3376] org/apache/catalina/core/DefaultInstanceManager.java in Apache Tomcat 7.x before 7.0.22 does not properly restrict ContainerServlets in the Manager application, which allows local users to gain privileges by using an untrusted web application to access the Manager application's functionality.
3754| [CVE-2011-3375] Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not properly perform certain caching and recycling operations involving request objects, which allows remote attackers to obtain unintended read access to IP address and HTTP header information in opportunistic circumstances by reading TCP data.
3755| [CVE-2011-3368] The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
3756| [CVE-2011-3348] The mod_proxy_ajp module in the Apache HTTP Server before 2.2.21, when used with mod_proxy_balancer in certain configurations, allows remote attackers to cause a denial of service (temporary "error state" in the backend server) via a malformed HTTP request.
3757| [CVE-2011-3192] The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
3758| [CVE-2011-3190] Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.
3759| [CVE-2011-2729] native/unix/native/jsvc-unix.c in jsvc in the Daemon component 1.0.3 through 1.0.6 in Apache Commons, as used in Apache Tomcat 5.5.32 through 5.5.33, 6.0.30 through 6.0.32, and 7.0.x before 7.0.20 on Linux, does not drop capabilities, which allows remote attackers to bypass read permissions for files via a request to an application.
3760| [CVE-2011-2712] Cross-site scripting (XSS) vulnerability in Apache Wicket 1.4.x before 1.4.18, when setAutomaticMultiWindowSupport is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.
3761| [CVE-2011-2688] SQL injection vulnerability in mysql/mysql-auth.pl in the mod_authnz_external module 3.2.5 and earlier for the Apache HTTP Server allows remote attackers to execute arbitrary SQL commands via the user field.
3762| [CVE-2011-2526] Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.
3763| [CVE-2011-2516] Off-by-one error in the XML signature feature in Apache XML Security for C++ 1.6.0, as used in Shibboleth before 2.4.3 and possibly other products, allows remote attackers to cause a denial of service (crash) via a signature using a large RSA key, which triggers a buffer overflow.
3764| [CVE-2011-2481] Apache Tomcat 7.0.x before 7.0.17 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application. NOTE: this vulnerability exists because of a CVE-2009-0783 regression.
3765| [CVE-2011-2329] The rampart_timestamp_token_validate function in util/rampart_timestamp_token.c in Apache Rampart/C 1.3.0 does not properly calculate the expiration of timestamp tokens, which allows remote attackers to bypass intended access restrictions by leveraging an expired token, a different vulnerability than CVE-2011-0730.
3766| [CVE-2011-2204] Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.17, when the MemoryUserDatabase is used, creates log entries containing passwords upon encountering errors in JMX user creation, which allows local users to obtain sensitive information by reading a log file.
3767| [CVE-2011-2088] XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3.
3768| [CVE-2011-2087] Multiple cross-site scripting (XSS) vulnerabilities in component handlers in the javatemplates (aka Java Templates) plugin in Apache Struts 2.x before 2.2.3 allow remote attackers to inject arbitrary web script or HTML via an arbitrary parameter value to a .action URI, related to improper handling of value attributes in (1) FileHandler.java, (2) HiddenHandler.java, (3) PasswordHandler.java, (4) RadioHandler.java, (5) ResetHandler.java, (6) SelectHandler.java, (7) SubmitHandler.java, and (8) TextFieldHandler.java.
3769| [CVE-2011-1928] The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used. NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.
3770| [CVE-2011-1921] The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is disabled, does not properly enforce permissions for files that had been publicly readable in the past, which allows remote attackers to obtain sensitive information via a replay REPORT operation.
3771| [CVE-2011-1783] The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.
3772| [CVE-2011-1772] Multiple cross-site scripting (XSS) vulnerabilities in XWork in Apache Struts 2.x before 2.2.3, and OpenSymphony XWork in OpenSymphony WebWork, allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) an action name, (2) the action attribute of an s:submit element, or (3) the method attribute of an s:submit element.
3773| [CVE-2011-1752] The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.17, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request for a baselined WebDAV resource, as exploited in the wild in May 2011.
3774| [CVE-2011-1610] Multiple SQL injection vulnerabilities in xmldirectorylist.jsp in the embedded Apache HTTP Server component in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 6.x before 6.1(5)su3, 7.x before 7.1(5)su4, 8.0 before 8.0(3a)su2, and 8.5 before 8.5(1)su1 allow remote attackers to execute arbitrary SQL commands via the (1) f, (2) l, or (3) n parameter, aka Bug ID CSCtj42064.
3775| [CVE-2011-1582] Apache Tomcat 7.0.12 and 7.0.13 processes the first request to a servlet without following security constraints that have been configured through annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1088, CVE-2011-1183, and CVE-2011-1419.
3776| [CVE-2011-1571] Unspecified vulnerability in the XSL Content portlet in Liferay Portal Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat is used, allows remote attackers to execute arbitrary commands via unknown vectors.
3777| [CVE-2011-1570] Cross-site scripting (XSS) vulnerability in Liferay Portal Community Edition (CE) 6.x before 6.0.6 GA, when Apache Tomcat is used, allows remote authenticated users to inject arbitrary web script or HTML via a message title, a different vulnerability than CVE-2004-2030.
3778| [CVE-2011-1503] The XSL Content portlet in Liferay Portal Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat or Oracle GlassFish is used, allows remote authenticated users to read arbitrary (1) XSL and (2) XML files via a file:/// URL.
3779| [CVE-2011-1502] Liferay Portal Community Edition (CE) 6.x before 6.0.6 GA, when Apache Tomcat is used, allows remote authenticated users to read arbitrary files via an entity declaration in conjunction with an entity reference, related to an XML External Entity (aka XXE) issue.
3780| [CVE-2011-1498] Apache HttpClient 4.x before 4.1.1 in Apache HttpComponents, when used with an authenticating proxy server, sends the Proxy-Authorization header to the origin server, which allows remote web servers to obtain sensitive information by logging this header.
3781| [CVE-2011-1475] The HTTP BIO connector in Apache Tomcat 7.0.x before 7.0.12 does not properly handle HTTP pipelining, which allows remote attackers to read responses intended for other clients in opportunistic circumstances by examining the application data in HTTP packets, related to "a mix-up of responses for requests from different users."
3782| [CVE-2011-1419] Apache Tomcat 7.x before 7.0.11, when web.xml has no security constraints, does not follow ServletSecurity annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests to a web application. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1088.
3783| [CVE-2011-1318] Memory leak in org.apache.jasper.runtime.JspWriterImpl.response in the JavaServer Pages (JSP) component in IBM WebSphere Application Server (WAS) before 7.0.0.15 allows remote attackers to cause a denial of service (memory consumption) by accessing a JSP page of an application that is repeatedly stopped and restarted.
3784| [CVE-2011-1184] The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, related to lack of checking of nonce (aka server nonce) and nc (aka nonce-count or client nonce count) values.
3785| [CVE-2011-1183] Apache Tomcat 7.0.11, when web.xml has no login configuration, does not follow security constraints, which allows remote attackers to bypass intended access restrictions via HTTP requests to a meta-data complete web application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1088 and CVE-2011-1419.
3786| [CVE-2011-1176] The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.
3787| [CVE-2011-1088] Apache Tomcat 7.x before 7.0.10 does not follow ServletSecurity annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests to a web application.
3788| [CVE-2011-1077] Multiple cross-site scripting (XSS) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
3789| [CVE-2011-1026] Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to hijack the authentication of administrators.
3790| [CVE-2011-0715] The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.
3791| [CVE-2011-0534] Apache Tomcat 7.0.0 through 7.0.6 and 6.0.0 through 6.0.30 does not enforce the maxHttpHeaderSize limit for requests involving the NIO HTTP connector, which allows remote attackers to cause a denial of service (OutOfMemoryError) via a crafted request.
3792| [CVE-2011-0533] Cross-site scripting (XSS) vulnerability in Apache Continuum 1.1 through 1.2.3.1, 1.3.6, and 1.4.0 Beta
3793| [CVE-2011-0419] Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
3794| [CVE-2011-0013] Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag.
3795| [CVE-2010-4644] Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15 allow remote authenticated users to cause a denial of service (memory consumption and daemon crash) via the -g option to the blame command.
3796| [CVE-2010-4539] The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.
3797| [CVE-2010-4476] The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
3798| [CVE-2010-4455] Unspecified vulnerability in the Oracle HTTP Server component in Oracle Fusion Middleware 11.1.1.2 and 11.1.1.3 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Apache Plugin.
3799| [CVE-2010-4408] Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1 does not require entry of the administrator's password at the time of modifying a user account, which makes it easier for context-dependent attackers to gain privileges by leveraging a (1) unattended workstation or (2) cross-site request forgery (CSRF) vulnerability, a related issue to CVE-2010-3449.
3800| [CVE-2010-4312] The default configuration of Apache Tomcat 6.x does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to hijack a session via script access to a cookie.
3801| [CVE-2010-4172] Multiple cross-site scripting (XSS) vulnerabilities in the Manager application in Apache Tomcat 6.0.12 through 6.0.29 and 7.0.0 through 7.0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) orderBy or (2) sort parameter to sessionsList.jsp, or unspecified input to (3) sessionDetail.jsp or (4) java/org/apache/catalina/manager/JspHelper.java, related to use of untrusted web applications.
3802| [CVE-2010-3872] The fcgid_header_bucket_read function in fcgid_bucket.c in the mod_fcgid module before 2.3.6 for the Apache HTTP Server does not use bytewise pointer arithmetic in certain circumstances, which has unspecified impact and attack vectors related to "untrusted FastCGI applications" and a "stack buffer overwrite."
3803| [CVE-2010-3863] Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp URI.
3804| [CVE-2010-3854] Multiple cross-site scripting (XSS) vulnerabilities in the web administration interface (aka Futon) in Apache CouchDB 0.8.0 through 1.0.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
3805| [CVE-2010-3718] Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.
3806| [CVE-2010-3449] Cross-site request forgery (CSRF) vulnerability in Redback before 1.2.4, as used in Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1
3807| [CVE-2010-3315] authz.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x before 1.5.8 and 1.6.x before 1.6.13, when SVNPathAuthz short_circuit is enabled, does not properly handle a named repository as a rule scope, which allows remote authenticated users to bypass intended access restrictions via svn commands.
3808| [CVE-2010-3083] sys/ssl/SslSocket.cpp in qpidd in Apache Qpid, as used in Red Hat Enterprise MRG before 1.2.2 and other products, when SSL is enabled, allows remote attackers to cause a denial of service (daemon outage) by connecting to the SSL port but not participating in an SSL handshake.
3809| [CVE-2010-2952] Apache Traffic Server before 2.0.1, and 2.1.x before 2.1.2-unstable, does not properly choose DNS source ports and transaction IDs, and does not properly use DNS query fields to validate responses, which makes it easier for man-in-the-middle attackers to poison the internal DNS cache via a crafted response.
3810| [CVE-2010-2791] mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions.
3811| [CVE-2010-2375] Package/Privilege: Plugins for Apache, Sun and IIS web servers Unspecified vulnerability in the WebLogic Server component in Oracle Fusion Middleware 7.0 SP7, 8.1 SP6, 9.0, 9.1, 9.2 MP3, 10.0 MP2, 10.3.2, and 10.3.3 allows remote attackers to affect confidentiality and integrity, related to IIS.
3812| [CVE-2010-2234] Cross-site request forgery (CSRF) vulnerability in Apache CouchDB 0.8.0 through 0.11.0 allows remote attackers to hijack the authentication of administrators for direct requests to an installation URL.
3813| [CVE-2010-2227] Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with "recycling of a buffer."
3814| [CVE-2010-2103] Cross-site scripting (XSS) vulnerability in axis2-admin/axis2-admin/engagingglobally in the administration console in Apache Axis2/Java 1.4.1, 1.5.1, and possibly other versions, as used in SAP Business Objects 12, 3com IMC, and possibly other products, allows remote attackers to inject arbitrary web script or HTML via the modules parameter. NOTE: some of these details are obtained from third party information.
3815| [CVE-2010-2086] Apache MyFaces 1.1.7 and 1.2.8, as used in IBM WebSphere Application Server and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object.
3816| [CVE-2010-2076] Apache CXF 2.0.x before 2.0.13, 2.1.x before 2.1.10, and 2.2.x before 2.2.9, as used in Apache ServiceMix, Apache Camel, Apache Chemistry, Apache jUDDI, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via a crafted DTD, as demonstrated by an entity declaration in a request to samples/wsdl_first_pure_xml, a similar issue to CVE-2010-1632.
3817| [CVE-2010-2068] mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.
3818| [CVE-2010-2057] shared/util/StateUtils.java in Apache MyFaces 1.1.x before 1.1.8, 1.2.x before 1.2.9, and 2.0.x before 2.0.1 uses an encrypted View State without a Message Authentication Code (MAC), which makes it easier for remote attackers to perform successful modifications of the View State via a padding oracle attack.
3819| [CVE-2010-1632] Apache Axis2 before 1.5.2, as used in IBM WebSphere Application Server (WAS) 7.0 through 7.0.0.12, IBM Feature Pack for Web Services 6.1.0.9 through 6.1.0.32, IBM Feature Pack for Web 2.0 1.0.1.0, Apache Synapse, Apache ODE, Apache Tuscany, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via a crafted DTD, as demonstrated by an entity declaration in a request to the Synapse SimpleStockQuoteService.
3820| [CVE-2010-1623] Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.
3821| [CVE-2010-1587] The Jetty ResourceHandler in Apache ActiveMQ 5.x before 5.3.2 and 5.4.x before 5.4.0 allows remote attackers to read JSP source code via a // (slash slash) initial substring in a URI for (1) admin/index.jsp, (2) admin/queues.jsp, or (3) admin/topics.jsp.
3822| [CVE-2010-1452] The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.
3823| [CVE-2010-1325] Cross-site request forgery (CSRF) vulnerability in the apache2-slms package in SUSE Lifecycle Management Server (SLMS) 1.0 on SUSE Linux Enterprise (SLE) 11 allows remote attackers to hijack the authentication of unspecified victims via vectors related to improper parameter quoting. NOTE: some sources report that this is a vulnerability in a product named "Apache SLMS," but that is incorrect.
3824| [CVE-2010-1244] Cross-site request forgery (CSRF) vulnerability in createDestination.action in Apache ActiveMQ before 5.3.1 allows remote attackers to hijack the authentication of unspecified victims for requests that create queues via the JMSDestination parameter in a queue action.
3825| [CVE-2010-1157] Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.
3826| [CVE-2010-1151] Race condition in the mod_auth_shadow module for the Apache HTTP Server allows remote attackers to bypass authentication, and read and possibly modify data, via vectors related to improper interaction with an external helper application for validation of credentials.
3827| [CVE-2010-0684] Cross-site scripting (XSS) vulnerability in createDestination.action in Apache ActiveMQ before 5.3.1 allows remote authenticated users to inject arbitrary web script or HTML via the JMSDestination parameter in a queue action.
3828| [CVE-2010-0434] The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
3829| [CVE-2010-0432] Multiple cross-site scripting (XSS) vulnerabilities in the Apache Open For Business Project (aka OFBiz) 09.04 and earlier, as used in Opentaps, Neogia, and Entente Oya, allow remote attackers to inject arbitrary web script or HTML via (1) the productStoreId parameter to control/exportProductListing, (2) the partyId parameter to partymgr/control/viewprofile (aka partymgr/control/login), (3) the start parameter to myportal/control/showPortalPage, (4) an invalid URI beginning with /facility/control/ReceiveReturn (aka /crmsfa/control/ReceiveReturn or /cms/control/ReceiveReturn), (5) the contentId parameter (aka the entityName variable) to ecommerce/control/ViewBlogArticle, (6) the entityName parameter to webtools/control/FindGeneric, or the (7) subject or (8) content parameter to an unspecified component under ecommerce/control/contactus.
3830| [CVE-2010-0425] modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers."
3831| [CVE-2010-0408] The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
3832| [CVE-2010-0390] Unrestricted file upload vulnerability in maxImageUpload/index.php in PHP F1 Max's Image Uploader 1.0, when Apache is not configured to handle the mime-type for files with pjpeg or jpeg extensions, allows remote attackers to execute arbitrary code by uploading a file with a pjpeg or jpeg extension, then accessing it via a direct request to the file in original/. NOTE: some of these details are obtained from third party information.
3833| [CVE-2010-0219] Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.
3834| [CVE-2010-0010] Integer overflow in the ap_proxy_send_fb function in proxy/proxy_util.c in mod_proxy in the Apache HTTP Server before 1.3.42 on 64-bit platforms allows remote origin servers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a large chunk size that triggers a heap-based buffer overflow.
3835| [CVE-2010-0009] Apache CouchDB 0.8.0 through 0.10.1 allows remote attackers to obtain sensitive information by measuring the completion time of operations that verify (1) hashes or (2) passwords.
3836| [CVE-2009-5120] The default configuration of Apache Tomcat in Websense Manager in Websense Web Security 7.0 and Web Filter 7.0 allows connections to TCP port 1812 from arbitrary source IP addresses, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via UTF-7 text to the 404 error page of a Project Woodstock service on this port.
3837| [CVE-2009-5119] The default configuration of Apache Tomcat in Websense Manager in Websense Web Security 7.0 and Web Filter 7.0 enables weak SSL ciphers in conf/server.xml, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and then conducting a brute-force attack against encrypted session data.
3838| [CVE-2009-5006] The SessionAdapter::ExchangeHandlerImpl::checkAlternate function in broker/SessionAdapter.cpp in the C++ Broker component in Apache Qpid before 0.6, as used in Red Hat Enterprise MRG before 1.3 and other products, allows remote authenticated users to cause a denial of service (NULL pointer dereference, daemon crash, and cluster outage) by attempting to modify the alternate of an exchange.
3839| [CVE-2009-5005] The Cluster::deliveredEvent function in cluster/Cluster.cpp in Apache Qpid, as used in Red Hat Enterprise MRG before 1.3 and other products, allows remote attackers to cause a denial of service (daemon crash and cluster outage) via invalid AMQP data.
3840| [CVE-2009-4355] Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678.
3841| [CVE-2009-4269] The password hash generation algorithm in the BUILTIN authentication functionality for Apache Derby before 10.6.1.0 performs a transformation that reduces the size of the set of inputs to SHA-1, which produces a small search space that makes it easier for local and possibly remote attackers to crack passwords by generating hash collisions, related to password substitution.
3842| [CVE-2009-3923] The VirtualBox 2.0.8 and 2.0.10 web service in Sun Virtual Desktop Infrastructure (VDI) 3.0 does not require authentication, which allows remote attackers to obtain unspecified access via vectors involving requests to an Apache HTTP Server.
3843| [CVE-2009-3890] Unrestricted file upload vulnerability in the wp_check_filetype function in wp-includes/functions.php in WordPress before 2.8.6, when a certain configuration of the mod_mime module in the Apache HTTP Server is enabled, allows remote authenticated users to execute arbitrary code by posting an attachment with a multiple-extension filename, and then accessing this attachment via a direct request to a wp-content/uploads/ pathname, as demonstrated by a .php.jpg filename.
3844| [CVE-2009-3843] HP Operations Manager 8.10 on Windows contains a "hidden account" in the XML file that specifies Tomcat users, which allows remote attackers to conduct unrestricted file upload attacks, and thereby execute arbitrary code, by using the org.apache.catalina.manager.HTMLManagerServlet class to make requests to manager/html/upload.
3845| [CVE-2009-3821] Cross-site scripting (XSS) vulnerability in the Apache Solr Search (solr) extension 1.0.0 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
3846| [CVE-2009-3555] The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
3847| [CVE-2009-3548] The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.
3848| [CVE-2009-3250] The saveForwardAttachments procedure in the Compose Mail functionality in vtiger CRM 5.0.4 allows remote authenticated users to execute arbitrary code by composing an e-mail message with an attachment filename ending in (1) .php in installations based on certain Apache HTTP Server configurations, (2) .php. on Windows, or (3) .php/ on Linux, and then making a direct request to a certain pathname under storage/.
3849| [CVE-2009-3095] The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.
3850| [CVE-2009-3094] The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
3851| [CVE-2009-2902] Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.
3852| [CVE-2009-2901] The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests.
3853| [CVE-2009-2823] The Apache HTTP Server in Apple Mac OS X before 10.6.2 enables the HTTP TRACE method, which allows remote attackers to conduct cross-site scripting (XSS) attacks via unspecified web client software.
3854| [CVE-2009-2699] The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows remote attackers to cause a denial of service (daemon hang) via unspecified HTTP requests, related to the prefork and event MPMs.
3855| [CVE-2009-2696] Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux Desktop 5 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML." NOTE: this is due to a missing fix for CVE-2009-0781.
3856| [CVE-2009-2693] Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.
3857| [CVE-2009-2625] XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
3858| [CVE-2009-2412] Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR
3859| [CVE-2009-2299] The Artofdefence Hyperguard Web Application Firewall (WAF) module before 2.5.5-11635, 3.0 before 3.0.3-11636, and 3.1 before 3.1.1-11637, a module for the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via an HTTP request with a large Content-Length value but no POST data.
3860| [CVE-2009-1956] Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
3861| [CVE-2009-1955] The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.
3862| [CVE-2009-1903] The PDF XSS protection feature in ModSecurity before 2.5.8 allows remote attackers to cause a denial of service (Apache httpd crash) via a request for a PDF file that does not use the GET method.
3863| [CVE-2009-1891] The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
3864| [CVE-2009-1890] The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
3865| [CVE-2009-1885] Stack consumption vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 2.7.0 and 2.8.0 allows context-dependent attackers to cause a denial of service (application crash) via vectors involving nested parentheses and invalid byte values in "simply nested DTD structures," as demonstrated by the Codenomicon XML fuzzing framework.
3866| [CVE-2009-1462] The Security Manager in razorCMS before 0.4 does not verify the permissions of every file owned by the apache user account, which is inconsistent with the documentation and allows local users to have an unspecified impact.
3867| [CVE-2009-1275] Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttribute and (2) tiles:insertTemplate JSP tags.
3868| [CVE-2009-1195] The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.
3869| [CVE-2009-1191] mod_proxy_ajp.c in the mod_proxy_ajp module in the Apache HTTP Server 2.2.11 allows remote attackers to obtain sensitive response data, intended for a client that sent an earlier POST request with no request body, via an HTTP request.
3870| [CVE-2009-1012] Unspecified vulnerability in the plug-ins for Apache and IIS web servers in Oracle BEA WebLogic Server 7.0 Gold through SP7, 8.1 Gold through SP6, 9.0, 9.1, 9.2 Gold through MP3, 10.0 Gold through MP1, and 10.3 allows remote attackers to affect confidentiality, integrity, and availability. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in an unspecified plug-in that parses HTTP requests, which leads to a heap-based buffer overflow.
3871| [CVE-2009-0918] Multiple unspecified vulnerabilities in DFLabs PTK 1.0.0 through 1.0.4 allow remote attackers to execute arbitrary commands in processes launched by PTK's Apache HTTP Server via (1) "external tools" or (2) a crafted forensic image.
3872| [CVE-2009-0796] Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the URI.
3873| [CVE-2009-0783] Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
3874| [CVE-2009-0781] Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML."
3875| [CVE-2009-0754] PHP 4.4.4, 5.1.6, and other versions, when running on Apache, allows local users to modify behavior of other sites hosted on the same web server by modifying the mbstring.func_overload setting within .htaccess, which causes this setting to be applied to other virtual hosts on the same server.
3876| [CVE-2009-0580] Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
3877| [CVE-2009-0486] Bugzilla 3.2.1, 3.0.7, and 3.3.2, when running under mod_perl, calls the srand function at startup time, which causes Apache children to have the same seed and produce insufficiently random numbers for random tokens, which allows remote attackers to bypass cross-site request forgery (CSRF) protection mechanisms and conduct unauthorized activities as other users.
3878| [CVE-2009-0039] Multiple cross-site request forgery (CSRF) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to hijack the authentication of administrators for requests that (1) change the web administration password, (2) upload applications, and perform unspecified other administrative actions, as demonstrated by (3) a Shutdown request to console/portal//Server/Shutdown.
3879| [CVE-2009-0038] Multiple cross-site scripting (XSS) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) ip, (3) username, or (4) description parameter to console/portal/Server/Monitoring
3880| [CVE-2009-0033] Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
3881| [CVE-2009-0026] Multiple cross-site scripting (XSS) vulnerabilities in Apache Jackrabbit before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via the q parameter to (1) search.jsp or (2) swr.jsp.
3882| [CVE-2009-0023] The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.
3883| [CVE-2008-6879] Cross-site scripting (XSS) vulnerability in Apache Roller 2.3, 3.0, 3.1, and 4.0 allows remote attackers to inject arbitrary web script or HTML via the q parameter in a search action.
3884| [CVE-2008-6755] ZoneMinder 1.23.3 on Fedora 10 sets the ownership of /etc/zm.conf to the apache user account, and sets the permissions to 0600, which makes it easier for remote attackers to modify this file by accessing it through a (1) PHP or (2) CGI script.
3885| [CVE-2008-6722] Novell Access Manager 3 SP4 does not properly expire X.509 certificate sessions, which allows physically proximate attackers to obtain a logged-in session by using a victim's web-browser process that continues to send the original and valid SSL sessionID, related to inability of Apache Tomcat to clear entries from its SSL cache.
3886| [CVE-2008-6682] Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.x before 2.0.11.1 and 2.1.x before 2.1.1 allow remote attackers to inject arbitrary web script or HTML via vectors associated with improper handling of (1) " (double quote) characters in the href attribute of an s:a tag and (2) parameters in the action attribute of an s:url tag.
3887| [CVE-2008-6505] Multiple directory traversal vulnerabilities in Apache Struts 2.0.x before 2.0.12 and 2.1.x before 2.1.3 allow remote attackers to read arbitrary files via a ..%252f (encoded dot dot slash) in a URI with a /struts/ path, related to (1) FilterDispatcher in 2.0.x and (2) DefaultStaticContentLoader in 2.1.x.
3888| [CVE-2008-6504] ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \u0023 representation for the # character.
3889| [CVE-2008-5696] Novell NetWare 6.5 before Support Pack 8, when an OES2 Linux server is installed into the NDS tree, does not require a password for the ApacheAdmin console, which allows remote attackers to reconfigure the Apache HTTP Server via console operations.
3890| [CVE-2008-5676] Multiple unspecified vulnerabilities in the ModSecurity (aka mod_security) module 2.5.0 through 2.5.5 for the Apache HTTP Server, when SecCacheTransformations is enabled, allow remote attackers to cause a denial of service (daemon crash) or bypass the product's functionality via unknown vectors related to "transformation caching."
3891| [CVE-2008-5519] The JK Connector (aka mod_jk) 1.2.0 through 1.2.26 in Apache Tomcat allows remote attackers to obtain sensitive information via an arbitrary request from an HTTP client, in opportunistic circumstances involving (1) a request from a different client that included a Content-Length header but no POST data or (2) a rapid series of requests, related to noncompliance with the AJP protocol's requirements for requests containing Content-Length headers.
3892| [CVE-2008-5518] Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet)
3893| [CVE-2008-5515] Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
3894| [CVE-2008-5457] Unspecified vulnerability in the Oracle BEA WebLogic Server Plugins for Apache, Sun and IIS web servers component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
3895| [CVE-2008-4308] The doRead method in Apache Tomcat 4.1.32 through 4.1.34 and 5.5.10 through 5.5.20 does not return a -1 to indicate when a certain error condition has occurred, which can cause Tomcat to send POST content from one request to a different request.
3896| [CVE-2008-4008] Unspecified vulnerability in the WebLogic Server Plugins for Apache component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2008 CPU. Oracle has not commented on reliable researcher claims that this issue is a stack-based buffer overflow in the WebLogic Apache Connector, related to an invalid parameter.
3897| [CVE-2008-3666] Unspecified vulnerability in Sun Solaris 10 and OpenSolaris before snv_96 allows (1) context-dependent attackers to cause a denial of service (panic) via vectors involving creation of a crafted file and use of the sendfilev system call, as demonstrated by a file served by an Apache 2.2.x web server with EnableSendFile configured
3898| [CVE-2008-3271] Apache Tomcat 5.5.0 and 4.1.0 through 4.1.31 allows remote attackers to bypass an IP address restriction and obtain sensitive information via a request that is processed concurrently with another request but in a different thread, leading to an instance-variable overwrite associated with a "synchronization problem" and lack of thread safety, and related to RemoteFilterValve, RemoteAddrValve, and RemoteHostValve.
3899| [CVE-2008-3257] Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code via a long HTTP version string, as demonstrated by a string after "POST /.jsp" in an HTTP request.
3900| [CVE-2008-2939] Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.
3901| [CVE-2008-2938] Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370. NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.
3902| [CVE-2008-2742] Unrestricted file upload in the mcpuk file editor (atk/attributes/fck/editor/filemanager/browser/mcpuk/connectors/php/config.php) in Achievo 1.2.0 through 1.3.2 allows remote attackers to execute arbitrary code by uploading a file with .php followed by a safe extension, then accessing it via a direct request to the file in the Achievo root directory. NOTE: this is only a vulnerability in environments that support multiple extensions, such as Apache with the mod_mime module enabled.
3903| [CVE-2008-2717] TYPO3 4.0.x before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.2.1, uses an insufficiently restrictive default fileDenyPattern for Apache, which allows remote attackers bypass security restrictions and upload configuration files such as .htaccess, or conduct file upload attacks using multiple extensions.
3904| [CVE-2008-2579] Unspecified vulnerability in the WebLogic Server Plugins for Apache, Sun and IIS web servers component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 has unknown impact and remote attack vectors.
3905| [CVE-2008-2384] SQL injection vulnerability in mod_auth_mysql.c in the mod-auth-mysql (aka libapache2-mod-auth-mysql) module for the Apache HTTP Server 2.x, when configured to use a multibyte character set that allows a \ (backslash) as part of the character encoding, allows remote attackers to execute arbitrary SQL commands via unspecified inputs in a login request.
3906| [CVE-2008-2370] Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.
3907| [CVE-2008-2364] The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.
3908| [CVE-2008-2168] Cross-site scripting (XSS) vulnerability in Apache 2.2.6 and earlier allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded URLs that are not properly handled when displaying the 403 Forbidden error page.
3909| [CVE-2008-2025] Cross-site scripting (XSS) vulnerability in Apache Struts before 1.2.9-162.31.1 on SUSE Linux Enterprise (SLE) 11, before 1.2.9-108.2 on SUSE openSUSE 10.3, before 1.2.9-198.2 on SUSE openSUSE 11.0, and before 1.2.9-162.163.2 on SUSE openSUSE 11.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to "insufficient quoting of parameters."
3910| [CVE-2008-1947] Cross-site scripting (XSS) vulnerability in Apache Tomcat 5.5.9 through 5.5.26 and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via the name parameter (aka the hostname attribute) to host-manager/html/add.
3911| [CVE-2008-1734] Interpretation conflict in PHP Toolkit before 1.0.1 on Gentoo Linux might allow local users to cause a denial of service (PHP outage) and read contents of PHP scripts by creating a file with a one-letter lowercase alphabetic name, which triggers interpretation of a certain unquoted [a-z] argument as a matching shell glob for this name, rather than interpretation as the literal [a-z] regular-expression string, and consequently blocks the launch of the PHP interpreter within the Apache HTTP Server.
3912| [CVE-2008-1678] Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to cause a denial of service (memory consumption) via multiple calls, as demonstrated by initial SSL client handshakes to the Apache HTTP Server mod_ssl that specify a compression algorithm.
3913| [CVE-2008-1232] Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.
3914| [CVE-2008-0869] Cross-site scripting (XSS) vulnerability in BEA WebLogic Workshop 8.1 through SP6 and Workshop for WebLogic 9.0 through 10.0 allows remote attackers to inject arbitrary web script or HTML via a "framework defined request parameter" when using WebLogic Workshop or Apache Beehive NetUI framework with page flows.
3915| [CVE-2008-0732] The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories.
3916| [CVE-2008-0555] The ExpandCert function in Apache-SSL before apache_1.3.41+ssl_1.59 does not properly handle (1) '/' and (2) '=' characters in a Distinguished Name (DN) in a client certificate, which might allow remote attackers to bypass authentication via a crafted DN that triggers overwriting of environment variables.
3917| [CVE-2008-0457] Unrestricted file upload vulnerability in the FileUpload class running on the Symantec LiveState Apache Tomcat server, as used by Symantec Backup Exec System Recovery Manager 7.0 and 7.0.1, allows remote attackers to upload and execute arbitrary JSP files via unknown vectors.
3918| [CVE-2008-0456] CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.
3919| [CVE-2008-0455] Cross-site scripting (XSS) vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary web script or HTML by uploading a file with a name containing XSS sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.
3920| [CVE-2008-0128] The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
3921| [CVE-2008-0005] mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.
3922| [CVE-2008-0002] Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting during this processing in order to trigger the exception.
3923| [CVE-2007-6750] The Apache HTTP Server 1.x and 2.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris, related to the lack of the mod_reqtimeout module in versions before 2.2.15.
3924| [CVE-2007-6726] Multiple cross-site scripting (XSS) vulnerabilities in Dojo 0.4.1 and 0.4.2, as used in Apache Struts and other products, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving (1) xip_client.html and (2) xip_server.html in src/io/.
3925| [CVE-2007-6514] Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.
3926| [CVE-2007-6423] ** DISPUTED ** Unspecified vulnerability in mod_proxy_balancer for Apache HTTP Server 2.2.x before 2.2.7-dev, when running on Windows, allows remote attackers to trigger memory corruption via a long URL. NOTE: the vendor could not reproduce this issue.
3927| [CVE-2007-6422] The balancer_handler function in mod_proxy_balancer in the Apache HTTP Server 2.2.0 through 2.2.6, when a threaded Multi-Processing Module is used, allows remote authenticated users to cause a denial of service (child process crash) via an invalid bb variable.
3928| [CVE-2007-6421] Cross-site scripting (XSS) vulnerability in balancer-manager in mod_proxy_balancer in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) ss, (2) wr, or (3) rr parameters, or (4) the URL.
3929| [CVE-2007-6420] Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.
3930| [CVE-2007-6388] Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
3931| [CVE-2007-6361] Gekko 0.8.2 and earlier stores sensitive information under the web root with possibly insufficient access control, which might allow remote attackers to read certain files under temp/, as demonstrated by a log file that records the titles of blog entries. NOTE: access to temp/ is blocked by .htaccess in most deployments that use Apache HTTP Server.
3932| [CVE-2007-6342] SQL injection vulnerability in the David Castro AuthCAS module (AuthCAS.pm) 0.4 for the Apache HTTP Server allows remote attackers to execute arbitrary SQL commands via the SESSION_COOKIE_NAME (session ID) in a cookie.
3933| [CVE-2007-6286] Apache Tomcat 5.5.11 through 5.5.25 and 6.0.0 through 6.0.15, when the native APR connector is used, does not properly handle an empty request to the SSL port, which allows remote attackers to trigger handling of "a duplicate copy of one of the recent requests," as demonstrated by using netcat to send the empty request.
3934| [CVE-2007-6258] Multiple stack-based buffer overflows in the legacy mod_jk2 2.0.3-DEV and earlier Apache module allow remote attackers to execute arbitrary code via a long (1) Host header, or (2) Hostname within a Host header.
3935| [CVE-2007-6231] Multiple PHP remote file inclusion vulnerabilities in tellmatic 1.0.7 allow remote attackers to execute arbitrary PHP code via a URL in the tm_includepath parameter to (1) Classes.inc.php, (2) statistic.inc.php, (3) status.inc.php, (4) status_top_x.inc.php, or (5) libchart-1.1/libchart.php in include/. NOTE: access to include/ is blocked by .htaccess in most deployments that use Apache HTTP Server.
3936| [CVE-2007-6203] Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header from an HTTP request when it is reflected back in a "413 Request Entity Too Large" error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated via an HTTP request containing an invalid Content-length value, a similar issue to CVE-2006-3918.
3937| [CVE-2007-5797] SQLLoginModule in Apache Geronimo 2.0 through 2.1 does not throw an exception for a nonexistent username, which allows remote attackers to bypass authentication via a login attempt with any username not contained in the database.
3938| [CVE-2007-5731] Absolute path traversal vulnerability in Apache Jakarta Slide 2.1 and earlier allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag, a related issue to CVE-2007-5461.
3939| [CVE-2007-5461] Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.
3940| [CVE-2007-5342] The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.
3941| [CVE-2007-5333] Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
3942| [CVE-2007-5156] Incomplete blacklist vulnerability in editor/filemanager/upload/php/upload.php in FCKeditor, as used in SiteX CMS 0.7.3.beta, La-Nai CMS, Syntax CMS, Cardinal Cms, and probably other products, allows remote attackers to upload and execute arbitrary PHP code via a file whose name contains ".php." and has an unknown extension, which is recognized as a .php file by the Apache HTTP server, a different vulnerability than CVE-2006-0658 and CVE-2006-2529.
3943| [CVE-2007-5085] Unspecified vulnerability in the management EJB (MEJB) in Apache Geronimo before 2.0.2 allows remote attackers to bypass authentication and obtain "access to Geronimo internals" via unspecified vectors.
3944| [CVE-2007-5000] Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
3945| [CVE-2007-4724] Cross-site request forgery (CSRF) vulnerability in cal2.jsp in the calendar examples application in Apache Tomcat 4.1.31 allows remote attackers to add events as arbitrary users via the time and description parameters.
3946| [CVE-2007-4723] Directory traversal vulnerability in Ragnarok Online Control Panel 4.3.4a, when the Apache HTTP Server is used, allows remote attackers to bypass authentication via directory traversal sequences in a URI that ends with the name of a publicly available page, as demonstrated by a "/...../" sequence and an account_manage.php/login.php final component for reaching the protected account_manage.php page.
3947| [CVE-2007-4641] Directory traversal vulnerability in index.php in Pakupaku CMS 0.4 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter, as demonstrated by injecting code into an Apache log file.
3948| [CVE-2007-4556] Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via form input beginning with a "%{" sequence and ending with a "}" character.
3949| [CVE-2007-4548] The login method in LoginModule implementations in Apache Geronimo 2.0 does not throw FailedLoginException for failed logins, which allows remote attackers to bypass authentication requirements, deploy arbitrary modules, and gain administrative access by sending a blank username and password with the command line deployer in the deployment module.
3950| [CVE-2007-4465] Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.
3951| [CVE-2007-3847] The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read.
3952| [CVE-2007-3571] The Apache Web Server as used in Novell NetWare 6.5 and GroupWise allows remote attackers to obtain sensitive information via a certain directive to Apache that causes the HTTP-Header response to be modified, which may reveal the server's internal IP address.
3953| [CVE-2007-3386] Cross-site scripting (XSS) vulnerability in the Host Manager Servlet for Apache Tomcat 6.0.0 to 6.0.13 and 5.5.0 to 5.5.24 allows remote attackers to inject arbitrary HTML and web script via crafted requests, as demonstrated using the aliases parameter to an html/add action.
3954| [CVE-2007-3385] Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.
3955| [CVE-2007-3384] Multiple cross-site scripting (XSS) vulnerabilities in examples/servlet/CookieExample in Apache Tomcat 3.3 through 3.3.2 allow remote attackers to inject arbitrary web script or HTML via the (1) Name or (2) Value field, related to error messages.
3956| [CVE-2007-3383] Cross-site scripting (XSS) vulnerability in SendMailServlet in the examples web application (examples/jsp/mail/sendmail.jsp) in Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.36 allows remote attackers to inject arbitrary web script or HTML via the From field and possibly other fields, related to generation of error messages.
3957| [CVE-2007-3382] Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes ("'") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.
3958| [CVE-2007-3304] Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka "SIGUSR1 killer."
3959| [CVE-2007-3303] Apache httpd 2.0.59 and 2.2.4, with the Prefork MPM module, allows local users to cause a denial of service via certain code sequences executed in a worker process that (1) stop request processing by killing all worker processes and preventing creation of replacements or (2) hang the system by forcing the master process to fork an arbitrarily large number of worker processes. NOTE: This might be an inherent design limitation of Apache with respect to worker processes in hosted environments.
3960| [CVE-2007-3101] Multiple cross-site scripting (XSS) vulnerabilities in certain JSF applications in Apache MyFaces Tomahawk before 1.1.6 allow remote attackers to inject arbitrary web script via the autoscroll parameter, which is injected into Javascript that is sent to the client.
3961| [CVE-2007-2450] Multiple cross-site scripting (XSS) vulnerabilities in the (1) Manager and (2) Host Manager web applications in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote authenticated users to inject arbitrary web script or HTML via a parameter name to manager/html/upload, and other unspecified vectors.
3962| [CVE-2007-2449] Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the '
3963| [CVE-2007-2353] Apache Axis 1.0 allows remote attackers to obtain sensitive information by requesting a non-existent WSDL file, which reveals the installation path in the resulting exception message.
3964| [CVE-2007-2025] Unrestricted file upload vulnerability in the UpLoad feature (lib/plugin/UpLoad.php) in PhpWiki 1.3.11p1 allows remote attackers to upload arbitrary PHP files with a double extension, as demonstrated by .php.3, which is interpreted by Apache as being a valid PHP file.
3965| [CVE-2007-1863] cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.
3966| [CVE-2007-1862] The recall_headers function in mod_mem_cache in Apache 2.2.4 does not properly copy all levels of header data, which can cause Apache to return HTTP headers containing previously used data, which could be used by remote attackers to obtain potentially sensitive information.
3967| [CVE-2007-1860] mod_jk in Apache Tomcat JK Web Server Connector 1.2.x before 1.2.23 decodes request URLs within the Apache HTTP Server before passing the URL to Tomcat, which allows remote attackers to access protected pages via a crafted prefix JkMount, possibly involving double-encoded .. (dot dot) sequences and directory traversal, a related issue to CVE-2007-0450.
3968| [CVE-2007-1858] The default SSL cipher configuration in Apache Tomcat 4.1.28 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.17 uses certain insecure ciphers, including the anonymous cipher, which allows remote attackers to obtain sensitive information or have other, unspecified impacts.
3969| [CVE-2007-1842] Directory traversal vulnerability in login.php in JSBoard before 2.0.12 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the table parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, a related issue to CVE-2006-2019.
3970| [CVE-2007-1801] Directory traversal vulnerability in inc/lang.php in sBLOG 0.7.3 Beta allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the conf_lang_default parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by inc/lang.php.
3971| [CVE-2007-1743] suexec in Apache HTTP Server (httpd) 2.2.3 does not verify combinations of user and group IDs on the command line, which might allow local users to leverage other vulnerabilities to create arbitrary UID/GID owned files if /proc is mounted. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root." In addition, because this is dependent on other vulnerabilities, perhaps this is resultant and should not be included in CVE.
3972| [CVE-2007-1742] suexec in Apache HTTP Server (httpd) 2.2.3 uses a partial comparison for verifying whether the current directory is within the document root, which might allow local users to perform unauthorized operations on incorrect directories, as demonstrated using "html_backup" and "htmleditor" under an "html" directory. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root."
3973| [CVE-2007-1741] Multiple race conditions in suexec in Apache HTTP Server (httpd) 2.2.3 between directory and file validation, and their usage, allow local users to gain privileges and execute arbitrary code by renaming directories or performing symlink attacks. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root."
3974| [CVE-2007-1720] Directory traversal vulnerability in addressbook.php in the Addressbook 1.2 module for PHP-Nuke allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the module_name parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file.
3975| [CVE-2007-1636] Directory traversal vulnerability in index.php in RoseOnlineCMS 3 B1 allows remote attackers to include arbitrary files via a .. (dot dot) sequence in the op parameter, as demonstrated by injecting PHP code into Apache log files via the URL and User-Agent HTTP header.
3976| [CVE-2007-1633] Directory traversal vulnerability in bbcode_ref.php in the Giorgio Ciranni Splatt Forum 4.0 RC1 module for PHP-Nuke allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the name parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by bbcode_ref.php.
3977| [CVE-2007-1577] Directory traversal vulnerability in index.php in GeBlog 0.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the GLOBALS[tplname] parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by index.php.
3978| [CVE-2007-1539] Directory traversal vulnerability in inc/map.func.php in pragmaMX Landkarten 2.1 module allows remote attackers to include arbitrary files via a .. (dot dot) sequence in the module_name parameter, as demonstrated via a static PHP code injection attack in an Apache log file.
3979| [CVE-2007-1524] Directory traversal vulnerability in themes/default/ in ZomPlog 3.7.6 and earlier allows remote attackers to include arbitrary local files via a .. (dot dot) in the settings[skin] parameter, as demonstrated by injecting PHP code into an Apache HTTP Server log file, which can then be included via themes/default/.
3980| [CVE-2007-1491] Apache Tomcat in Avaya S87XX, S8500, and S8300 before CM 3.1.3, and Avaya SES allows connections from external interfaces via port 8009, which exposes it to attacks from outside parties.
3981| [CVE-2007-1358] Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616".
3982| [CVE-2007-1349] PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.
3983| [CVE-2007-0975] Variable extraction vulnerability in Ian Bezanson Apache Stats before 0.0.3 beta allows attackers to overwrite critical variables, with unknown impact, when the extract function is used on the _REQUEST superglobal array.
3984| [CVE-2007-0930] Variable extract vulnerability in Apache Stats before 0.0.3beta allows attackers to modify arbitrary variables and conduct attacks via unknown vectors involving the use of PHP's extract function.
3985| [CVE-2007-0792] The mod_perl initialization script in Bugzilla 2.23.3 does not set the Bugzilla Apache configuration to allow .htaccess permissions to override file permissions, which allows remote attackers to obtain the database username and password via a direct request for the localconfig file.
3986| [CVE-2007-0774] Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.
3987| [CVE-2007-0637] Directory traversal vulnerability in zd_numer.php in Galeria Zdjec 3.0 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the galeria parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by zd_numer.php.
3988| [CVE-2007-0451] Apache SpamAssassin before 3.1.8 allows remote attackers to cause a denial of service via long URLs in malformed HTML, which triggers "massive memory usage."
3989| [CVE-2007-0450] Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.
3990| [CVE-2007-0419] The BEA WebLogic Server proxy plug-in before June 2006 for the Apache HTTP Server does not properly handle protocol errors, which allows remote attackers to cause a denial of service (server outage).
3991| [CVE-2007-0173] Directory traversal vulnerability in index.php in L2J Statistik Script 0.09 and earlier, when register_globals is enabled and magic_quotes is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by index.php.
3992| [CVE-2007-0098] Directory traversal vulnerability in language.php in VerliAdmin 0.3 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang cookie, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by language.php.
3993| [CVE-2007-0086] ** DISPUTED ** The Apache HTTP Server, when accessed through a TCP connection with a large window size, allows remote attackers to cause a denial of service (network bandwidth consumption) via a Range header that specifies multiple copies of the same fragment. NOTE: the severity of this issue has been disputed by third parties, who state that the large window size required by the attack is not normally supported or configured by the server, or that a DDoS-style attack would accomplish the same goal.
3994| [CVE-2006-7217] Apache Derby before 10.2.1.6 does not determine schema privilege requirements during the DropSchemaNode bind phase, which allows remote authenticated users to execute arbitrary drop schema statements in SQL authorization mode.
3995| [CVE-2006-7216] Apache Derby before 10.2.1.6 does not determine privilege requirements for lock table statements at compilation time, and consequently does not enforce privilege requirements at execution time, which allows remote authenticated users to lock arbitrary tables.
3996| [CVE-2006-7197] The AJP connector in Apache Tomcat 5.5.15 uses an incorrect length for chunks, which can cause a buffer over-read in the ajp_process_callback in mod_jk, which allows remote attackers to read portions of sensitive memory.
3997| [CVE-2006-7196] Cross-site scripting (XSS) vulnerability in the calendar application example in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.15 allows remote attackers to inject arbitrary web script or HTML via the time parameter to cal2.jsp and possibly unspecified other vectors. NOTE: this may be related to CVE-2006-0254.1.
3998| [CVE-2006-7195] Cross-site scripting (XSS) vulnerability in implicit-objects.jsp in Apache Tomcat 5.0.0 through 5.0.30 and 5.5.0 through 5.5.17 allows remote attackers to inject arbitrary web script or HTML via certain header values.
3999| [CVE-2006-7098] The Debian GNU/Linux 033_-F_NO_SETSID patch for the Apache HTTP Server 1.3.34-4 does not properly disassociate httpd from a controlling tty when httpd is started interactively, which allows local users to gain privileges to that tty via a CGI program that calls the TIOCSTI ioctl.
4000| [CVE-2006-6869] Directory traversal vulnerability in includes/search/search_mdforum.php in MAXdev MDForum 2.0.1 and earlier, when magic_quotes_gpc is disabled and register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the PNSVlang cookie to error.php, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by error.php.
4001| [CVE-2006-6675] Cross-site scripting (XSS) vulnerability in Novell NetWare 6.5 Support Pack 5 and 6 and Novell Apache on NetWare 2.0.48 allows remote attackers to inject arbitrary web script or HTML via unspecifeid parameters in Welcome web-app.
4002| [CVE-2006-6613] Directory traversal vulnerability in language.php in phpAlbum 0.4.1 Beta 6 and earlier, when magic_quotes_gpc is disabled and register_globals is enabled, allows remote attackers to include and execute arbitrary local files or obtain sensitive information via a .. (dot dot) in the pa_lang[include_file] parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by language.php.
4003| [CVE-2006-6589] Cross-site scripting (XSS) vulnerability in ecommerce/control/keywordsearch in the Apache Open For Business Project (OFBiz) and Opentaps 0.9.3 allows remote attackers to inject arbitrary web script or HTML via the SEARCH_STRING parameter, a different issue than CVE-2006-6587. NOTE: some of these details are obtained from third party information.
4004| [CVE-2006-6588] The forum implementation in the ecommerce component in the Apache Open For Business Project (OFBiz) trusts the (1) dataResourceTypeId, (2) contentTypeId, and certain other hidden form fields, which allows remote attackers to create unauthorized types of content, modify content, or have other unknown impact.
4005| [CVE-2006-6587] Cross-site scripting (XSS) vulnerability in the forum implementation in the ecommerce component in the Apache Open For Business Project (OFBiz) allows remote attackers to inject arbitrary web script or HTML by posting a message.
4006| [CVE-2006-6445] Directory traversal vulnerability in error.php in Envolution 1.1.0 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the PNSVlang (PNSV lang) parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by error.php.
4007| [CVE-2006-6071] TWiki 4.0.5 and earlier, when running under Apache 1.3 using ApacheLogin with sessions and "ErrorDocument 401" redirects to a valid wiki topic, does not properly handle failed login attempts, which allows remote attackers to read arbitrary content by cancelling out of a failed authentication with a valid username and invalid password.
4008| [CVE-2006-6047] Directory traversal vulnerability in manager/index.php in Etomite 0.6.1.2 allows remote authenticated administrators to include and execute arbitrary local files via a .. (dot dot) in the f parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by index.php.
4009| [CVE-2006-5894] Directory traversal vulnerability in lang.php in Rama CMS 0.68 and earlier, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang cookie, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by lang.php.
4010| [CVE-2006-5752] Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform "charset detection" when the content-type is not specified.
4011| [CVE-2006-5733] Directory traversal vulnerability in error.php in PostNuke 0.763 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the PNSVlang (PNSV lang) cookie, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by error.php.
4012| [CVE-2006-5263] Directory traversal vulnerability in templates/header.php3 in phpMyAgenda 3.1 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the language parameter, as demonstrated by a parameter value naming an Apache HTTP Server log file that apparently contains PHP code.
4013| [CVE-2006-4994] Multiple unquoted Windows search path vulnerabilities in Apache Friends XAMPP 1.5.2 might allow local users to gain privileges via a malicious program file in %SYSTEMDRIVE%, which is run when XAMPP attempts to execute (1) FileZillaServer.exe, (2) mysqld-nt.exe, (3) Perl.exe, or (4) xamppcontrol.exe with an unquoted "Program Files" pathname.
4014| [CVE-2006-4636] Directory traversal vulnerability in SZEWO PhpCommander 3.0 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Directory parameter, as demonstrated by parameter values naming Apache HTTP Server log files that apparently contain PHP code.
4015| [CVE-2006-4625] PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults.
4016| [CVE-2006-4558] DeluxeBB 1.06 and earlier, when run on the Apache HTTP Server with the mod_mime module, allows remote attackers to execute arbitrary PHP code by uploading files with double extensions via the fileupload parameter in a newthread action in newpost.php.
4017| [CVE-2006-4191] Directory traversal vulnerability in memcp.php in XMB (Extreme Message Board) 1.9.6 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the langfilenew parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by header.php.
4018| [CVE-2006-4154] Format string vulnerability in the mod_tcl module 1.0 for Apache 2.x allows context-dependent attackers to execute arbitrary code via format string specifiers that are not properly handled in a set_var function call in (1) tcl_cmds.c and (2) tcl_core.c.
4019| [CVE-2006-4110] Apache 2.2.2, when running on Windows, allows remote attackers to read source code of CGI programs via a request that contains uppercase (or alternate case) characters that bypass the case-sensitive ScriptAlias directive, but allow access to the file on case-insensitive file systems.
4020| [CVE-2006-4004] Directory traversal vulnerability in index.php in vbPortal 3.0.2 through 3.6.0 Beta 1, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the bbvbplang cookie, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by index.php.
4021| [CVE-2006-3918] http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.
4022| [CVE-2006-3835] Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (
4023| [CVE-2006-3747] Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.
4024| [CVE-2006-3362] Unrestricted file upload vulnerability in connectors/php/connector.php in FCKeditor mcpuk file manager, as used in (1) Geeklog 1.4.0 through 1.4.0sr3, (2) toendaCMS 1.0.0 Shizouka Stable and earlier, (3) WeBid 0.5.4, and possibly other products, when installed on Apache with mod_mime, allows remote attackers to upload and execute arbitrary PHP code via a filename with a .php extension and a trailing extension that is allowed, such as .zip.
4025| [CVE-2006-3102] Race condition in articles/BitArticle.php in Bitweaver 1.3, when run on Apache with the mod_mime extension, allows remote attackers to execute arbitrary PHP code by uploading arbitrary files with double extensions, which are stored for a small period of time under the webroot in the temp/articles directory.
4026| [CVE-2006-3070] write_ok.php in Zeroboard 4.1 pl8, when installed on Apache with mod_mime, allows remote attackers to bypass restrictions for uploading files with executable extensions by uploading a .htaccess file that with an AddType directive that assigns an executable module to files with assumed-safe extensions, as demonstrated by assigning the txt extension to be handled by application/x-httpd-php.
4027| [CVE-2006-2831] Drupal 4.6.x before 4.6.8 and 4.7.x before 4.7.2, when running under certain Apache configurations such as when FileInfo overrides are disabled within .htaccess, allows remote attackers to execute arbitrary code by uploading a file with multiple extensions, a variant of CVE-2006-2743.
4028| [CVE-2006-2806] The SMTP server in Apache Java Mail Enterprise Server (aka Apache James) 2.2.0 allows remote attackers to cause a denial of service (CPU consumption) via a long argument to the MAIL command.
4029| [CVE-2006-2743] Drupal 4.6.x before 4.6.7 and 4.7.0, when running on Apache with mod_mime, does not properly handle files with multiple extensions, which allows remote attackers to upload, modify, or execute arbitrary files in the files directory.
4030| [CVE-2006-2514] Coppermine galleries before 1.4.6, when running on Apache with mod_mime installed, allows remote attackers to upload arbitrary files via a filename with multiple file extensions.
4031| [CVE-2006-2330] PHP-Fusion 6.00.306 and earlier, running under Apache HTTP Server 1.3.27 and PHP 4.3.3, allows remote authenticated users to upload files of arbitrary types using a filename that contains two or more extensions that ends in an assumed-valid extension such as .gif, which bypasses the validation, as demonstrated by uploading then executing an avatar file that ends in ".php.gif" and contains PHP code in EXIF metadata.
4032| [CVE-2006-1777] Directory traversal vulnerability in doc/index.php in Jeremy Ashcraft Simplog 0.9.2 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the s parameter, as demonstrated by injecting PHP sequences into an Apache error_log file, which is then included by doc/index.php.
4033| [CVE-2006-1564] Untrusted search path vulnerability in libapache2-svn 1.3.0-4 for Subversion in Debian GNU/Linux includes RPATH values under the /tmp/svn directory for the (1) mod_authz_svn.so and (2) mod_dav_svn.so modules, which might allow local users to gain privileges by installing malicious libraries in that directory.
4034| [CVE-2006-1548] Cross-site scripting (XSS) vulnerability in (1) LookupDispatchAction and possibly (2) DispatchAction and (3) ActionDispatcher in Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to inject arbitrary web script or HTML via the parameter name, which is not filtered in the resulting error message.
4035| [CVE-2006-1547] ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references the public getMultipartRequestHandler method, which provides further access to elements in the CommonsMultipartRequestHandler implementation and BeanUtils.
4036| [CVE-2006-1546] Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to bypass validation via a request with a 'org.apache.struts.taglib.html.Constants.CANCEL' parameter, which causes the action to be canceled but would not be detected from applications that do not use the isCancelled check.
4037| [CVE-2006-1393] Multiple cross-site scripting (XSS) vulnerabilities in the mod_pubcookie Apache application server module in University of Washington Pubcookie 1.x, 3.0.0, 3.1.0, 3.1.1, 3.2 before 3.2.1b, and 3.3 before 3.3.0a allow remote attackers to inject arbitrary web script or HTML via unspecified attack vectors.
4038| [CVE-2006-1346] Directory traversal vulnerability in inc/setLang.php in Greg Neustaetter gCards 1.45 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in a lang[*][file] parameter, as demonstrated by injecting PHP sequences into an Apache access_log file, which is then included by index.php.
4039| [CVE-2006-1292] Directory traversal vulnerability in Jim Hu and Chad Little PHP iCalendar 2.21 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences and a NUL (%00) character in the phpicalendar[cookie_language] and phpicalendar[cookie_style] cookies, as demonstrated by injecting PHP sequences into an Apache access_log file, which is then included by day.php.
4040| [CVE-2006-1243] Directory traversal vulnerability in install05.php in Simple PHP Blog (SPB) 0.4.7.1 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences and a NUL (%00) character in the blog_language parameter, as demonstrated by injecting PHP sequences into an Apache access_log file, which is then included using install05.php.
4041| [CVE-2006-1095] Directory traversal vulnerability in the FileSession object in Mod_python module 3.2.7 for Apache allows local users to execute arbitrary code via a crafted session cookie.
4042| [CVE-2006-1079] htpasswd, as used in Acme thttpd 2.25b and possibly other products such as Apache, might allow local users to gain privileges via shell metacharacters in a command line argument, which is used in a call to the system function. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common products that access htpasswd remotely, then perhaps it should be included.
4043| [CVE-2006-1078] Multiple buffer overflows in htpasswd, as used in Acme thttpd 2.25b, and possibly other products such as Apache, might allow local users to gain privileges via (1) a long command line argument and (2) a long line in a file. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common products that access htpasswd remotely, then perhaps it should be included.
4044| [CVE-2006-0743] Format string vulnerability in LocalSyslogAppender in Apache log4net 1.2.9 might allow remote attackers to cause a denial of service (memory corruption and termination) via unknown vectors.
4045| [CVE-2006-0254] Multiple cross-site scripting (XSS) vulnerabilities in Apache Geronimo 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) time parameter to cal2.jsp and (2) any invalid parameter, which causes an XSS when the log file is viewed by the Web-Access-Log viewer.
4046| [CVE-2006-0150] Multiple format string vulnerabilities in the auth_ldap_log_reason function in Apache auth_ldap 1.6.0 and earlier allows remote attackers to execute arbitrary code via various vectors, including the username.
4047| [CVE-2006-0144] The proxy server feature in go-pear.php in PHP PEAR 0.2.2, as used in Apache2Triad, allows remote attackers to execute arbitrary PHP code by redirecting go-pear.php to a malicious proxy server that provides a modified version of Tar.php with a malicious extractModify function.
4048| [CVE-2006-0042] Unspecified vulnerability in (1) apreq_parse_headers and (2) apreq_parse_urlencoded functions in Apache2::Request (Libapreq2) before 2.07 allows remote attackers cause a denial of service (CPU consumption) via unknown attack vectors that result in quadratic computational complexity.
4049| [CVE-2005-4857] eZ publish 3.5 before 3.5.7, 3.6 before 3.6.5, 3.7 before 3.7.3, and 3.8 before 20051128 allows remote authenticated users to cause a denial of service (Apache httpd segmentation fault) via a request to content/advancedsearch.php with an empty SearchContentClassID parameter, reportedly related to a "memory addressing error".
4050| [CVE-2005-4849] Apache Derby before 10.1.2.1 exposes the (1) user and (2) password attributes in cleartext via (a) the RDBNAM parameter of the ACCSEC command and (b) the output of the DatabaseMetaData.getURL function, which allows context-dependent attackers to obtain sensitive information.
4051| [CVE-2005-4836] The HTTP/1.1 connector in Apache Tomcat 4.1.15 through 4.1.40 does not reject NULL bytes in a URL when allowLinking is configured, which allows remote attackers to read JSP source files and obtain sensitive information.
4052| [CVE-2005-4814] Unrestricted file upload vulnerability in Segue CMS before 1.3.6, when the Apache HTTP Server handles .phtml files with the PHP interpreter, allows remote attackers to upload and execute arbitrary PHP code by placing .phtml files in the userfiles/ directory.
4053| [CVE-2005-4703] Apache Tomcat 4.0.3, when running on Windows, allows remote attackers to obtain sensitive information via a request for a file that contains an MS-DOS device name such as lpt9, which leaks the pathname in an error message, as demonstrated by lpt9.xtp using Nikto.
4054| [CVE-2005-3745] Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message.
4055| [CVE-2005-3630] Fedora Directory Server before 10 allows remote attackers to obtain sensitive information, such as the password from adm.conf via an IFRAME element, probably involving an Apache httpd.conf configuration that orders "allow" directives before "deny" directives.
4056| [CVE-2005-3510] Apache Tomcat 5.5.0 to 5.5.11 allows remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous requests to list a web directory that has a large number of files.
4057| [CVE-2005-3392] Unspecified vulnerability in PHP before 4.4.1, when using the virtual function on Apache 2, allows remote attackers to bypass safe_mode and open_basedir directives.
4058| [CVE-2005-3357] mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference.
4059| [CVE-2005-3352] Cross-site scripting (XSS) vulnerability in the mod_imap module of Apache httpd before 1.3.35-dev and Apache httpd 2.0.x before 2.0.56-dev allows remote attackers to inject arbitrary web script or HTML via the Referer when using image maps.
4060| [CVE-2005-3319] The apache2handler SAPI (sapi_apache2.c) in the Apache module (mod_php) for PHP 5.x before 5.1.0 final and 4.4 before 4.4.1 final allows attackers to cause a denial of service (segmentation fault) via the session.save_path option in a .htaccess file or VirtualHost.
4061| [CVE-2005-3164] The AJP connector in Apache Tomcat 4.0.1 through 4.0.6 and 4.1.0 through 4.1.36, as used in Hitachi Cosminexus Application Server and standalone, does not properly handle when a connection is broken before request body data is sent in a POST request, which can lead to an information leak when "unsuitable request body data" is used for a different request, possibly related to Java Servlet pages.
4062| [CVE-2005-2970] Memory leak in the worker MPM (worker.c) for Apache 2, in certain circumstances, allows remote attackers to cause a denial of service (memory consumption) via aborted connections, which prevents the memory for the transaction pool from being reused for other connections.
4063| [CVE-2005-2963] The mod_auth_shadow module 1.0 through 1.5 and 2.0 for Apache with AuthShadow enabled uses shadow authentication for all locations that use the require group directive, even when other authentication mechanisms are specified, which might allow remote authenticated users to bypass security restrictions.
4064| [CVE-2005-2728] The byte-range filter in Apache 2.0 before 2.0.54 allows remote attackers to cause a denial of service (memory consumption) via an HTTP header with a large Range field.
4065| [CVE-2005-2660] apachetop 0.12.5 and earlier, when running in debug mode, allows local users to create or append to arbitrary files via a symlink attack on atop.debug.
4066| [CVE-2005-2088] The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
4067| [CVE-2005-1754] ** DISPUTED ** JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to read arbitrary files via a full pathname in the argument to the Download parameter. NOTE: Sun and Apache dispute this issue. Sun states: "The report makes references to source code and files that do not exist in the mentioned products."
4068| [CVE-2005-1753] ** DISPUTED ** ReadMessage.jsp in JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to view other users' e-mail attachments via a direct request to /mailboxesdir/username@domainname. NOTE: Sun and Apache dispute this issue. Sun states: "The report makes references to source code and files that do not exist in the mentioned products."
4069| [CVE-2005-1344] Buffer overflow in htdigest in Apache 2.0.52 may allow attackers to execute arbitrary code via a long realm argument. NOTE: since htdigest is normally only locally accessible and not setuid or setgid, there are few attack vectors which would lead to an escalation of privileges, unless htdigest is executed from a CGI program. Therefore this may not be a vulnerability.
4070| [CVE-2005-1268] Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte.
4071| [CVE-2005-1266] Apache SpamAssassin 3.0.1, 3.0.2, and 3.0.3 allows remote attackers to cause a denial of service (CPU consumption and slowdown) via a message with a long Content-Type header without any boundaries.
4072| [CVE-2005-0808] Apache Tomcat before 5.x allows remote attackers to cause a denial of service (application crash) via a crafted AJP12 packet to TCP port 8007.
4073| [CVE-2005-0182] The mod_dosevasive module 1.9 and earlier for Apache creates temporary files with predictable filenames, which could allow remote attackers to overwrite arbitrary files via a symlink attack.
4074| [CVE-2005-0108] Apache mod_auth_radius 1.5.4 and libpam-radius-auth allow remote malicious RADIUS servers to cause a denial of service (crash) via a RADIUS_REPLY_MESSAGE with a RADIUS attribute length of 1, which leads to a memcpy operation with a -1 length argument.
4075| [CVE-2004-2734] webadmin-apache.conf in Novell Web Manager of Novell NetWare 6.5 uses an uppercase Alias tag with an inconsistent lowercase directory tag for a volume, which allows remote attackers to bypass access control to the WEB-INF folder.
4076| [CVE-2004-2680] mod_python (libapache2-mod-python) 3.1.4 and earlier does not properly handle when output filters process more than 16384 bytes, which can cause filter.read to return portions of previously freed memory.
4077| [CVE-2004-2650] Spooler in Apache Foundation James 2.2.0 allows local users to cause a denial of service (memory consumption) by triggering various error conditions in the retrieve function, which prevents a lock from being released and causes a memory leak.
4078| [CVE-2004-2343] ** DISPUTED ** Apache HTTP Server 2.0.47 and earlier allows local users to bypass .htaccess file restrictions, as specified in httpd.conf with directives such as Deny From All, by using an ErrorDocument directive. NOTE: the vendor has disputed this issue, since the .htaccess mechanism is only intended to restrict external web access, and a local user already has the privileges to perform the same operations without using ErrorDocument.
4079| [CVE-2004-2336] Unknown vulnerability in Novell GroupWise and GroupWise WebAccess 6.0 through 6.5, when running with Apache Web Server 1.3 for NetWare where Apache is loaded using GWAPACHE.CONF, allows remote attackers to read directories and files on the server.
4080| [CVE-2004-2115] Multiple cross-site scripting (XSS) vulnerabilities in Oracle HTTP Server 1.3.22, based on Apache, allow remote attackers to execute arbitrary script as other users via the (1) action, (2) username, or (3) password parameters in an isqlplus request.
4081| [CVE-2004-1834] mod_disk_cache in Apache 2.0 through 2.0.49 stores client headers, including authentication information, on the hard disk, which could allow local users to gain sensitive information.
4082| [CVE-2004-1765] Off-by-one buffer overflow in ModSecurity (mod_security) 1.7.4 for Apache 2.x, when SecFilterScanPost is enabled, allows remote attackers to execute arbitrary code via crafted POST requests.
4083| [CVE-2004-1545] UploadFile.php in MoniWiki 1.0.9.2 and earlier, when used with Apache mod_mime, does not properly handle files with two file extensions, such as .php.hwp, which allows remote attackers to upload and execute arbitrary code.
4084| [CVE-2004-1438] The mod_authz_svn Apache module for Subversion 1.0.4-r1 and earlier allows remote authenticated users, with write access to the repository, to read unauthorized parts of the repository via the svn copy command.
4085| [CVE-2004-1405] MediaWiki 1.3.8 and earlier, when used with Apache mod_mime, does not properly handle files with two file extensions, such as .php.rar, which allows remote attackers to upload and execute arbitrary code.
4086| [CVE-2004-1404] Attachment Mod 2.3.10 module for phpBB, when used with Apache mod_mime, does not properly handle files with multiple file extensions, such as .php.rar, which allows remote attackers to upload and execute arbitrary code.
4087| [CVE-2004-1387] The check_forensic script in apache-utils package 1.3.31 allows local users to overwrite or create arbitrary files via a symlink attack on temporary files.
4088| [CVE-2004-1084] Apache for Apple Mac OS X 10.2.8 and 10.3.6 allows remote attackers to read files and resource fork content via HTTP requests to certain special file names related to multiple data streams in HFS+, which bypass Apache file handles.
4089| [CVE-2004-1083] Apache for Apple Mac OS X 10.2.8 and 10.3.6 restricts access to files in a case sensitive manner, but the Apple HFS+ filesystem accesses files in a case insensitive manner, which allows remote attackers to read .DS_Store files and files beginning with ".ht" using alternate capitalization.
4090| [CVE-2004-1082] mod_digest_apple for Apache 1.3.31 and 1.3.32 on Mac OS X Server does not properly verify the nonce of a client response, which allows remote attackers to replay credentials.
4091| [CVE-2004-0942] Apache webserver 2.0.52 and earlier allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request with a MIME header containing multiple lines with a large number of space characters.
4092| [CVE-2004-0940] Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
4093| [CVE-2004-0885] The mod_ssl module in Apache 2.0.35 through 2.0.52, when using the "SSLCipherSuite" directive in directory or location context, allows remote clients to bypass intended restrictions by using any cipher suite that is allowed by the virtual host configuration.
4094| [CVE-2004-0811] Unknown vulnerability in Apache 2.0.51 prevents "the merging of the Satisfy directive," which could allow attackers to obtain access to restricted resources contrary to the specified authentication configuration.
4095| [CVE-2004-0809] The mod_dav module in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (child process crash) via a certain sequence of LOCK requests for a location that allows WebDAV authoring access.
4096| [CVE-2004-0786] The IPv6 URI parsing routines in the apr-util library for Apache 2.0.50 and earlier allow remote attackers to cause a denial of service (child process crash) via a certain URI, as demonstrated using the Codenomicon HTTP Test Tool.
4097| [CVE-2004-0751] The char_buffer_read function in the mod_ssl module for Apache 2.x, when using reverse proxying to an SSL server, allows remote attackers to cause a denial of service (segmentation fault).
4098| [CVE-2004-0748] mod_ssl in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (CPU consumption) by aborting an SSL connection in a way that causes an Apache child process to enter an infinite loop.
4099| [CVE-2004-0747] Buffer overflow in Apache 2.0.50 and earlier allows local users to gain apache privileges via a .htaccess file that causes the overflow during expansion of environment variables.
4100| [CVE-2004-0700] Format string vulnerability in the mod_proxy hook functions function in ssl_engine_log.c in mod_ssl before 2.8.19 for Apache before 1.3.31 may allow remote attackers to execute arbitrary messages via format string specifiers in certain log messages for HTTPS that are handled by the ssl_log function.
4101| [CVE-2004-0646] Buffer overflow in the WriteToLog function for JRun 3.0 through 4.0 web server connectors, such as (1) mod_jrun and (2) mod_jrun20 for Apache, with verbose logging enabled, allows remote attackers to execute arbitrary code via a long HTTP header Content-Type field or other fields.
4102| [CVE-2004-0529] The modified suexec program in cPanel, when configured for mod_php and compiled for Apache 1.3.31 and earlier without mod_phpsuexec, allows local users to execute untrusted shared scripts and gain privileges, as demonstrated using untainted scripts such as (1) proftpdvhosts or (2) addalink.cgi, a different vulnerability than CVE-2004-0490.
4103| [CVE-2004-0493] The ap_get_mime_headers_core function in Apache httpd 2.0.49 allows remote attackers to cause a denial of service (memory exhaustion), and possibly an integer signedness error leading to a heap-based buffer overflow on 64 bit systems, via long header lines with large numbers of space or tab characters.
4104| [CVE-2004-0492] Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.
4105| [CVE-2004-0490] cPanel, when compiling Apache 1.3.29 and PHP with the mod_phpsuexec option, does not set the --enable-discard-path option, which causes php to use the SCRIPT_FILENAME variable to find and execute a script instead of the PATH_TRANSLATED variable, which allows local users to execute arbitrary PHP code as other users via a URL that references the attacker's script after the user's script, which executes the attacker's script with the user's privileges, a different vulnerability than CVE-2004-0529.
4106| [CVE-2004-0488] Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN.
4107| [CVE-2004-0263] PHP 4.3.4 and earlier in Apache 1.x and 2.x (mod_php) can leak global variables between virtual hosts that are handled by the same Apache child process but have different settings, which could allow remote attackers to obtain sensitive information.
4108| [CVE-2004-0174] Apache 1.4.x before 1.3.30, and 2.0.x before 2.0.49, when using multiple listening sockets on certain platforms, allows remote attackers to cause a denial of service (blocked new connections) via a "short-lived connection on a rarely-accessed listening socket."
4109| [CVE-2004-0173] Directory traversal vulnerability in Apache 1.3.29 and earlier, and Apache 2.0.48 and earlier, when running on Cygwin, allows remote attackers to read arbitrary files via a URL containing "..%5C" (dot dot encoded backslash) sequences.
4110| [CVE-2004-0113] Memory leak in ssl_engine_io.c for mod_ssl in Apache 2 before 2.0.49 allows remote attackers to cause a denial of service (memory consumption) via plain HTTP requests to the SSL port of an SSL-enabled server.
4111| [CVE-2004-0009] Apache-SSL 1.3.28+1.52 and earlier, with SSLVerifyClient set to 1 or 3 and SSLFakeBasicAuth enabled, allows remote attackers to forge a client certificate by using basic authentication with the "one-line DN" of the target user.
4112| [CVE-2003-1581] The Apache HTTP Server 2.0.44, when DNS resolution is enabled for client IP addresses, allows remote attackers to inject arbitrary text into log files via an HTTP request in conjunction with a crafted DNS response, as demonstrated by injecting XSS sequences, related to an "Inverse Lookup Log Corruption (ILLC)" issue.
4113| [CVE-2003-1580] The Apache HTTP Server 2.0.44, when DNS resolution is enabled for client IP addresses, uses a logging format that does not identify whether a dotted quad represents an unresolved IP address, which allows remote attackers to spoof IP addresses via crafted DNS responses containing numerical top-level domains, as demonstrated by a forged 123.123.123.123 domain name, related to an "Inverse Lookup Log Corruption (ILLC)" issue.
4114| [CVE-2003-1573] The PointBase 4.6 database component in the J2EE 1.4 reference implementation (J2EE/RI) allows remote attackers to execute arbitrary programs, conduct a denial of service, and obtain sensitive information via a crafted SQL statement, related to "inadequate security settings and library bugs in sun.* and org.apache.* packages."
4115| [CVE-2003-1521] Sun Java Plug-In 1.4 through 1.4.2_02 allows remote attackers to repeatedly access the floppy drive via the createXmlDocument method in the org.apache.crimson.tree.XmlDocument class, which violates the Java security model.
4116| [CVE-2003-1516] The org.apache.xalan.processor.XSLProcessorVersion class in Java Plug-in 1.4.2_01 allows signed and unsigned applets to share variables, which violates the Java security model and could allow remote attackers to read or write data belonging to a signed applet.
4117| [CVE-2003-1502] mod_throttle 3.0 allows local users with Apache privileges to access shared memory that points to a file that is writable by the apache user, which could allow local users to gain privileges.
4118| [CVE-2003-1418] Apache HTTP Server 1.3.22 through 1.3.27 on OpenBSD allows remote attackers to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child proccess IDs (PID).
4119| [CVE-2003-1307] ** DISPUTED ** The mod_php module for the Apache HTTP Server allows local users with write access to PHP scripts to send signals to the server's process group and use the server's file descriptors, as demonstrated by sending a STOP signal, then intercepting incoming connections on the server's TCP port. NOTE: the PHP developer has disputed this vulnerability, saying "The opened file descriptors are opened by Apache. It is the job of Apache to protect them ... Not a bug in PHP."
4120| [CVE-2003-1172] Directory traversal vulnerability in the view-source sample file in Apache Software Foundation Cocoon 2.1 and 2.2 allows remote attackers to access arbitrary files via a .. (dot dot) in the filename parameter.
4121| [CVE-2003-1171] Heap-based buffer overflow in the sec_filter_out function in mod_security 1.7RC1 through 1.7.1 in Apache 2 allows remote attackers to execute arbitrary code via a server side script that sends a large amount of data.
4122| [CVE-2003-1138] The default configuration of Apache 2.0.40, as shipped with Red Hat Linux 9.0, allows remote attackers to list directory contents, even if auto indexing is turned off and there is a default web page configured, via a GET request containing a double slash (//).
4123| [CVE-2003-1054] mod_access_referer 1.0.2 allows remote attackers to cause a denial of service (crash) via a malformed Referer header that is missing a hostname, as parsed by the ap_parse_uri_components function in Apache, which triggers a null dereference.
4124| [CVE-2003-0993] mod_access in Apache 1.3 before 1.3.30, when running big-endian 64-bit platforms, does not properly parse Allow/Deny rules using IP addresses without a netmask, which could allow remote attackers to bypass intended access restrictions.
4125| [CVE-2003-0987] mod_digest for Apache before 1.3.31 does not properly verify the nonce of a client response by using a AuthNonce secret.
4126| [CVE-2003-0866] The Catalina org.apache.catalina.connector.http package in Tomcat 4.0.x up to 4.0.3 allows remote attackers to cause a denial of service via several requests that do not follow the HTTP protocol, which causes Tomcat to reject later requests.
4127| [CVE-2003-0844] mod_gzip 1.3.26.1a and earlier, and possibly later official versions, when running in debug mode without the Apache log, allows local users to overwrite arbitrary files via (1) a symlink attack on predictable temporary filenames on Unix systems, or (2) an NTFS hard link on Windows systems when the "Strengthen default permissions of internal system objects" policy is not enabled.
4128| [CVE-2003-0843] Format string vulnerability in mod_gzip_printf for mod_gzip 1.3.26.1a and earlier, and possibly later official versions, when running in debug mode and using the Apache log, allows remote attackers to execute arbitrary code via format string characters in an HTTP GET request with an "Accept-Encoding: gzip" header.
4129| [CVE-2003-0789] mod_cgid in Apache before 2.0.48, when using a threaded MPM, does not properly handle CGI redirect paths, which could cause Apache to send the output of a CGI program to the wrong client.
4130| [CVE-2003-0771] Gallery.pm in Apache::Gallery (aka A::G) uses predictable temporary filenames when running Inline::C, which allows local users to execute arbitrary code by creating and modifying the files before Apache::Gallery does.
4131| [CVE-2003-0658] Docview before 1.1-18 in Caldera OpenLinux 3.1.1, SCO Linux 4.0, OpenServer 5.0.7, configures the Apache web server in a way that allows remote attackers to read arbitrary publicly readable files via a certain URL, possibly related to rewrite rules.
4132| [CVE-2003-0542] Multiple stack-based buffer overflows in (1) mod_alias and (2) mod_rewrite for Apache before 1.3.29 allow attackers to create configuration files to cause a denial of service (crash) or execute arbitrary code via a regular expression with more than 9 captures.
4133| [CVE-2003-0460] The rotatelogs program on Apache before 1.3.28, for Windows and OS/2 systems, does not properly ignore certain control characters that are received over the pipe, which could allow remote attackers to cause a denial of service.
4134| [CVE-2003-0254] Apache 2 before 2.0.47, when running on an IPv6 host, allows attackers to cause a denial of service (CPU consumption by infinite loop) when the FTP proxy server fails to create an IPv6 socket.
4135| [CVE-2003-0253] The prefork MPM in Apache 2 before 2.0.47 does not properly handle certain errors from accept, which could lead to a denial of service.
4136| [CVE-2003-0249] ** DISPUTED ** PHP treats unknown methods such as "PoSt" as a GET request, which could allow attackers to intended access restrictions if PHP is running on a server that passes on all methods, such as Apache httpd 2.0, as demonstrated using a Limit directive. NOTE: this issue has been disputed by the Apache security team, saying "It is by design that PHP allows scripts to process any request method. A script which does not explicitly verify the request method will hence be processed as normal for arbitrary methods. It is therefore expected behaviour that one cannot implement per-method access control using the Apache configuration alone, which is the assumption made in this report."
4137| [CVE-2003-0245] Vulnerability in the apr_psprintf function in the Apache Portable Runtime (APR) library for Apache 2.0.37 through 2.0.45 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long strings, as demonstrated using XML objects to mod_dav, and possibly other vectors.
4138| [CVE-2003-0192] Apache 2 before 2.0.47, and certain versions of mod_ssl for Apache 1.3, do not properly handle "certain sequences of per-directory renegotiations and the SSLCipherSuite directive being used to upgrade from a weak ciphersuite to a strong one," which could cause Apache to use the weak ciphersuite.
4139| [CVE-2003-0189] The authentication module for Apache 2.0.40 through 2.0.45 on Unix does not properly handle threads safely when using the crypt_r or crypt functions, which allows remote attackers to cause a denial of service (failed Basic authentication with valid usernames and passwords) when a threaded MPM is used.
4140| [CVE-2003-0134] Unknown vulnerability in filestat.c for Apache running on OS2, versions 2.0 through 2.0.45, allows unknown attackers to cause a denial of service via requests related to device names.
4141| [CVE-2003-0132] A memory leak in Apache 2.0 through 2.0.44 allows remote attackers to cause a denial of service (memory consumption) via large chunks of linefeed characters, which causes Apache to allocate 80 bytes for each linefeed.
4142| [CVE-2003-0083] Apache 1.3 before 1.3.25 and Apache 2.0 before version 2.0.46 does not filter terminal escape sequences from its access logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences, a different vulnerability than CVE-2003-0020.
4143| [CVE-2003-0020] Apache does not filter terminal escape sequences from its error logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences.
4144| [CVE-2003-0017] Apache 2.0 before 2.0.44 on Windows platforms allows remote attackers to obtain certain files via an HTTP request that ends in certain illegal characters such as ">", which causes a different filename to be processed and served.
4145| [CVE-2003-0016] Apache before 2.0.44, when running on unpatched Windows 9x and Me operating systems, allows remote attackers to cause a denial of service or execute arbitrary code via an HTTP request containing MS-DOS device names.
4146| [CVE-2002-2310] ClickCartPro 4.0 stores the admin_user.db data file under the web document root with insufficient access control on servers other than Apache, which allows remote attackers to obtain usernames and passwords.
4147| [CVE-2002-2309] php.exe in PHP 3.0 through 4.2.2, when running on Apache, does not terminate properly, which allows remote attackers to cause a denial of service via a direct request without arguments.
4148| [CVE-2002-2272] Tomcat 4.0 through 4.1.12, using mod_jk 1.2.1 module on Apache 1.3 through 1.3.27, allows remote attackers to cause a denial of service (desynchronized communications) via an HTTP GET request with a Transfer-Encoding chunked field with invalid values.
4149| [CVE-2002-2103] Apache before 1.3.24, when writing to the log file, records a spoofed hostname from the reverse lookup of an IP address, even when a double-reverse lookup fails, which allows remote attackers to hide the original source of activities.
4150| [CVE-2002-2029] PHP, when installed on Windows with Apache and ScriptAlias for /php/ set to c:/php/, allows remote attackers to read arbitrary files and possibly execute arbitrary programs via an HTTP request for php.exe with a filename in the query string.
4151| [CVE-2002-2012] Unknown vulnerability in Apache 1.3.19 running on HP Secure OS for Linux 1.0 allows remote attackers to cause "unexpected results" via an HTTP request.
4152| [CVE-2002-2009] Apache Tomcat 4.0.1 allows remote attackers to obtain the web root path via HTTP requests for JSP files preceded by (1) +/, (2) >/, (3) </, and (4) %20/, which leaks the pathname in an error message.
4153| [CVE-2002-2008] Apache Tomcat 4.0.3 for Windows allows remote attackers to obtain the web root path via an HTTP request for a resource that does not exist, such as lpt9, which leaks the information in an error message.
4154| [CVE-2002-2007] The default installations of Apache Tomcat 3.2.3 and 3.2.4 allows remote attackers to obtain sensitive system information such as directory listings and web root path, via erroneous HTTP requests for Java Server Pages (JSP) in the (1) test/jsp, (2) samples/jsp and (3) examples/jsp directories, or the (4) test/realPath.jsp servlet, which leaks pathnames in error messages.
4155| [CVE-2002-2006] The default installation of Apache Tomcat 4.0 through 4.1 and 3.0 through 3.3.1 allows remote attackers to obtain the installation path and other sensitive system information via the (1) SnoopServlet or (2) TroubleShooter example servlets.
4156| [CVE-2002-1895] The servlet engine in Jakarta Apache Tomcat 3.3 and 4.0.4, when using IIS and the ajp1.3 connector, allows remote attackers to cause a denial of service (crash) via a large number of HTTP GET requests for an MS-DOS device such as AUX, LPT1, CON, or PRN.
4157| [CVE-2002-1850] mod_cgi in Apache 2.0.39 and 2.0.40 allows local users and possibly remote attackers to cause a denial of service (hang and memory consumption) by causing a CGI script to send a large amount of data to stderr, which results in a read/write deadlock between httpd and the CGI script.
4158| [CVE-2002-1793] HTTP Server mod_ssl module running on HP-UX 11.04 with Virtualvault OS (VVOS) 4.5 through 4.6 closes the connection when the Apache server times out during an SSL request, which may allow attackers to cause a denial of service.
4159| [CVE-2002-1658] Buffer overflow in htdigest in Apache 1.3.26 and 1.3.27 may allow attackers to execute arbitrary code via a long user argument. NOTE: since htdigest is normally only locally accessible and not setuid or setgid, there are few attack vectors which would lead to an escalation of privileges, unless htdigest is executed from a CGI program. Therefore this may not be a vulnerability.
4160| [CVE-2002-1635] The Apache configuration file (httpd.conf) in Oracle 9i Application Server (9iAS) uses a Location alias for /perl directory instead of a ScriptAlias, which allows remote attackers to read the source code of arbitrary CGI files via a URL containing the /perl directory instead of /cgi-bin.
4161| [CVE-2002-1593] mod_dav in Apache before 2.0.42 does not properly handle versioning hooks, which may allow remote attackers to kill a child process via a null dereference and cause a denial of service (CPU consumption) in a preforked multi-processing module.
4162| [CVE-2002-1592] The ap_log_rerror function in Apache 2.0 through 2.035, when a CGI application encounters an error, sends error messages to the client that include the full path for the server, which allows remote attackers to obtain sensitive information.
4163| [CVE-2002-1567] Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1 allows remote attackers to execute arbitrary web script and steal cookies via a URL with encoded newlines followed by a request to a .jsp file whose name contains the script.
4164| [CVE-2002-1394] Apache Tomcat 4.0.5 and earlier, when using both the invoker servlet and the default servlet, allows remote attackers to read source code for server files or bypass certain protections, a variant of CAN-2002-1148.
4165| [CVE-2002-1233] A regression error in the Debian distributions of the apache-ssl package (before 1.3.9 on Debian 2.2, and before 1.3.26 on Debian 3.0), for Apache 1.3.27 and earlier, allows local users to read or modify the Apache password file via a symlink attack on temporary files when the administrator runs (1) htpasswd or (2) htdigest, a re-introduction of a vulnerability that was originally identified and addressed by CVE-2001-0131.
4166| [CVE-2002-1157] Cross-site scripting vulnerability in the mod_ssl Apache module 2.8.9 and earlier, when UseCanonicalName is off and wildcard DNS is enabled, allows remote attackers to execute script as other web site visitors, via the server name in an HTTPS response on the SSL port, which is used in a self-referencing URL, a different vulnerability than CAN-2002-0840.
4167| [CVE-2002-1156] Apache 2.0.42 allows remote attackers to view the source code of a CGI script via a POST request to a directory with both WebDAV and CGI enabled.
4168| [CVE-2002-1148] The default servlet (org.apache.catalina.servlets.DefaultServlet) in Tomcat 4.0.4 and 4.1.10 and earlier allows remote attackers to read source code for server files via a direct request to the servlet.
4169| [CVE-2002-0935] Apache Tomcat 4.0.3, and possibly other versions before 4.1.3 beta, allows remote attackers to cause a denial of service (resource exhaustion) via a large number of requests to the server with null characters, which causes the working threads to hang.
4170| [CVE-2002-0843] Buffer overflows in the ApacheBench benchmark support program (ab.c) in Apache before 1.3.27, and Apache 2.x before 2.0.43, allow a malicious web server to cause a denial of service and possibly execute arbitrary code via a long response.
4171| [CVE-2002-0840] Cross-site scripting (XSS) vulnerability in the default error page of Apache 2.0 before 2.0.43, and 1.3.x up to 1.3.26, when UseCanonicalName is "Off" and support for wildcard DNS is present, allows remote attackers to execute script as other web page visitors via the Host: header, a different vulnerability than CAN-2002-1157.
4172| [CVE-2002-0839] The shared memory scoreboard in the HTTP daemon for Apache 1.3.x before 1.3.27 allows any user running as the Apache UID to send a SIGUSR1 signal to any process as root, resulting in a denial of service (process kill) or possibly other behaviors that would not normally be allowed, by modifying the parent[].pid and parent[].last_rtime segments in the scoreboard.
4173| [CVE-2002-0682] Cross-site scripting vulnerability in Apache Tomcat 4.0.3 allows remote attackers to execute script as other web users via script in a URL with the /servlet/ mapping, which does not filter the script when an exception is thrown by the servlet.
4174| [CVE-2002-0661] Directory traversal vulnerability in Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to read arbitrary files and execute commands via .. (dot dot) sequences containing \ (backslash) characters.
4175| [CVE-2002-0658] OSSP mm library (libmm) before 1.2.0 allows the local Apache user to gain privileges via temporary files, possibly via a symbolic link attack.
4176| [CVE-2002-0654] Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to determine the full pathname of the server via (1) a request for a .var file, which leaks the pathname in the resulting error message, or (2) via an error message that occurs when a script (child process) cannot be invoked.
4177| [CVE-2002-0653] Off-by-one buffer overflow in the ssl_compat_directive function, as called by the rewrite_command hook for mod_ssl Apache module 2.8.9 and earlier, allows local users to execute arbitrary code as the Apache server user via .htaccess files with long entries.
4178| [CVE-2002-0513] The PHP administration script in popper_mod 1.2.1 and earlier relies on Apache .htaccess authentication, which allows remote attackers to gain privileges if the script is not appropriately configured by the administrator.
4179| [CVE-2002-0493] Apache Tomcat may be started without proper security settings if errors are encountered while reading the web.xml file, which could allow attackers to bypass intended restrictions.
4180| [CVE-2002-0392] Apache 1.3 through 1.3.24, and Apache 2.0 through 2.0.36, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a chunk-encoded HTTP request that causes Apache to use an incorrect size.
4181| [CVE-2002-0259] InstantServers MiniPortal 1.1.5 and earlier stores sensitive login and account data in plaintext in (1) .pwd files in the miniportal/apache directory, or (2) mplog.txt, which could allow local users to gain privileges.
4182| [CVE-2002-0249] PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message.
4183| [CVE-2002-0240] PHP, when installed with Apache and configured to search for index.php as a default web page, allows remote attackers to obtain the full pathname of the server via the HTTP OPTIONS method, which reveals the pathname in the resulting error message.
4184| [CVE-2002-0082] The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.
4185| [CVE-2002-0061] Apache for Win32 before 1.3.24, and 2.0.x before 2.0.34-beta, allows remote attackers to execute arbitrary commands via shell metacharacters (a | pipe character) provided as arguments to batch (.bat) or .cmd scripts, which are sent unfiltered to the shell interpreter, typically cmd.exe.
4186| [CVE-2001-1556] The log files in Apache web server contain information directly supplied by clients and does not filter or quote control characters, which could allow remote attackers to hide HTTP requests and spoof source IP addresses when logs are viewed with UNIX programs such as cat, tail, and grep.
4187| [CVE-2001-1534] mod_usertrack in Apache 1.3.11 through 1.3.20 generates session ID's using predictable information including host IP address, system time and server process ID, which allows local users to obtain session ID's and bypass authentication when these session ID's are used for authentication.
4188| [CVE-2001-1510] Allaire JRun 2.3.3, 3.0 and 3.1 running on IIS 4.0 and 5.0, iPlanet, Apache, JRun web server (JWS), and possibly other web servers allows remote attackers to read arbitrary files and directories by appending (1) "%3f.jsp", (2) "?.jsp" or (3) "?" to the requested URL.
4189| [CVE-2001-1449] The default installation of Apache before 1.3.19 on Mandrake Linux 7.1 through 8.0 and Linux Corporate Server 1.0.1 allows remote attackers to list the directory index of arbitrary web directories.
4190| [CVE-2001-1385] The Apache module for PHP 4.0.0 through PHP 4.0.4, when disabled with the 'engine = off' option for a virtual host, may disable PHP for other virtual hosts, which could cause Apache to serve the source code of PHP scripts.
4191| [CVE-2001-1342] Apache before 1.3.20 on Windows and OS/2 systems allows remote attackers to cause a denial of service (GPF) via an HTTP request for a URI that contains a large number of / (slash) or other characters, which causes certain functions to dereference a null pointer.
4192| [CVE-2001-1217] Directory traversal vulnerability in PL/SQL Apache module in Oracle Oracle 9i Application Server allows remote attackers to access sensitive information via a double encoded URL with .. (dot dot) sequences.
4193| [CVE-2001-1216] Buffer overflow in PL/SQL Apache module in Oracle 9i Application Server allows remote attackers to execute arbitrary code via a long request for a help page.
4194| [CVE-2001-1072] Apache with mod_rewrite enabled on most UNIX systems allows remote attackers to bypass RewriteRules by inserting extra / (slash) characters into the requested path, which causes the regular expression in the RewriteRule to fail.
4195| [CVE-2001-1013] Apache on Red Hat Linux with with the UserDir directive enabled generates different error codes when a username exists and there is no public_html directory and when the username does not exist, which could allow remote attackers to determine valid usernames on the server.
4196| [CVE-2001-0925] The default installation of Apache before 1.3.19 allows remote attackers to list directories instead of the multiview index.html file via an HTTP request for a path that contains many / (slash) characters, which causes the path to be mishandled by (1) mod_negotiation, (2) mod_dir, or (3) mod_autoindex.
4197| [CVE-2001-0829] A cross-site scripting vulnerability in Apache Tomcat 3.2.1 allows a malicious webmaster to embed Javascript in a request for a .JSP file, which causes the Javascript to be inserted into an error message.
4198| [CVE-2001-0766] Apache on MacOS X Client 10.0.3 with the HFS+ file system allows remote attackers to bypass access restrictions via a URL that contains some characters whose case is not matched by Apache's filters.
4199| [CVE-2001-0731] Apache 1.3.20 with Multiviews enabled allows remote attackers to view directory contents and bypass the index page via a URL containing the "M=D" query string.
4200| [CVE-2001-0730] split-logfile in Apache 1.3.20 allows remote attackers to overwrite arbitrary files that end in the .log extension via an HTTP request with a / (slash) in the Host: header.
4201| [CVE-2001-0729] Apache 1.3.20 on Windows servers allows remote attackers to bypass the default index page and list directory contents via a URL with a large number of / (slash) characters.
4202| [CVE-2001-0590] Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0).
4203| [CVE-2001-0131] htpasswd and htdigest in Apache 2.0a9, 1.3.14, and others allows local users to overwrite arbitrary files via a symlink attack.
4204| [CVE-2001-0108] PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested.
4205| [CVE-2001-0042] PHP 3.x (PHP3) on Apache 1.3.6 allows remote attackers to read arbitrary files via a modified .. (dot dot) attack containing "%5c" (encoded backslash) sequences.
4206| [CVE-2000-1247] The default configuration of the jserv-status handler in jserv.conf in Apache JServ 1.1.2 includes an "allow from 127.0.0.1" line, which allows local users to discover JDBC passwords or other sensitive information via a direct request to the jserv/ URI.
4207| [CVE-2000-1210] Directory traversal vulnerability in source.jsp of Apache Tomcat before 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the argument to source.jsp.
4208| [CVE-2000-1206] Vulnerability in Apache httpd before 1.3.11, when configured for mass virtual hosting using mod_rewrite, or mod_vhost_alias in Apache 1.3.9, allows remote attackers to retrieve arbitrary files.
4209| [CVE-2000-1205] Cross site scripting vulnerabilities in Apache 1.3.0 through 1.3.11 allow remote attackers to execute script as other web site visitors via (1) the printenv CGI (printenv.pl), which does not encode its output, (2) pages generated by the ap_send_error_response function such as a default 404, which does not add an explicit charset, or (3) various messages that are generated by certain Apache modules or core code. NOTE: the printenv issue might still exist for web browsers that can render text/plain content types as HTML, such as Internet Explorer, but CVE regards this as a design limitation of those browsers, not Apache. The printenv.pl/acuparam vector, discloser on 20070724, is one such variant.
4210| [CVE-2000-1204] Vulnerability in the mod_vhost_alias virtual hosting module for Apache 1.3.9, 1.3.11 and 1.3.12 allows remote attackers to obtain the source code for CGI programs if the cgi-bin directory is under the document root.
4211| [CVE-2000-1168] IBM HTTP Server 1.3.6 (based on Apache) allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long GET request.
4212| [CVE-2000-1016] The default configuration of Apache (httpd.conf) on SuSE 6.4 includes an alias for the /usr/doc directory, which allows remote attackers to read package documentation and obtain system configuration information via an HTTP request for the /doc/packages URL.
4213| [CVE-2000-0913] mod_rewrite in Apache 1.3.12 and earlier allows remote attackers to read arbitrary files if a RewriteRule directive is expanded to include a filename whose name contains a regular expression.
4214| [CVE-2000-0883] The default configuration of mod_perl for Apache as installed on Mandrake Linux 6.1 through 7.1 sets the /perl/ directory to be browseable, which allows remote attackers to list the contents of that directory.
4215| [CVE-2000-0869] The default configuration of Apache 1.3.12 in SuSE Linux 6.4 enables WebDAV, which allows remote attackers to list arbitrary diretories via the PROPFIND HTTP request method.
4216| [CVE-2000-0868] The default configuration of Apache 1.3.12 in SuSE Linux 6.4 allows remote attackers to read source code for CGI scripts by replacing the /cgi-bin/ in the requested URL with /cgi-bin-sdb/.
4217| [CVE-2000-0791] Trustix installs the httpsd program for Apache-SSL with world-writeable permissions, which allows local users to replace it with a Trojan horse.
4218| [CVE-2000-0760] The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension.
4219| [CVE-2000-0759] Jakarta Tomcat 3.1 under Apache reveals physical path information when a remote attacker requests a URL that does not exist, which generates an error message that includes the physical path.
4220| [CVE-2000-0628] The source.asp example script in the Apache ASP module Apache::ASP 1.93 and earlier allows remote attackers to modify files.
4221| [CVE-2000-0505] The Apache 1.3.x HTTP server for Windows platforms allows remote attackers to list directory contents by requesting a URL containing a large number of / characters.
4222| [CVE-1999-1412] A possible interaction between Apple MacOS X release 1.0 and Apache HTTP server allows remote attackers to cause a denial of service (crash) via a flood of HTTP GET requests to CGI programs, which generates a large number of processes.
4223| [CVE-1999-1293] mod_proxy in Apache 1.2.5 and earlier allows remote attackers to cause a denial of service via malformed FTP commands, which causes Apache to dump core.
4224| [CVE-1999-1237] Multiple buffer overflows in smbvalid/smbval SMB authentication library, as used in Apache::AuthenSmb and possibly other modules, allows remote attackers to execute arbitrary commands via (1) a long username, (2) a long password, and (3) other unspecified methods.
4225| [CVE-1999-1199] Apache WWW server 1.3.1 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via a large number of MIME headers with the same name, aka the "sioux" vulnerability.
4226| [CVE-1999-1053] guestbook.pl cleanses user-inserted SSI commands by removing text between "<!--" and "-->" separators, which allows remote attackers to execute arbitrary commands when guestbook.pl is run on Apache 1.3.9 and possibly other versions, since Apache allows other closing sequences besides "-->".
4227| [CVE-1999-0926] Apache allows remote attackers to conduct a denial of service via a large number of MIME headers.
4228| [CVE-1999-0678] A default configuration of Apache on Debian GNU/Linux sets the ServerRoot to /usr/doc, which allows remote users to read documentation files for the entire server.
4229| [CVE-1999-0448] IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request.
4230| [CVE-1999-0289] The Apache web server for Win32 may provide access to restricted files when a . (dot) is appended to a requested URL.
4231| [CVE-1999-0236] ScriptAlias directory in NCSA and Apache httpd allowed attackers to read CGI programs.
4232| [CVE-1999-0107] Buffer overflow in Apache 1.2.5 and earlier allows a remote attacker to cause a denial of service with a large number of GET requests containing a large number of / characters.
4233| [CVE-1999-0071] Apache httpd cookie buffer overflow for versions 1.1.1 and earlier.
4234|
4235| SecurityFocus - https://www.securityfocus.com/bid/:
4236| [104554] Apache HBase CVE-2018-8025 Security Bypass Vulnerability
4237| [104465] Apache Geode CVE-2017-15695 Remote Code Execution Vulnerability
4238| [104418] Apache Storm CVE-2018-8008 Arbitrary File Write Vulnerability
4239| [104399] Apache Storm CVE-2018-1332 User Impersonation Vulnerability
4240| [104348] Apache UIMA CVE-2017-15691 XML External Entity Injection Vulnerability
4241| [104313] Apache NiFi XML External Entity Injection and Denial of Service Vulnerability
4242| [104259] Apache Geode CVE-2017-12622 Authorization Bypass Vulnerability
4243| [104257] Apache Sling XSS Protection API CVE-2017-15717 Cross Site Scripting Vulnerability
4244| [104253] Apache ZooKeeper CVE-2018-8012 Security Bypass Vulnerability
4245| [104252] Apache Batik CVE-2018-8013 Information Disclosure Vulnerability
4246| [104239] Apache Solr CVE-2018-8010 XML External Entity Multiple Information Disclosure Vulnerabilities
4247| [104215] Apache ORC CVE-2018-8015 Denial of Service Vulnerability
4248| [104203] Apache Tomcat CVE-2018-8014 Security Bypass Vulnerability
4249| [104161] Apache Ambari CVE-2018-8003 Directory Traversal Vulnerability
4250| [104140] Apache Derby CVE-2018-1313 Security Bypass Vulnerability
4251| [104135] Apache Tika CVE-2018-1338 Denial of Service Vulnerability
4252| [104008] Apache Fineract CVE-2018-1291 SQL Injection Vulnerability
4253| [104007] Apache Fineract CVE-2018-1292 SQL Injection Vulnerability
4254| [104005] Apache Fineract CVE-2018-1289 SQL Injection Vulnerability
4255| [104001] Apache Tika CVE-2018-1335 Remote Command Injection Vulnerability
4256| [103975] Apache Fineract CVE-2018-1290 SQL Injection Vulnerability
4257| [103974] Apache Solr CVE-2018-1308 XML External Entity Injection Vulnerability
4258| [103772] Apache Traffic Server CVE-2017-7671 Denial of Service Vulnerability
4259| [103770] Apache Traffic Server CVE-2017-5660 Security Bypass Vulnerability
4260| [103751] Apache Hive CVE-2018-1282 SQL Injection Vulnerability
4261| [103750] Apache Hive CVE-2018-1284 Security Bypass Vulnerability
4262| [103692] Apache Ignite CVE-2018-1295 Arbitrary Code Execution Vulnerability
4263| [103528] Apache HTTP Server CVE-2018-1302 Denial of Service Vulnerability
4264| [103525] Apache HTTP Server CVE-2017-15715 Remote Security Bypass Vulnerability
4265| [103524] Apache HTTP Server CVE-2018-1312 Remote Security Bypass Vulnerability
4266| [103522] Apache HTTP Server CVE-2018-1303 Denial of Service Vulnerability
4267| [103520] Apache HTTP Server CVE-2018-1283 Remote Security Vulnerability
4268| [103516] Apache Struts CVE-2018-1327 Denial of Service Vulnerability
4269| [103515] Apache HTTP Server CVE-2018-1301 Denial of Service Vulnerability
4270| [103512] Apache HTTP Server CVE-2017-15710 Denial of Service Vulnerability
4271| [103508] Apache Syncope CVE-2018-1321 Multiple Remote Code Execution Vulnerabilities
4272| [103507] Apache Syncope CVE-2018-1322 Multiple Information Disclosure Vulnerabilities
4273| [103490] Apache Commons Compress CVE-2018-1324 Multiple Denial Of Service Vulnerabilities
4274| [103434] APACHE Allura CVE-2018-1319 HTTP Response Splitting Vulnerability
4275| [103389] Apache Tomcat JK Connector CVE-2018-1323 Directory Traversal Vulnerability
4276| [103222] Apache CloudStack CVE-2013-4317 Information Disclosure Vulnerability
4277| [103219] Apache Xerces-C CVE-2017-12627 Null Pointer Dereference Denial of Service Vulnerability
4278| [103206] Apache Geode CVE-2017-15693 Remote Code Execution Vulnerability
4279| [103205] Apache Geode CVE-2017-15692 Remote Code Execution Vulnerability
4280| [103170] Apache Tomcat CVE-2018-1304 Security Bypass Vulnerability
4281| [103144] Apache Tomcat CVE-2018-1305 Security Bypass Vulnerability
4282| [103102] Apache Oozie CVE-2017-15712 Information Disclosure Vulnerability
4283| [103098] Apache Karaf CVE-2016-8750 LDAP Injection Vulnerability
4284| [103069] Apache Tomcat CVE-2017-15706 Remote Security Weakness
4285| [103068] Apache JMeter CVE-2018-1287 Security Bypass Vulnerability
4286| [103067] Apache Qpid Dispatch Router 'router_core/connections.c' Denial of Service Vulnerability
4287| [103036] Apache CouchDB CVE-2017-12636 Remote Code Execution Vulnerability
4288| [103025] Apache Thrift CVE-2016-5397 Remote Command Injection Vulnerability
4289| [102879] Apache POI CVE-2017-12626 Multiple Denial of Service Vulnerabilities
4290| [102842] Apache NiFi CVE-2017-12632 Host Header Injection Vulnerability
4291| [102815] Apache NiFi CVE-2017-15697 Multiple Cross Site Scripting Vulnerabilities
4292| [102488] Apache Geode CVE-2017-9795 Remote Code Execution Vulnerability
4293| [102229] Apache Sling CVE-2017-15700 Information Disclosure Vulnerability
4294| [102226] Apache Drill CVE-2017-12630 Cross Site Scripting Vulnerability
4295| [102154] Multiple Apache Products CVE-2017-15708 Remote Code Execution Vulnerability
4296| [102127] Apache CXF Fediz CVE-2017-12631 Multiple Cross Site Request Forgery Vulnerabilities
4297| [102041] Apache Qpid Broker-J CVE-2017-15701 Denial of Service Vulnerability
4298| [102040] Apache Qpid Broker CVE-2017-15702 Security Weakness
4299| [102021] Apache Struts CVE-2017-15707 Denial of Service Vulnerability
4300| [101980] EMC RSA Authentication Agent for Web: Apache Web Server Authentication Bypass Vulnerability
4301| [101876] Apache Camel CVE-2017-12634 Deserialization Remote Code Execution Vulnerability
4302| [101874] Apache Camel CVE-2017-12633 Deserialization Remote Code Execution Vulnerability
4303| [101872] Apache Karaf CVE-2014-0219 Local Denial of Service Vulnerability
4304| [101868] Apache CouchDB CVE-2017-12635 Remote Privilege Escalation Vulnerability
4305| [101859] Apache CXF CVE-2017-12624 Denial of Service Vulnerability
4306| [101844] Apache Sling Servlets Post CVE-2017-11296 Cross Site Scripting Vulnerability
4307| [101686] Apache Hive CVE-2017-12625 Information Disclosure Vulnerability
4308| [101644] Apache Wicket CVE-2012-5636 Cross Site Scripting Vulnerability
4309| [101631] Apache Traffic Server CVE-2015-3249 Multiple Remote Code Execution Vulnerabilities
4310| [101630] Apache Traffic Server CVE-2014-3624 Access Bypass Vulnerability
4311| [101625] Apache jUDDI CVE-2009-1197 Security Bypass Vulnerability
4312| [101623] Apache jUDDI CVE-2009-1198 Cross Site Scripting Vulnerability
4313| [101620] Apache Subversion 'libsvn_fs_fs/fs_fs.c' Denial of Service Vulnerability
4314| [101585] Apache OpenOffice Multiple Remote Code Execution Vulnerabilities
4315| [101577] Apache Wicket CVE-2016-6806 Cross Site Request Forgery Vulnerability
4316| [101575] Apache Wicket CVE-2014-0043 Information Disclosure Vulnerability
4317| [101570] Apache Geode CVE-2017-9797 Information Disclosure Vulnerability
4318| [101562] Apache Derby CVE-2010-2232 Arbitrary File Overwrite Vulnerability
4319| [101560] Apache Portable Runtime Utility CVE-2017-12613 Multiple Information Disclosure Vulnerabilities
4320| [101558] Apache Portable Runtime Utility Local Out-of-Bounds Read Denial of Service Vulnerability
4321| [101532] Apache James CVE-2017-12628 Arbitrary Command Execution Vulnerability
4322| [101516] Apache HTTP Server CVE-2017-12171 Security Bypass Vulnerability
4323| [101261] Apache Solr/Lucene CVE-2017-12629 Information Disclosure and Remote Code Execution Vulnerabilities
4324| [101230] Apache Roller CVE-2014-0030 XML External Entity Injection Vulnerability
4325| [101173] Apache IMPALA CVE-2017-9792 Information Disclosure Vulnerability
4326| [101052] Apache Commons Jelly CVE-2017-12621 Security Bypass Vulnerability
4327| [101027] Apache Mesos CVE-2017-7687 Denial of Service Vulnerability
4328| [101023] Apache Mesos CVE-2017-9790 Denial of Service Vulnerability
4329| [100954] Apache Tomcat CVE-2017-12617 Incomplete Fix Remote Code Execution Vulnerability
4330| [100946] Apache Wicket CVE-2014-7808 Cross Site Request Forgery Vulnerability
4331| [100901] Apache Tomcat CVE-2017-12615 Remote Code Execution Vulnerability
4332| [100897] Apache Tomcat CVE-2017-12616 Information Disclosure Vulnerability
4333| [100880] Apache Directory LDAP API CVE-2015-3250 Unspecified Information Disclosure Vulnerability
4334| [100872] Apache HTTP Server CVE-2017-9798 Information Disclosure Vulnerability
4335| [100870] Apache Solr CVE-2017-9803 Remote Privilege Escalation Vulnerability
4336| [100859] puppetlabs-apache CVE-2017-2299 Information Disclosure Vulnerability
4337| [100829] Apache Struts CVE-2017-12611 Remote Code Execution Vulnerability
4338| [100823] Apache Spark CVE-2017-12612 Deserialization Remote Code Execution Vulnerability
4339| [100612] Apache Struts CVE-2017-9804 Incomplete Fix Denial of Service Vulnerability
4340| [100611] Apache Struts CVE-2017-9793 Denial of Service Vulnerability
4341| [100609] Apache Struts CVE-2017-9805 Remote Code Execution Vulnerability
4342| [100587] Apache Atlas CVE-2017-3155 Cross Frame Scripting Vulnerability
4343| [100581] Apache Atlas CVE-2017-3154 Information Disclosure Vulnerability
4344| [100578] Apache Atlas CVE-2017-3153 Cross Site Scripting Vulnerability
4345| [100577] Apache Atlas CVE-2017-3152 Cross Site Scripting Vulnerability
4346| [100547] Apache Atlas CVE-2017-3151 HTML Injection Vulnerability
4347| [100536] Apache Atlas CVE-2017-3150 Cross Site Scripting Vulnerability
4348| [100449] Apache Pony Mail CVE-2016-4460 Authentication Bypass Vulnerability
4349| [100447] Apache2Triad Multiple Security Vulnerabilities
4350| [100284] Apache Sling Servlets Post CVE-2017-9802 Cross Site Scripting Vulnerability
4351| [100280] Apache Tomcat CVE-2017-7674 Security Bypass Vulnerability
4352| [100259] Apache Subversion CVE-2017-9800 Remote Command Execution Vulnerability
4353| [100256] Apache Tomcat CVE-2017-7675 Directory Traversal Vulnerability
4354| [100235] Apache Storm CVE-2017-9799 Remote Code Execution Vulnerability
4355| [100082] Apache Commons Email CVE-2017-9801 SMTP Header Injection Vulnerability
4356| [99873] Apache Sling XSS Protection API CVE-2016-6798 XML External Entity Injection Vulnerability
4357| [99870] Apache Sling API CVE-2016-5394 Cross Site Scripting Vulnerability
4358| [99603] Apache Spark CVE-2017-7678 Cross Site Scripting Vulnerability
4359| [99592] Apache OpenMeetings CVE-2017-7685 Security Bypass Vulnerability
4360| [99587] Apache OpenMeetings CVE-2017-7673 Security Bypass Vulnerability
4361| [99586] Apache OpenMeetings CVE-2017-7688 Security Bypass Vulnerability
4362| [99584] Apache OpenMeetings CVE-2017-7684 Denial of Service Vulnerability
4363| [99577] Apache OpenMeetings CVE-2017-7663 Cross Site Scripting Vulnerability
4364| [99576] Apache OpenMeetings CVE-2017-7664 XML External Entity Injection Vulnerability
4365| [99569] Apache HTTP Server CVE-2017-9788 Memory Corruption Vulnerability
4366| [99568] Apache HTTP Server CVE-2017-9789 Denial of Service Vulnerability
4367| [99563] Apache Struts CVE-2017-7672 Denial of Service Vulnerability
4368| [99562] Apache Struts Spring AOP Functionality Denial of Service Vulnerability
4369| [99509] Apache Impala CVE-2017-5652 Information Disclosure Vulnerability
4370| [99508] Apache IMPALA CVE-2017-5640 Authentication Bypass Vulnerability
4371| [99486] Apache Traffic Control CVE-2017-7670 Denial of Service Vulnerability
4372| [99485] Apache Solr CVE-2017-7660 Security Bypass Vulnerability
4373| [99484] Apache Struts CVE-2017-9791 Remote Code Execution Vulnerability
4374| [99292] Apache Ignite CVE-2017-7686 Information Disclosure Vulnerability
4375| [99170] Apache HTTP Server CVE-2017-7679 Buffer Overflow Vulnerability
4376| [99137] Apache HTTP Server CVE-2017-7668 Denial of Service Vulnerability
4377| [99135] Apache HTTP Server CVE-2017-3167 Authentication Bypass Vulnerability
4378| [99134] Apache HTTP Server CVE-2017-3169 Denial of Service Vulnerability
4379| [99132] Apache HTTP Server CVE-2017-7659 Denial of Service Vulnerability
4380| [99112] Apache Thrift CVE-2015-3254 Denial of Service Vulnerability
4381| [99067] Apache Ranger CVE-2016-8751 HTML Injection Vulnerability
4382| [99018] Apache NiFi CVE-2017-7667 Cross Frame Scripting Vulnerability
4383| [99009] Apache NiFi CVE-2017-7665 Cross Site Scripting Vulnerability
4384| [98961] Apache Ranger CVE-2017-7677 Security Bypass Vulnerability
4385| [98958] Apache Ranger CVE-2017-7676 Security Bypass Vulnerability
4386| [98888] Apache Tomcat CVE-2017-5664 Security Bypass Vulnerability
4387| [98814] Apache Zookeeper CVE-2017-5637 Denial of Service Vulnerability
4388| [98795] Apache Hadoop CVE-2017-7669 Remote Privilege Escalation Vulnerability
4389| [98739] Apache Knox CVE-2017-5646 User Impersonation Vulnerability
4390| [98669] Apache Hive CVE-2016-3083 Security Bypass Vulnerability
4391| [98646] Apache Atlas CVE-2016-8752 Information Disclosure Vulnerability
4392| [98570] Apache Archiva CVE-2017-5657 Multiple Cross-Site Request Forgery Vulnerabilities
4393| [98489] Apache CXF Fediz CVE-2017-7661 Multiple Cross Site Request Forgery Vulnerabilities
4394| [98485] Apache CXF Fediz CVE-2017-7662 Cross Site Request Forgery Vulnerability
4395| [98466] Apache Ambari CVE-2017-5655 Insecure Temporary File Handling Vulnerability
4396| [98365] Apache Cordova For Android CVE-2016-6799 Information Disclosure Vulnerability
4397| [98025] Apache Hadoop CVE-2017-3161 Cross Site Scripting Vulnerability
4398| [98017] Apache Hadoop CVE-2017-3162 Input Validation Vulnerability
4399| [97971] Apache CXF CVE-2017-5656 Information Disclosure Vulnerability
4400| [97968] Apache CXF CVE-2017-5653 Spoofing Vulnerability
4401| [97967] Apache ActiveMQ CVE-2015-7559 Denial of Service Vulnerability
4402| [97949] Apache Traffic Server CVE-2017-5659 Denial of Service Vulnerability
4403| [97948] Apache Batik CVE-2017-5662 XML External Entity Information Disclosure Vulnerability
4404| [97947] Apache FOP CVE-2017-5661 XML External Entity Information Disclosure Vulnerability
4405| [97945] Apache Traffic Server CVE-2016-5396 Denial of Service Vulnerability
4406| [97702] Apache Log4j CVE-2017-5645 Remote Code Execution Vulnerability
4407| [97582] Apache CXF CVE-2016-6812 Cross Site Scripting Vulnerability
4408| [97579] Apache CXF JAX-RS CVE-2016-8739 XML External Entity Injection Vulnerability
4409| [97544] Apache Tomcat CVE-2017-5651 Information Disclosure Vulnerability
4410| [97531] Apache Tomcat CVE-2017-5650 Denial of Service Vulnerability
4411| [97530] Apache Tomcat CVE-2017-5648 Information Disclosure Vulnerability
4412| [97509] Apache Ignite CVE-2016-6805 Information Disclosure and XML External Entity Injection Vulnerabilities
4413| [97383] Apache Flex BlazeDS CVE-2017-5641 Remote Code Execution Vulnerability
4414| [97378] Apache Geode CVE-2017-5649 Information Disclosure Vulnerability
4415| [97229] Apache Ambari CVE-2016-4976 Local Information Disclosure Vulnerability
4416| [97226] Apache Camel CVE-2017-5643 Server Side Request Forgery Security Bypass Vulnerability
4417| [97184] Apache Ambari CVE-2016-6807 Remote Command Execution Vulnerability
4418| [97179] Apache Camel CVE-2016-8749 Java Deserialization Multiple Remote Code Execution Vulnerabilities
4419| [96983] Apache POI CVE-2017-5644 Denial Of Service Vulnerability
4420| [96895] Apache Tomcat CVE-2016-8747 Information Disclosure Vulnerability
4421| [96731] Apache NiFi CVE-2017-5636 Remote Code Injection Vulnerability
4422| [96730] Apache NiFi CVE-2017-5635 Security Bypass Vulnerability
4423| [96729] Apache Struts CVE-2017-5638 Remote Code Execution Vulnerability
4424| [96540] IBM Development Package for Apache Spark CVE-2016-4970 Denial of Service Vulnerability
4425| [96398] Apache CXF CVE-2017-3156 Information Disclosure Vulnerability
4426| [96321] Apache Camel CVE-2017-3159 Remote Code Execution Vulnerability
4427| [96293] Apache Tomcat 'http11/AbstractInputBuffer.java' Denial of Service Vulnerability
4428| [96228] Apache Brooklyn Cross Site Request Forgery and Multiple Cross Site Scripting Vulnerabilities
4429| [95998] Apache Ranger CVE-2016-8746 Security Bypass Vulnerability
4430| [95929] Apache Groovy CVE-2016-6497 Information Disclosure Vulnerability
4431| [95838] Apache Cordova For Android CVE-2017-3160 Man in the Middle Security Bypass Vulnerability
4432| [95675] Apache Struts Remote Code Execution Vulnerability
4433| [95621] Apache NiFi CVE-2106-8748 Cross Site Scripting Vulnerability
4434| [95429] Apache Groovy CVE-2016-6814 Remote Code Execution Vulnerability
4435| [95335] Apache Hadoop CVE-2016-3086 Information Disclosure Vulnerability
4436| [95168] Apache Wicket CVE-2016-6793 Denial of Service Vulnerability
4437| [95136] Apache Qpid Broker for Java CVE-2016-8741 Remote Information Disclosure Vulnerability
4438| [95078] Apache HTTP Server CVE-2016-0736 Remote Security Vulnerability
4439| [95077] Apache HTTP Server CVE-2016-8743 Security Bypass Vulnerability
4440| [95076] Apache HTTP Server CVE-2016-2161 Denial of Service Vulnerability
4441| [95020] Apache Tika CVE-2015-3271 Remote Information Disclosure Vulnerability
4442| [94950] Apache Hadoop CVE-2016-5001 Local Information Disclosure Vulnerability
4443| [94882] Apache ActiveMQ CVE-2016-6810 HTML Injection Vulnerability
4444| [94828] Apache Tomcat CVE-2016-8745 Information Disclosure Vulnerability
4445| [94766] Apache CouchDB CVE-2016-8742 Local Privilege Escalation Vulnerability
4446| [94657] Apache Struts CVE-2016-8738 Denial of Service Vulnerability
4447| [94650] Apache HTTP Server CVE-2016-8740 Denial of Service Vulnerability
4448| [94588] Apache Subversion CVE-2016-8734 XML External Entity Denial of Service Vulnerability
4449| [94513] Apache Karaf CVE-2016-8648 Remote Code Execution Vulnerability
4450| [94463] Apache Tomcat CVE-2016-8735 Remote Code Execution Vulnerability
4451| [94462] Apache Tomcat CVE-2016-6817 Denial of Service Vulnerability
4452| [94461] Apache Tomcat CVE-2016-6816 Security Bypass Vulnerability
4453| [94418] Apache OpenOffice CVE-2016-6803 Local Privilege Escalation Vulnerability
4454| [94247] Apache Tika CVE-2016-6809 Remote Code Execution Vulnerability
4455| [94221] Apache Ranger CVE-2016-6815 Local Privilege Escalation Vulnerability
4456| [94145] Apache OpenMeetings CVE-2016-8736 Remote Code Execution Vulnerability
4457| [93945] Apache CloudStack CVE-2016-6813 Authorization Bypass Vulnerability
4458| [93944] Apache Tomcat Security Manager CVE-2016-6796 Security Bypass Vulnerability
4459| [93943] Apache Tomcat CVE-2016-6794 Security Bypass Vulnerability
4460| [93942] Apache Tomcat Security Manager CVE-2016-5018 Security Bypass Vulnerability
4461| [93940] Apache Tomcat CVE-2016-6797 Security Bypass Vulnerability
4462| [93939] Apache Tomcat CVE-2016-0762 Information Disclosure Vulnerability
4463| [93774] Apache OpenOffice CVE-2016-6804 DLL Loading Remote Code Execution Vulnerability
4464| [93773] Apache Struts CVE-2016-6795 Directory Traversal Vulnerability
4465| [93478] Apache Tomcat CVE-2016-6325 Local Privilege Escalation Vulnerability
4466| [93472] Apache Tomcat CVE-2016-5425 Insecure File Permissions Vulnerability
4467| [93429] Apache Tomcat JK Connector CVE-2016-6808 Remote Buffer Overflow Vulnerability
4468| [93263] Apache Tomcat CVE-2016-1240 Local Privilege Escalation Vulnerability
4469| [93236] Apache MyFaces Trinidad CVE-2016-5019 Remote Code Execution Vulnerability
4470| [93142] Apache ActiveMQ Artemis CVE-2016-4978 Remote Code Execution Vulnerability
4471| [93132] Apache Derby CVE-2015-1832 XML External Entity Information Disclosure Vulnerability
4472| [93044] Apache Zookeeper CVE-2016-5017 Buffer Overflow Vulnerability
4473| [92966] Apache Jackrabbit CVE-2016-6801 Cross-Site Request Forgery Vulnerability
4474| [92947] Apache Shiro CVE-2016-6802 Remote Security Bypass Vulnerability
4475| [92905] Apache CXF Fediz CVE-2016-4464 Security Bypass Vulnerability
4476| [92577] Apache Ranger CVE-2016-5395 HTML Injection Vulnerability
4477| [92331] Apache HTTP Server CVE-2016-1546 Remote Denial of Service Vulnerability
4478| [92328] Apache Hive CVE-2016-0760 Multiple Remote Code Execution Vulnerabilities
4479| [92320] Apache APR-util and httpd CVE-2016-6312 Denial of Service Vulnerability
4480| [92100] Apache POI CVE-2016-5000 XML External Entity Injection Vulnerability
4481| [92079] Apache OpenOffice CVE-2016-1513 Remote Code Execution Vulnerability
4482| [91818] Apache Tomcat CVE-2016-5388 Security Bypass Vulnerability
4483| [91816] Apache HTTP Server CVE-2016-5387 Security Bypass Vulnerability
4484| [91788] Apache Qpid Proton CVE-2016-4467 Certificate Verification Security Bypass Vulnerability
4485| [91738] Apache XML-RPC CVE-2016-5003 Remote Code Execution Vulnerability
4486| [91736] Apache XML-RPC Multiple Security Vulnerabilities
4487| [91707] Apache Archiva CVE-2016-5005 HTML Injection Vulnerability
4488| [91703] Apache Archiva CVE-2016-4469 Multiple Cross-Site Request Forgery Vulnerabilities
4489| [91566] Apache HTTP Server CVE-2016-4979 Authentication Bypass Vulnerability
4490| [91537] Apache QPID CVE-2016-4974 Deserialization Security Bypass Vulnerability
4491| [91501] Apache Xerces-C CVE-2016-4463 Stack Buffer Overflow Vulnerability
4492| [91453] Apache Commons FileUpload CVE-2016-3092 Denial Of Service Vulnerability
4493| [91284] Apache Struts CVE-2016-4431 Security Bypass Vulnerability
4494| [91282] Apache Struts CVE-2016-4433 Security Bypass Vulnerability
4495| [91281] Apache Struts CVE-2016-4430 Cross-Site Request Forgery Vulnerability
4496| [91280] Apache Struts CVE-2016-4436 Security Bypass Vulnerability
4497| [91278] Apache Struts CVE-2016-4465 Denial of Service Vulnerability
4498| [91277] Apache Struts Incomplete Fix Remote Code Execution Vulnerability
4499| [91275] Apache Struts CVE-2016-4438 Remote Code Execution Vulnerability
4500| [91217] Apache Continuum 'saveInstallation.action' Command Execution Vulnerability
4501| [91141] Apache CloudStack CVE-2016-3085 Authentication Bypass Vulnerability
4502| [91068] Apache Struts CVE-2016-1181 Remote Code Execution Vulnerability
4503| [91067] Apache Struts CVE-2016-1182 Security Bypass Vulnerability
4504| [91024] Apache Shiro CVE-2016-4437 Information Disclosure Vulnerability
4505| [90988] Apache Ranger CVE-2016-2174 SQL Injection Vulnerability
4506| [90961] Apache Struts CVE-2016-3093 Denial of Service Vulnerability
4507| [90960] Apache Struts CVE-2016-3087 Remote Code Execution Vulnerability
4508| [90921] Apache Qpid CVE-2016-4432 Authentication Bypass Vulnerability
4509| [90920] Apache Qpid CVE-2016-3094 Denial of Service Vulnerability
4510| [90902] Apache PDFBox CVE-2016-2175 XML External Entity Injection Vulnerability
4511| [90897] Apache Tika CVE-2016-4434 XML External Entity Injection Vulnerability
4512| [90827] Apache ActiveMQ CVE-2016-3088 Multiple Arbitrary File Upload Vulnerabilities
4513| [90755] Apache Ambari CVE-2016-0707 Multiple Local Information Disclosure Vulnerabilities
4514| [90482] Apache CVE-2004-1387 Local Security Vulnerability
4515| [89762] Apache CVE-2001-1556 Remote Security Vulnerability
4516| [89417] Apache Subversion CVE-2016-2167 Authentication Bypass Vulnerability
4517| [89326] RETIRED: Apache Subversion CVE-2016-2167 Security Bypass Vulnerability
4518| [89320] Apache Subversion CVE-2016-2168 Remote Denial of Service Vulnerability
4519| [88826] Apache Struts CVE-2016-3082 Remote Code Execution Vulnerability
4520| [88797] Apache Cordova For iOS CVE-2015-5208 Arbitrary Code Execution Vulnerability
4521| [88764] Apache Cordova iOS CVE-2015-5207 Multiple Security Bypass Vulnerabilities
4522| [88701] Apache CVE-2001-1449 Remote Security Vulnerability
4523| [88635] Apache CVE-2000-1204 Remote Security Vulnerability
4524| [88590] Apache WWW server CVE-1999-1199 Denial-Of-Service Vulnerability
4525| [88496] Apache CVE-2000-1206 Remote Security Vulnerability
4526| [87828] Apache CVE-1999-1237 Remote Security Vulnerability
4527| [87784] Apache CVE-1999-1293 Denial-Of-Service Vulnerability
4528| [87327] Apache Struts CVE-2016-3081 Remote Code Execution Vulnerability
4529| [86622] Apache Stats CVE-2007-0975 Remote Security Vulnerability
4530| [86399] Apache CVE-2007-1743 Local Security Vulnerability
4531| [86397] Apache CVE-2007-1742 Local Security Vulnerability
4532| [86311] Apache Struts CVE-2016-4003 Cross Site Scripting Vulnerability
4533| [86174] Apache Wicket CVE-2015-5347 Cross Site Scripting Vulnerability
4534| [85971] Apache OFBiz CVE-2016-2170 Java Deserialization Remote Code Execution Vulnerability
4535| [85967] Apache OFBiz CVE-2015-3268 HTML Injection Vulnerability
4536| [85759] Apache Jetspeed CVE-2016-2171 Unauthorized Access Vulnerability
4537| [85758] Apache Jetspeed CVE-2016-0712 Cross Site Scripting Vulnerability
4538| [85756] Apache Jetspeed CVE-2016-0710 Multiple SQL Injection Vulnerabilities
4539| [85755] Apache Jetspeed CVE-2016-0711 Mulitple HTML Injection Vulnerabilities
4540| [85754] Apache Jetspeed CVE-2016-0709 Directory Traversal Vulnerability
4541| [85730] Apache Subversion CVE-2015-5343 Integer Overflow Vulnerability
4542| [85691] Apache Ranger CVE-2016-0735 Security Bypass Vulnerability
4543| [85578] Apache ActiveMQ CVE-2010-1244 Cross-Site Request Forgery Vulnerability
4544| [85554] Apache OpenMeetings CVE-2016-2164 Multiple Information Disclosure Vulnerabilities
4545| [85553] Apache OpenMeetings CVE-2016-0783 Information Disclosure Vulnerability
4546| [85552] Apache OpenMeetings CVE-2016-2163 HTML Injection Vulnerability
4547| [85550] Apache OpenMeetings CVE-2016-0784 Directory Traversal Vulnerability
4548| [85386] Apache Hadoop CVE-2015-7430 Local Privilege Escalation Vulnerability
4549| [85377] Apache Qpid Proton Python API CVE-2016-2166 Man in the Middle Security Bypass Vulnerability
4550| [85205] Apache Solr CVE-2015-8796 Cross Site Scripting Vulnerability
4551| [85203] Apache Solr CVE-2015-8795 Mulitple HTML Injection Vulnerabilities
4552| [85163] Apache Geronimo CVE-2008-0732 Local Security Vulnerability
4553| [85131] Apache Struts 'TextParseUtil.translateVariables()' Method Remote Code Execution Vulnerability
4554| [85070] Apache Struts CVE-2016-2162 Cross Site Scripting Vulnerability
4555| [85066] Apache Struts CVE-2016-0785 Remote Code Execution Vulnerability
4556| [84422] Apache TomEE CVE-2016-0779 Unspecified Security Vulnerability
4557| [84321] Apache ActiveMQ CVE-2016-0734 Clickjacking Vulnerability
4558| [84316] Apache ActiveMQ CVE-2016-0782 Multiple Cross Site Scripting Vulnerabilities
4559| [83910] Apache Wicket CVE-2015-7520 Cross Site Scripting Vulnerability
4560| [83423] Apache Xerces-C CVE-2016-0729 Buffer Overflow Vulnerability
4561| [83330] Apache Tomcat CVE-2015-5351 Cross Site Request Forgery Vulnerability
4562| [83329] Apache Tomcat CVE-2015-5174 Directory Traversal Vulnerability
4563| [83328] Apache Tomcat CVE-2015-5345 Directory Traversal Vulnerability
4564| [83327] Apache Tomcat Security Manager CVE-2016-0714 Remote Code Execution Vulnerability
4565| [83326] Apache Tomcat CVE-2016-0763 Security Bypass Vulnerability
4566| [83324] Apache Tomcat Security Manager CVE-2016-0706 Information Disclosure Vulnerability
4567| [83323] Apache Tomcat CVE-2015-5346 Session Fixation Vulnerability
4568| [83259] Apache Hadoop CVE-2015-1776 Information Disclosure Vulnerability
4569| [83243] Apache Solr CVE-2015-8797 Cross Site Scripting Vulnerability
4570| [83119] Apache Sling CVE-2016-0956 Information Disclosure Vulnerability
4571| [83002] Apache CVE-2000-1205 Cross-Site Scripting Vulnerability
4572| [82871] Apache Ranger Authentication Bypass and Security Bypass Vulnerabilities
4573| [82800] Apache CloudStack CVE-2015-3251 Information Disclosure Vulnerability
4574| [82798] Apache CloudStack CVE-2015-3252 Authentication Bypass Vulnerability
4575| [82732] Apache Gallery CVE-2003-0771 Local Security Vulnerability
4576| [82676] Apache CVE-2003-1581 Cross-Site Scripting Vulnerability
4577| [82550] Apache Struts CVE-2015-5209 Security Bypass Vulnerability
4578| [82300] Apache Subversion CVE-2015-5259 Integer Overflow Vulnerability
4579| [82260] Apache Camel CVE-2015-5344 Remote Code Execution Vulnerability
4580| [82234] Apache Hive CVE-2015-7521 Security Bypass Vulnerability
4581| [82082] Apache CVE-1999-0289 Remote Security Vulnerability
4582| [81821] Apache Distribution for Solaris CVE-2007-2080 SQL-Injection Vulnerability
4583| [80696] Apache Camel CVE-2015-5348 Information Disclosure Vulnerability
4584| [80525] Apache CVE-2003-1580 Remote Security Vulnerability
4585| [80354] Drupal Apache Solr Search Module Access Bypass Vulnerability
4586| [80193] Apache CVE-1999-0107 Denial-Of-Service Vulnerability
4587| [79812] Apache Directory Studio CVE-2015-5349 Command Injection Vulnerability
4588| [79744] Apache HBase CVE-2015-1836 Unauthorized Access Vulnerability
4589| [79204] Apache TomEE 'EjbObjectInputStream' Remote Code Execution Vulnerability
4590| [77679] Apache Cordova For Android CVE-2015-8320 Weak Randomization Security Bypass Vulnerability
4591| [77677] Apache Cordova For Android CVE-2015-5256 Security Bypass Vulnerability
4592| [77591] Apache CXF SAML SSO Processing CVE-2015-5253 Security Bypass Vulnerability
4593| [77521] Apache Commons Collections 'InvokerTransformer.java' Remote Code Execution Vulnerability
4594| [77110] Apache HttpComponents HttpClient CVE-2015-5262 Denial of Service Vulnerability
4595| [77086] Apache Ambari CVE-2015-1775 Server Side Request Forgery Security Bypass Vulnerability
4596| [77085] Apache Ambari CVE-2015-3270 Remote Privilege Escalation Vulnerability
4597| [77082] Apache Ambari 'targetURI' Parameter Open Redirection Vulnerability
4598| [77059] Apache Ambari CVE-2015-3186 Cross Site Scripting Vulnerability
4599| [76933] Apache James Server Unspecified Command Execution Vulnerability
4600| [76832] Apache cordova-plugin-file-transfer CVE-2015-5204 HTTP Header Injection Vulnerability
4601| [76625] Apache Struts CVE-2015-5169 Cross Site Scripting Vulnerability
4602| [76624] Apache Struts CVE-2015-2992 Cross Site Scripting Vulnerability
4603| [76522] Apache Tapestry CVE-2014-1972 Security Bypass Vulnerability
4604| [76486] Apache CXF Fediz CVE-2015-5175 Denial of Service Vulnerability
4605| [76452] Apache ActiveMQ CVE-2015-1830 Directory Traversal Vulnerability
4606| [76446] Apache Subversion 'libsvn_fs_fs/tree.c' Denial of Service Vulnerability
4607| [76274] Apache Subversion CVE-2015-3184 Information Disclosure Vulnerability
4608| [76273] Apache Subversion CVE-2015-3187 Information Disclosure Vulnerability
4609| [76272] Apache ActiveMQ CVE-2014-3576 Denial of Service Vulnerability
4610| [76221] Apache Ranger CVE-2015-0266 Access Bypass Vulnerability
4611| [76208] Apache Ranger CVE-2015-0265 JavaScript Code Injection Vulnerability
4612| [76025] Apache ActiveMQ Artemis CVE-2015-3208 XML External Entity Information Disclosure Vulnerability
4613| [75965] Apache HTTP Server CVE-2015-3185 Security Bypass Vulnerability
4614| [75964] Apache HTTP Server CVE-2015-0253 Remote Denial of Service Vulnerability
4615| [75963] Apache HTTP Server CVE-2015-3183 Security Vulnerability
4616| [75940] Apache Struts CVE-2015-1831 Security Bypass Vulnerability
4617| [75919] Apache Groovy CVE-2015-3253 Remote Code Execution Vulnerability
4618| [75338] Apache Storm CVE-2015-3188 Remote Code Execution Vulnerability
4619| [75275] Drupal Apache Solr Real-Time Module Access Bypass Vulnerability
4620| [74866] Apache Cordova For Android CVE-2015-1835 Security Bypass Vulnerability
4621| [74839] Apache Sling API and Sling Servlets CVE-2015-2944 Cross Site Scripting Vulnerability
4622| [74761] Apache Jackrabbit CVE-2015-1833 XML External Entity Information Disclosure Vulnerability
4623| [74686] Apache Ambari '/var/lib/ambari-server/ambari-env.sh' Local Privilege Escalation Vulnerability
4624| [74665] Apache Tomcat CVE-2014-7810 Security Bypass Vulnerability
4625| [74475] Apache Tomcat CVE-2014-0230 Denial of Service Vulnerability
4626| [74423] Apache Struts CVE-2015-0899 Security Bypass Vulnerability
4627| [74338] Apache OpenOffice HWP Filter Memory Corruption Vulnerability
4628| [74265] Apache Tomcat 'mod_jk' CVE-2014-8111 Information Disclosure Vulnerability
4629| [74260] Apache Subversion CVE-2015-0248 Multiple Denial of Service Vulnerabilities
4630| [74259] Apache Subversion 'deadprops.c' Security Bypass Vulnerability
4631| [74204] PHP 'sapi/apache2handler/sapi_apache2.c' Remote Code Execution Vulnerability
4632| [74158] Apache HTTP Server 'protocol.c' Remote Denial of Service Vulnerability
4633| [73954] Apache Flex 'asdoc/templates/index.html' Cross Site Scripting Vulnerability
4634| [73851] Apache2 CVE-2012-0216 Cross-Site Scripting Vulnerability
4635| [73478] Apache Cassandra CVE-2015-0225 Remote Code Execution Vulnerability
4636| [73041] Apache HTTP Server 'mod_lua' Module Denial of Service Vulnerability
4637| [73040] Apache HTTP Server 'mod_lua.c' Local Access Bypass Vulnerability
4638| [72809] Apache Standard Taglibs CVE-2015-0254 XML External Entity Injection Vulnerability
4639| [72717] Apache Tomcat CVE-2014-0227 Chunk Request Remote Denial Of Service Vulnerability
4640| [72557] Apache WSS4J CVE-2015-0227 Security Bypass Vulnerability
4641| [72553] Apache WSS4J CVE-2015-0226 Information Disclosure Vulnerability
4642| [72513] Apache ActiveMQ CVE-2014-3612 LDAP Authentication Bypass Vulnerability
4643| [72511] Apache ActiveMQ CVE-2014-8110 Multiple Cross Site Scripting Vulnerabilities
4644| [72510] Apache ActiveMQ CVE-2014-3600 XML External Entity Injection Vulnerability
4645| [72508] Apache ActiveMQ Apollo CVE-2014-3579 XML External Entity Injection Vulnerability
4646| [72319] Apache Qpid CVE-2015-0223 Security Bypass Vulnerability
4647| [72317] Apache Qpid CVE-2015-0224 Incomplete Fix Multiple Denial of Service Vulnerabilities
4648| [72115] Apache Santuario 'XML Signature Verification' Security Bypass Vulnerability
4649| [72053] Apache HTTP Server 'mod_remoteip.c' IP Address Spoofing Vulnerability
4650| [72030] Apache Qpid CVE-2015-0203 Multiple Denial of Service Vulnerabilities
4651| [71879] Apache Traffic Server 'HttpTransact.cc' Denial of Service Vulnerability
4652| [71726] Apache Subversion CVE-2014-3580 Remote Denial of Service Vulnerability
4653| [71725] Apache Subversion CVE-2014-8108 Remote Denial of Service Vulnerability
4654| [71657] Apache HTTP Server 'mod_proxy_fcgi' Module Denial of Service Vulnerability
4655| [71656] Apache HTTP Server 'mod_cache' Module Denial of Service Vulnerability
4656| [71548] Apache Struts CVE-2014-7809 Security Bypass Vulnerability
4657| [71466] Apache Hadoop CVE-2014-3627 Information Disclosure Vulnerability
4658| [71353] Apache HTTP Server 'LuaAuthzProvider' Authorization Bypass Vulnerability
4659| [71004] Apache Qpid CVE-2014-3629 XML External Entity Injection Vulnerability
4660| [70970] Apache Traffic Server Cross Site Scripting Vulnerability
4661| [70738] Apache CXF CVE-2014-3584 Denial of Service Vulnerability
4662| [70736] Apache CXF SAML SubjectConfirmation Security Bypass Vulnerability
4663| [69728] Apache Tomcat CVE-2013-4444 Arbitrary File Upload Vulnerability
4664| [69648] Apache POI CVE-2014-3574 Denial Of Service Vulnerability
4665| [69647] Apache POI OpenXML parser CVE-2014-3529 XML External Entity Information Disclosure Vulnerability
4666| [69351] Apache OpenOffice Calc CVE-2014-3524 Command Injection Vulnerability
4667| [69295] Apache Axis Incomplete Fix CVE-2014-3596 SSL Certificate Validation Security Bypass Vulnerability
4668| [69286] Apache OFBiz CVE-2014-0232 Multiple Cross Site Scripting Vulnerabilities
4669| [69258] Apache HttpComponents Incomplete Fix CVE-2014-3577 SSL Validation Security Bypass Vulnerability
4670| [69257] Apache HttpComponents Incomplete Fix SSL Certificate Validation Security Bypass Vulnerability
4671| [69248] Apache HTTP Server CVE-2013-4352 Remote Denial of Service Vulnerability
4672| [69237] Apache Subversion CVE-2014-3522 SSL Certificate Validation Information Disclosure Vulnerability
4673| [69173] Apache Traffic Server CVE-2014-3525 Unspecified Security Vulnerability
4674| [69046] Apache Cordova For Android CVE-2014-3502 Information Disclosure Vulnerability
4675| [69041] Apache Cordova For Android CVE-2014-3501 Security Bypass Vulnerability
4676| [69038] Apache Cordova For Android CVE-2014-3500 Security Bypass Vulnerability
4677| [68995] Apache Subversion CVE-2014-3528 Insecure Authentication Weakness
4678| [68966] Apache Subversion 'irkerbridge.py' Local Privilege Escalation Vulnerability
4679| [68965] Apache Subversion 'svnwcsub.py' Local Privilege Escalation Vulnerability
4680| [68863] Apache HTTP Server 'mod_cache' Module Remote Denial of Service Vulnerability
4681| [68747] Apache HTTP Server CVE-2014-3523 Remote Denial of Service Vulnerability
4682| [68745] Apache HTTP Server CVE-2014-0118 Remote Denial of Service Vulnerability
4683| [68742] Apache HTTP Server CVE-2014-0231 Remote Denial of Service Vulnerability
4684| [68740] Apache HTTP Server CVE-2014-0117 Remote Denial of Service Vulnerability
4685| [68678] Apache HTTP Server 'mod_status' CVE-2014-0226 Remote Code Execution Vulnerability
4686| [68445] Apache CXF UsernameToken Information Disclosure Vulnerability
4687| [68441] Apache CXF SAML Tokens Validation Security Bypass Vulnerability
4688| [68431] Apache Syncope CVE-2014-3503 Insecure Password Generation Weakness
4689| [68229] Apache Harmony PRNG Entropy Weakness
4690| [68111] Apache 'mod_wsgi' Module Privilege Escalation Vulnerability
4691| [68072] Apache Tomcat CVE-2014-0186 Remote Denial of Service Vulnerability
4692| [68039] Apache Hive CVE-2014-0228 Security Bypass Vulnerability
4693| [67673] Apache Tomcat CVE-2014-0095 AJP Request Remote Denial Of Service Vulnerability
4694| [67671] Apache Tomcat CVE-2014-0075 Chunk Request Remote Denial Of Service Vulnerability
4695| [67669] Apache Tomcat CVE-2014-0119 XML External Entity Information Disclosure Vulnerability
4696| [67668] Apache Tomcat CVE-2014-0099 Request Processing Information Disclosure Vulnerability
4697| [67667] Apache Tomcat CVE-2014-0096 XML External Entity Information Disclosure Vulnerability
4698| [67534] Apache 'mod_wsgi' Module CVE-2014-0242 Information Disclosure Vulnerability
4699| [67532] Apache 'mod_wsgi' Module Local Privilege Escalation Vulnerability
4700| [67530] Apache Solr Search Template Cross Site Scripting Vulnerability
4701| [67236] Apache CXF CVE-2014-0109 Remote Denial of Service Vulnerability
4702| [67232] Apache CXF CVE-2014-0110 Denial of Service Vulnerability
4703| [67121] Apache Struts ClassLoader Manipulation CVE-2014-0114 Security Bypass Vulnerability
4704| [67081] Apache Struts 'getClass()' Method Security Bypass Vulnerability
4705| [67064] Apache Struts ClassLoader Manipulation Incomplete Fix Security Bypass Vulnerability
4706| [67013] Apache Zookeeper CVE-2014-0085 Local Information Disclosure Vulnerability
4707| [66998] Apache Archiva CVE-2013-2187 Unspecified Cross Site Scripting Vulnerability
4708| [66991] Apache Archiva CVE-2013-2187 HTML Injection Vulnerability
4709| [66927] Apache Syncope CVE-2014-0111 Remote Code Execution Vulnerability
4710| [66474] Apache CouchDB Universally Unique IDentifier (UUID) Remote Denial of Service Vulnerability
4711| [66397] Apache Xalan-Java Library CVE-2014-0107 Security Bypass Vulnerability
4712| [66303] Apache HTTP Server Multiple Denial of Service Vulnerabilities
4713| [66041] RETIRED: Apache Struts CVE-2014-0094 Classloader Manipulation Security Bypass Vulnerability
4714| [65999] Apache Struts ClassLoader Manipulation CVE-2014-0094 Security Bypass Vulnerability
4715| [65967] Apache Cordova File-Transfer Unspecified Security Vulnerability
4716| [65959] Apache Cordova InAppBrowser Remote Privilege Escalation Vulnerability
4717| [65935] Apache Shiro 'login.jsp' Authentication Bypass Vulnerability
4718| [65902] Apache Camel CVE-2014-0003 Remote Code Execution Vulnerability
4719| [65901] Apache Camel CVE-2014-0002 XML External Entity Information Disclosure Vulnerability
4720| [65773] Apache Tomcat CVE-2013-4286 Security Bypass Vulnerability
4721| [65769] Apache Tomcat CVE-2014-0033 Session Fixation Vulnerability
4722| [65768] Apache Tomcat CVE-2013-4590 XML External Entity Information Disclosure Vulnerability
4723| [65767] Apache Tomcat CVE-2013-4322 Incomplete Fix Denial of Service Vulnerability
4724| [65615] Apache ActiveMQ 'refresh' Parameter Cross Site Scripting Vulnerability
4725| [65434] Apache Subversion 'mod_dav_svn' Module SVNListParentPath Denial of Service Vulnerability
4726| [65431] Apache Wicket CVE-2013-2055 Information Disclosure Vulnerability
4727| [65400] Apache Commons FileUpload CVE-2014-0050 Denial Of Service Vulnerability
4728| [64782] Apache CloudStack Virtual Router Component Security Bypass Vulnerability
4729| [64780] Apache CloudStack Unauthorized Access Vulnerability
4730| [64617] Apache Libcloud Digital Ocean API Local Information Disclosure Vulnerability
4731| [64437] Apache Santuario XML Security For JAVA XML Signature Denial of Service Vulnerability
4732| [64427] Apache Solr Multiple XML External Entity Injection Vulnerabilities
4733| [64009] Apache Solr CVE-2013-6408 XML External Entity Injection Vulnerability
4734| [64008] Apache Solr CVE-2013-6407 XML External Entity Injection Vulnerability
4735| [63981] Apache Subversion 'mod_dav_svn' Module Denial of Service Vulnerability
4736| [63966] Apache Subversion CVE-2013-4505 Security Bypass Vulnerability
4737| [63963] Apache Roller CVE-2013-4171 Cross Site Scripting Vulnerability
4738| [63935] Apache Solr 'SolrResourceLoader' Directory Traversal Vulnerability
4739| [63928] Apache Roller CVE-2013-4212 OGNL Expression Injection Remote Code Execution Vulnerability
4740| [63515] Apache Tomcat Manager Component CVE-2013-6357 Cross Site Request Forgery Vulnerability
4741| [63403] Apache Struts Multiple Cross Site Scripting Vulnerabilities
4742| [63400] Apache 'mod_pagespeed' Module Unspecified Cross Site Scripting Vulnerability
4743| [63260] Apache Shindig CVE-2013-4295 XML External Entity Information Disclosure Vulnerability
4744| [63241] Apache Sling 'AbstractAuthenticationFormServlet' Open Redirection Vulnerability
4745| [63174] Apache Commons FileUpload 'DiskFileItem' Class Null Byte Arbitrary File Write Vulnerability
4746| [62939] Apache 'mod_fcgid' Module CVE-2013-4365 Heap Buffer Overflow Vulnerability
4747| [62903] Apache Sling 'deepGetOrCreateNode()' Function Denial Of Service Vulnerability
4748| [62706] Apache Camel CVE-2013-4330 Information Disclosure Vulnerability
4749| [62677] Apache 'mod_accounting' Module CVE-2013-5697 SQL Injection Vulnerability
4750| [62674] TYPO3 Apache Solr Unspecified Cross Site Scripting and PHP Code Execution Vulnerabilities
4751| [62587] Apache Struts CVE-2013-4316 Remote Code Execution Vulnerability
4752| [62584] Apache Struts CVE-2013-4310 Security Bypass Vulnerability
4753| [62266] Apache Subversion CVE-2013-4277 Insecure Temporary File Creation Vulnerability
4754| [61984] Apache Hadoop RPC Authentication CVE-2013-2192 Man in the Middle Security Bypass Vulnerability
4755| [61981] Apache HBase RPC Authentication Man In The Middle Security Bypass Vulnerability
4756| [61638] Apache CloudStack CVE-2013-2136 Multiple Cross Site Scripting Vulnerabilities
4757| [61454] Apache Subversion CVE-2013-4131 Denial Of Service Vulnerability
4758| [61379] Apache HTTP Server CVE-2013-2249 Unspecified Remote Security Vulnerability
4759| [61370] Apache OFBiz CVE-2013-2317 'View Log' Cross Site Scripting Vulnerability
4760| [61369] Apache OFBiz Nested Expression Remote Code Execution Vulnerability
4761| [61196] Apache Struts CVE-2013-2248 Multiple Open Redirection Vulnerabilities
4762| [61189] Apache Struts CVE-2013-2251 Multiple Remote Command Execution Vulnerabilities
4763| [61129] Apache HTTP Server CVE-2013-1896 Remote Denial of Service Vulnerability
4764| [61030] Apache CXF CVE-2013-2160 Multiple Remote Denial of Service Vulnerabilities
4765| [60875] Apache Geronimo RMI Classloader Security Bypass Vulnerability
4766| [60846] Apache Santuario XML Security for JAVA XML Signature CVE-2013-2172 Security Bypass Vulnerability
4767| [60817] Apache Santuario XML Security for C++ CVE-2013-2210 Heap Buffer Overflow Vulnerability
4768| [60800] Apache Qpid Python Client SSL Certificate Verification Information Disclosure Vulnerability
4769| [60599] Apache Santuario XML Security for C++ CVE-2013-2156 Remote Heap Buffer Overflow Vulnerability
4770| [60595] Apache Santuario XML Security for C++ XML Signature CVE-2013-2155 Denial of Service Vulnerability
4771| [60594] Apache Santuario XML Security for C++ CVE-2013-2154 Stack Buffer Overflow Vulnerability
4772| [60592] Apache Santuario XML Security for C++ XML Signature CVE-2013-2153 Security Bypass Vulnerability
4773| [60534] Apache OpenJPA Object Deserialization Arbitrary File Creation or Overwrite Vulnerability
4774| [60346] Apache Struts CVE-2013-2134 OGNL Expression Injection Vulnerability
4775| [60345] Apache Struts CVE-2013-2135 OGNL Expression Injection Vulnerability
4776| [60267] Apache Subversion CVE-2013-1968 Remote Denial of Service Vulnerability
4777| [60265] Apache Subversion CVE-2013-2088 Command Injection Vulnerability
4778| [60264] Apache Subversion CVE-2013-2112 Remote Denial of Service Vulnerability
4779| [60187] Apache Tomcat DIGEST Authentication CVE-2013-2051 Incomplete Fix Security Weakness
4780| [60186] Apache Tomcat CVE-2013-1976 Insecure Temporary File Handling Vulnerability
4781| [60167] Apache Struts 'includeParams' CVE-2013-2115 Incomplete Fix Security Bypass Vulnerability
4782| [60166] Apache Struts 'includeParams' CVE-2013-1966 Security Bypass Vulnerability
4783| [60082] Apache Struts 'ParameterInterceptor' Class OGNL CVE-2013-1965 Security Bypass Vulnerability
4784| [59826] Apache HTTP Server Terminal Escape Sequence in Logs Command Injection Vulnerability
4785| [59799] Apache Tomcat CVE-2013-2067 Session Fixation Vulnerability
4786| [59798] Apache Tomcat CVE-2013-2071 Information Disclosure Vulnerability
4787| [59797] Apache Tomcat CVE-2012-3544 Denial of Service Vulnerability
4788| [59670] Apache VCL Multiple Input Validation Vulnerabilities
4789| [59464] Apache CloudStack CVE-2013-2758 Hash Information Disclosure Vulnerability
4790| [59463] Apache CloudStack CVE-2013-2756 Authentication Bypass Vulnerability
4791| [59402] Apache ActiveMQ CVE-2013-3060 Information Disclosure and Denial of Service Vulnerability
4792| [59401] Apache ActiveMQ CVE-2012-6551 Denial of Service Vulnerability
4793| [59400] Apache ActiveMQ CVE-2012-6092 Multiple Cross Site Scripting Vulnerabilities
4794| [58898] Apache Subversion CVE-2013-1884 Remote Denial of Service Vulnerability
4795| [58897] Apache Subversion 'mod_dav_svn/lock.c' Remote Denial of Service Vulnerability
4796| [58895] Apache Subversion 'mod_dav_svn' Remote Denial of Service Vulnerability
4797| [58455] Apache Rave User RPC API CVE-2013-1814 Information Disclosure Vulnerability
4798| [58379] Apache Qpid CVE-2012-4446 Authentication Bypass Vulnerability
4799| [58378] Apache Qpid CVE-2012-4460 Denial of Service Vulnerability
4800| [58376] Apache Qpid CVE-2012-4458 Denial of Service Vulnerability
4801| [58337] Apache Qpid CVE-2012-4459 Denial of Service Vulnerability
4802| [58326] Apache Commons FileUpload CVE-2013-0248 Insecure Temporary File Creation Vulnerability
4803| [58325] Debian Apache HTTP Server CVE-2013-1048 Symlink Attack Local Privilege Escalation Vulnerability
4804| [58323] Apache Subversion 'svn_fs_file_length()' Remote Denial of Service Vulnerability
4805| [58165] Apache HTTP Server Multiple Cross Site Scripting Vulnerabilities
4806| [58136] Apache Maven CVE-2013-0253 SSL Certificate Validation Security Bypass Vulnerability
4807| [58124] Apache Tomcat 'log/logdir' Directory Insecure File Permissions Vulnerability
4808| [58073] Apache Commons HttpClient CVE-2012-5783 SSL Certificate Validation Security Bypass Vulnerability
4809| [57876] Apache CXF WS-SecurityPolicy Authentication Bypass Vulnerability
4810| [57874] Apache CXF CVE-2012-5633 Security Bypass Vulnerability
4811| [57463] Apache OFBiz CVE-2013-0177 Multiple Cross Site Scripting Vulnerabilities
4812| [57425] Apache CXF CVE-2012-5786 SSL Certificate Validation Security Bypass Vulnerability
4813| [57321] Apache CouchDB CVE-2012-5650 Cross Site Scripting Vulnerability
4814| [57314] Apache CouchDB CVE-2012-5649 Remote Code Execution Vulnerability
4815| [57267] Apache Axis2/C SSL Certificate Validation Security Bypass Vulnerability
4816| [57259] Apache CloudStack CVE-2012-5616 Local Information Disclosure Vulnerability
4817| [56814] Apache Tomcat CVE-2012-4431 Cross-Site Request Forgery Vulnerability
4818| [56813] Apache Tomcat CVE-2012-4534 Denial of Service Vulnerability
4819| [56812] Apache Tomcat CVE-2012-3546 Security Bypass Vulnerability
4820| [56753] Apache Apache HTTP Server 'mod_proxy_ajp Module Denial Of Service Vulnerability
4821| [56686] Apache Tomcat CVE-2012-5568 Denial of Service Vulnerability
4822| [56408] Apache Axis and Axis2/Java SSL Certificate Validation Security Bypass Vulnerability
4823| [56403] Apache Tomcat DIGEST Authentication Multiple Security Weaknesses
4824| [56402] Apache Tomcat CVE-2012-2733 Denial of Service Vulnerability
4825| [56171] Apache OFBiz CVE-2012-3506 Unspecified Security Vulnerability
4826| [55876] Apache CloudStack CVE-2012-4501 Security Bypass Vulnerability
4827| [55628] Apache CXF SOAP Action Spoofing Security Bypass Vulnerability
4828| [55608] Apache Qpid (qpidd) Denial of Service Vulnerability
4829| [55536] Apache 'mod_pagespeed' Module Cross Site Scripting and Security Bypass Vulnerabilities
4830| [55508] Apache Axis2 XML Signature Wrapping Security Vulnerability
4831| [55445] Apache Wicket CVE-2012-3373 Cross Site Scripting Vulnerability
4832| [55346] Apache Struts Cross Site Request Forgery and Denial of Service Vulnerabilities
4833| [55290] Drupal Apache Solr Autocomplete Module Cross Site Scripting Vulnerability
4834| [55165] Apache Struts2 Skill Name Remote Code Execution Vulnerability
4835| [55154] Apache 'mod-rpaf' Module Denial of Service Vulnerability
4836| [55131] Apache HTTP Server HTML-Injection And Information Disclosure Vulnerabilities
4837| [54954] Apache QPID NullAuthenticator Authentication Bypass Vulnerability
4838| [54798] Apache Libcloud Man In The Middle Vulnerability
4839| [54358] Apache Hadoop CVE-2012-3376 Information Disclosure Vulnerability
4840| [54341] Apache Sling CVE-2012-2138 Denial Of Service Vulnerability
4841| [54268] Apache Hadoop Symlink Attack Local Privilege Escalation Vulnerability
4842| [54189] Apache Roller Cross Site Request Forgery Vulnerability
4843| [54187] Apache Roller CVE-2012-2381 Cross Site Scripting Vulnerability
4844| [53880] Apache CXF Child Policies Security Bypass Vulnerability
4845| [53877] Apache CXF Elements Validation Security Bypass Vulnerability
4846| [53676] Apache Commons Compress and Apache Ant CVE-2012-2098 Denial Of Service Vulnerability
4847| [53487] Apache POI CVE-2012-0213 Denial Of Service Vulnerability
4848| [53455] PHP 'apache_request_headers()' Function Buffer Overflow Vulnerability
4849| [53305] Apache Qpid CVE-2011-3620 Unauthorized Access Security Bypass Vulnerability
4850| [53046] Apache HTTP Server 'LD_LIBRARY_PATH' Insecure Library Loading Arbitrary Code Execution Vulnerability
4851| [53025] Apache OFBiz Unspecified Remote Code Execution Vulnerability
4852| [53023] Apache OFBiz Multiple Cross Site Scripting Vulnerabilities
4853| [52939] Apache Hadoop CVE-2012-1574 Unspecified User Impersonation Vulnerability
4854| [52702] Apache Struts2 'XSLTResult.java' Remote Arbitrary File Upload Vulnerability
4855| [52696] Apache Traffic Server HTTP Host Header Handling Heap Based Buffer Overflow Vulnerability
4856| [52680] Apache Wicket 'pageMapName' Parameter Cross Site Scripting Vulnerability
4857| [52679] Apache Wicket Hidden Files Information Disclosure Vulnerability
4858| [52565] Apache 'mod_fcgid' Module Denial Of Service Vulnerability
4859| [52146] TYPO3 Apache Solr Extension Unspecified Cross Site Scripting Vulnerability
4860| [51939] Apache MyFaces 'ln' Parameter Information Disclosure Vulnerability
4861| [51917] Apache APR Hash Collision Denial Of Service Vulnerability
4862| [51902] Apache Struts Multiple HTML Injection Vulnerabilities
4863| [51900] Apache Struts CVE-2012-1007 Multiple Cross Site Scripting Vulnerabilities
4864| [51886] Apache CXF UsernameToken Policy Validation Security Bypass Vulnerability
4865| [51869] Apache HTTP Server CVE-2011-3639 'mod_proxy' Reverse Proxy Security Bypass Vulnerability
4866| [51706] Apache HTTP Server 'httpOnly' Cookie Information Disclosure Vulnerability
4867| [51705] Apache HTTP Server CVE-2012-0021 mod_log_config Denial Of Service Vulnerability
4868| [51628] Apache Struts 'ParameterInterceptor' Class OGNL (CVE-2011-3923) Security Bypass Vulnerability
4869| [51447] Apache Tomcat Parameter Handling Denial of Service Vulnerability
4870| [51442] Apache Tomcat Request Object Security Bypass Vulnerability
4871| [51407] Apache HTTP Server Scoreboard Local Security Bypass Vulnerability
4872| [51257] Apache Struts Remote Command Execution and Arbitrary File Overwrite Vulnerabilities
4873| [51238] Apache Geronimo Hash Collision Denial Of Service Vulnerability
4874| [51200] Apache Tomcat Hash Collision Denial Of Service Vulnerability
4875| [50940] Apache Struts Session Tampering Security Bypass Vulnerability
4876| [50912] RETIRED: Apache MyFaces CVE-2011-4343 Information Disclosure Vulnerability
4877| [50904] Apache ActiveMQ Failover Mechanism Remote Denial Of Service Vulnerability
4878| [50848] Apache MyFaces EL Expression Evaluation Security Bypass Vulnerability
4879| [50802] Apache HTTP Server 'mod_proxy' Reverse Proxy Security Bypass Vulnerability
4880| [50639] Apache HTTP Server 'ap_pregsub()' Function Local Denial of Service Vulnerability
4881| [50603] Apache Tomcat Manager Application Security Bypass Vulnerability
4882| [50494] Apache HTTP Server 'ap_pregsub()' Function Local Privilege Escalation Vulnerability
4883| [49957] Apache HTTP Server 'mod_proxy' Reverse Proxy Information Disclosure Vulnerability
4884| [49762] Apache Tomcat HTTP DIGEST Authentication Multiple Security Weaknesses
4885| [49728] Apache Struts Conversion Error OGNL Expression Evaluation Vulnerability
4886| [49616] Apache HTTP Server CVE-2011-3348 Denial Of Service Vulnerability
4887| [49470] Apache Tomcat CVE-2007-6286 Duplicate Request Processing Security Vulnerability
4888| [49353] Apache Tomcat AJP Protocol Security Bypass Vulnerability
4889| [49303] Apache HTTP Server CVE-2011-3192 Denial Of Service Vulnerability
4890| [49290] Apache Wicket Cross Site Scripting Vulnerability
4891| [49147] Apache Tomcat CVE-2011-2481 Information Disclosure Vulnerability
4892| [49143] Apache Commons Daemon 'jsvc' Information Disclosure Vulnerability
4893| [48667] Apache Tomcat 'sendfile' Request Attributes Information Disclosure Vulnerability
4894| [48653] Apache 'mod_authnz_external' Module SQL Injection Vulnerability
4895| [48611] Apache XML Security for C++ Signature Key Parsing Denial of Service Vulnerability
4896| [48456] Apache Tomcat 'MemoryUserDatabase' Information Disclosure Vulnerability
4897| [48015] Apache Archiva Multiple Cross Site Request Forgery Vulnerabilities
4898| [48011] Apache Archiva Multiple Cross Site Scripting and HTML Injection Vulnerabilities
4899| [47929] Apache APR 'apr_fnmatch.c' Denial of Service Vulnerability
4900| [47890] Apache Struts 'javatemplates' Plugin Multiple Cross Site Scripting Vulnerabilities
4901| [47886] Apache Tomcat SecurityConstraints Security Bypass Vulnerability
4902| [47820] Apache APR 'apr_fnmatch()' Denial of Service Vulnerability
4903| [47784] Apache Struts XWork 's:submit' HTML Tag Cross Site Scripting Vulnerability
4904| [47199] Apache Tomcat HTTP BIO Connector Information Disclosure Vulnerability
4905| [47196] Apache Tomcat Login Constraints Security Bypass Vulnerability
4906| [46974] Apache HttpComponents 'HttpClient' Information Disclosure Vulnerability
4907| [46953] Apache MPM-ITK Module Security Weakness
4908| [46734] Subversion 'mod_dav_svn' Apache Server NULL Pointer Dereference Denial Of Service Vulnerability
4909| [46685] Apache Tomcat '@ServletSecurity' Annotations Security Bypass Vulnerability
4910| [46311] Apache Continuum and Archiva Cross Site Scripting Vulnerability
4911| [46177] Apache Tomcat SecurityManager Security Bypass Vulnerability
4912| [46174] Apache Tomcat HTML Manager Interface HTML Injection Vulnerability
4913| [46166] Apache Tomcat JVM Denial of Service Vulnerability
4914| [46164] Apache Tomcat NIO Connector Denial of Service Vulnerability
4915| [46066] Apache CouchDB Web Administration Interface Cross Site Scripting Vulnerability
4916| [45655] Apache Subversion Server Component Multiple Remote Denial Of Service Vulnerabilities
4917| [45123] Awstats Apache Tomcat Configuration File Remote Arbitrary Command Execution Vulnerability
4918| [45095] Apache Archiva Cross Site Request Forgery Vulnerability
4919| [45015] Apache Tomcat 'sort' and 'orderBy' Parameters Cross Site Scripting Vulnerabilities
4920| [44900] Apache 'mod_fcgid' Module Unspecified Stack Buffer Overflow Vulnerability
4921| [44616] Apache Shiro Directory Traversal Vulnerability
4922| [44355] Apache MyFaces Encrypted View State Oracle Padding Security Vulnerability
4923| [44068] Apache::AuthenHook Local Information Disclosure Vulnerability
4924| [43862] Apache QPID SSL Connection Denial of Service Vulnerability
4925| [43673] Apache APR-util 'apr_brigade_split_line()' Denial of Service Vulnerability
4926| [43637] Apache XML-RPC SAX Parser Information Disclosure Vulnerability
4927| [43111] Apache Traffic Server Remote DNS Cache Poisoning Vulnerability
4928| [42637] Apache Derby 'BUILTIN' Authentication Insecure Password Hashing Vulnerability
4929| [42501] Apache CouchDB Cross Site Request Forgery Vulnerability
4930| [42492] Apache CXF XML DTD Processing Security Vulnerability
4931| [42121] Apache SLMS Insufficient Quoting Cross Site Request Forgery Vulnerability
4932| [42102] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
4933| [41963] Apache HTTP Server Multiple Remote Denial of Service Vulnerabilities
4934| [41544] Apache Tomcat 'Transfer-Encoding' Information Disclosure and Denial Of Service Vulnerabilities
4935| [41076] Apache Axis2 '/axis2/axis2-admin' Session Fixation Vulnerability
4936| [40976] Apache Axis2 Document Type Declaration Processing Security Vulnerability
4937| [40827] Apache 'mod_proxy_http' Timeout Handling Information Disclosure Vulnerability
4938| [40343] Apache Axis2 'xsd' Parameter Directory Traversal Vulnerability
4939| [40327] Apache Axis2 'engagingglobally' Cross-Site Scripting Vulnerability
4940| [39771] Apache ActiveMQ 'admin/queueBrowse' Cross Site Scripting Vulnerability
4941| [39636] Apache ActiveMQ Source Code Information Disclosure Vulnerability
4942| [39635] Apache Tomcat Authentication Header Realm Name Information Disclosure Vulnerability
4943| [39538] Apache mod_auth_shadow Race Condition Security Bypass Vulnerability
4944| [39489] Apache OFBiz Multiple Cross Site Scripting and HTML Injection Vulnerabilities
4945| [39119] Apache ActiveMQ 'createDestination.action' HTML Injection Vulnerability
4946| [38580] Apache Subrequest Handling Information Disclosure Vulnerability
4947| [38494] Apache 'mod_isapi' Memory Corruption Vulnerability
4948| [38491] Apache mod_proxy_ajp Module Incoming Request Body Denial Of Service Vulnerability
4949| [37966] Apache 1.3 mod_proxy HTTP Chunked Encoding Integer Overflow Vulnerability
4950| [37945] Apache Tomcat Host Working Directory WAR File Directory Traversal Vulnerability
4951| [37944] Apache Tomcat WAR File Directory Traversal Vulnerability
4952| [37942] Apache Tomcat Directory Host Appbase Authentication Bypass Vulnerability
4953| [37149] Apache Tomcat 404 Error Page Cross Site Scripting Vulnerability
4954| [37027] RETIRED: Apache APR 'apr_uri_parse_hostinfo' Off By One Remote Code Execution Vulnerability
4955| [36990] Apache HTTP TRACE Cross Site Scripting Vulnerability
4956| [36954] Apache Tomcat Windows Installer Insecure Password Vulnerability
4957| [36889] TYPO3 Apache Solr Search Extension Unspecified Cross Site Scripting Vulnerability
4958| [36596] Apache HTTP Server Solaris Event Port Pollset Support Remote Denial Of Service Vulnerability
4959| [36260] Apache mod_proxy_ftp Module NULL Pointer Dereference Denial Of Service Vulnerability
4960| [36254] Apache mod_proxy_ftp Remote Command Injection Vulnerability
4961| [35949] Apache APR and APR-util Multiple Integer Overflow Vulnerabilities
4962| [35840] Apache HTTP Server HTTP-Basic Authentication Bypass Vulnerability
4963| [35623] Apache 'mod_deflate' Remote Denial Of Service Vulnerability
4964| [35565] Apache 'mod_proxy' Remote Denial Of Service Vulnerability
4965| [35416] Apache Tomcat XML Parser Information Disclosure Vulnerability
4966| [35263] Apache Tomcat 'RequestDispatcher' Information Disclosure Vulnerability
4967| [35253] Apache APR-util 'xml/apr_xml.c' Denial of Service Vulnerability
4968| [35251] Apache APR-util 'apr_brigade_vprintf' Off By One Vulnerability
4969| [35221] Apache APR-util 'apr_strmatch_precompile()' Integer Underflow Vulnerability
4970| [35196] Apache Tomcat Form Authentication Existing/Non-Existing Username Enumeration Weakness
4971| [35193] Apache Tomcat Java AJP Connector Invalid Header Denial of Service Vulnerability
4972| [35115] Apache 'Options' and 'AllowOverride' Directives Security Bypass Vulnerability
4973| [34686] Apache Struts Multiple Cross Site Scripting Vulnerabilities
4974| [34663] Apache 'mod_proxy_ajp' Information Disclosure Vulnerability
4975| [34657] Apache Tiles Cross Site Scripting And Information Disclosure Vulnerabilities
4976| [34562] Apache Geronimo Application Server Multiple Remote Vulnerabilities
4977| [34552] Apache ActiveMQ Web Console Multiple Unspecified HTML Injection Vulnerabilities
4978| [34412] Apache Tomcat mod_jk Content Length Information Disclosure Vulnerability
4979| [34399] Apache Struts Unspecified Cross Site Scripting Vulnerability
4980| [34383] Apache mod_perl 'Apache::Status' and 'Apache2::Status' Cross Site Scripting Vulnerability
4981| [33913] Apache Tomcat POST Data Information Disclosure Vulnerability
4982| [33360] Apache Jackrabbit 'q' Parameter Multiple Cross Site Scripting Vulnerabilities
4983| [33110] Apache Roller 'q' Parameter Cross Site Scripting Vulnerability
4984| [32657] Novell NetWare ApacheAdmin Security Bypass Vulnerability
4985| [31805] Apache HTTP Server OS Fingerprinting Unspecified Security Vulnerability
4986| [31761] Oracle WebLogic Server Apache Connector Stack Based Buffer Overflow Vulnerability
4987| [31698] Apache Tomcat 'RemoteFilterValve' Security Bypass Vulnerability
4988| [31165] Kolab Groupware Server Apache Log File User Password Information Disclosure Vulnerability
4989| [30560] Apache 'mod_proxy_ftp' Wildcard Characters Cross-Site Scripting Vulnerability
4990| [30496] Apache Tomcat 'HttpServletResponse.sendError()' Cross Site Scripting Vulnerability
4991| [30494] Apache Tomcat 'RequestDispatcher' Information Disclosure Vulnerability
4992| [29653] Apache 'mod_proxy_http' Interim Response Denial of Service Vulnerability
4993| [29502] Apache Tomcat Host Manager Cross Site Scripting Vulnerability
4994| [28576] Apache-SSL Environment Variable Information Disclosure and Privilege Escalation Vulnerability
4995| [28484] Apache Tomcat Requests Containing MS-DOS Device Names Information Disclosure Vulnerability
4996| [28483] Apache Tomcat 'allowLinking' Accepts NULL Byte in URI Information Disclosure Vulnerability
4997| [28482] Apache Tomcat SSL Anonymous Cipher Configuration Information Disclosure Vulnerability
4998| [28481] Apache Tomcat Cross-Site Scripting Vulnerability
4999| [28477] Apache Tomcat AJP Connector Information Disclosure Vulnerability
5000| [27752] Apache mod_jk2 Host Header Multiple Stack Based Buffer Overflow Vulnerabilities
5001| [27706] Apache Tomcat Cookie Quote Handling Remote Information Disclosure Vulnerability
5002| [27703] Apache Tomcat Parameter Processing Remote Information Disclosure Vulnerability
5003| [27409] Apache 'mod_negotiation' HTML Injection and HTTP Response Splitting Vulnerability
5004| [27365] Apache Tomcat SingleSignOn Remote Information Disclosure Vulnerability
5005| [27237] Apache HTTP Server 2.2.6, 2.0.61 and 1.3.39 'mod_status' Cross-Site Scripting Vulnerability
5006| [27236] Apache 'mod_proxy_balancer' Multiple Vulnerabilities
5007| [27234] Apache 'mod_proxy_ftp' Undefined Charset UTF-7 Cross-Site Scripting Vulnerability
5008| [27006] Apache Tomcat JULI Logging Component Default Security Policy Vulnerability
5009| [26939] Apache HTTP Server Windows Share PHP File Extension Mapping Information Disclosure Vulnerability
5010| [26838] Apache mod_imagemap and mod_imap Cross-Site Scripting Vulnerability
5011| [26762] Apache::AuthCAS Cookie SQL Injection Vulnerability
5012| [26663] Apache HTTP Server 413 Error HTTP Request Method Cross-Site Scripting Weakness
5013| [26287] Apache Geronimo SQLLoginModule Authentication Bypass Vulnerability
5014| [26070] Apache Tomcat WebDav Remote Information Disclosure Vulnerability
5015| [25804] Apache Geronimo Management EJB Security Bypass Vulnerability
5016| [25653] Apache Mod_AutoIndex.C Undefined Charset Cross-Site Scripting Vulnerability
5017| [25531] Apache Tomcat Cal2.JSP Cross-Site Scripting Vulnerability
5018| [25489] Apache HTTP Server Mod_Proxy Denial of Service Vulnerability
5019| [25316] Apache Tomcat Multiple Remote Information Disclosure Vulnerabilities
5020| [25314] Apache Tomcat Host Manager Servlet Cross Site Scripting Vulnerability
5021| [25174] Apache Tomcat Error Message Reporting Cross Site Scripting Vulnerability
5022| [24999] Apache Tomcat SendMailServlet Cross-Site Scripting Vulnerability
5023| [24759] MySQLDumper Apache Access Control Authentication Bypass Vulnerability
5024| [24649] Apache HTTP Server Mod_Cache Denial of Service Vulnerability
5025| [24645] Apache HTTP Server Mod_Status Cross-Site Scripting Vulnerability
5026| [24553] Apache Mod_Mem_Cache Information Disclosure Vulnerability
5027| [24524] Apache Tomcat Accept-Language Cross Site Scripting Vulnerability
5028| [24480] Apache MyFaces Tomahawk JSF Framework Autoscroll Parameter Cross Site Scripting Vulnerability
5029| [24476] Apache Tomcat JSP Example Web Applications Cross Site Scripting Vulnerability
5030| [24475] Apache Tomcat Manager and Host Manager Upload Script Cross-Site Scripting Vulnerability
5031| [24215] Apache HTTP Server Worker Process Multiple Denial of Service Vulnerabilities
5032| [24147] Apache Tomcat JK Connector Double Encoding Security Bypass Vulnerability
5033| [24058] Apache Tomcat Documentation Sample Application Multiple Cross-Site Scripting Vulnerabilities
5034| [23687] Apache AXIS Non-Existent WSDL Path Information Disclosure Vulnerability
5035| [23438] Apache HTTPD suEXEC Local Multiple Privilege Escalation Weaknesses
5036| [22960] Apache HTTP Server Tomcat Directory Traversal Vulnerability
5037| [22849] Apache mod_python Output Filter Mode Information Disclosure Vulnerability
5038| [22791] Apache Tomcat Mod_JK.SO Arbitrary Code Execution Vulnerability
5039| [22732] Debian Apache Root Shell Local Privilege Escalation Vulnerabilities
5040| [22388] Apache Stats Extract Function Multiple Input Validation Vulnerabilities
5041| [21865] Apache And Microsoft IIS Range Denial of Service Vulnerability
5042| [21214] Apache Mod_Auth_Kerb Off-By-One Denial of Service Vulnerability
5043| [20527] Apache Mod_TCL Remote Format String Vulnerability
5044| [19661] Apache HTTP Server Arbitrary HTTP Request Headers Security Weakness
5045| [19447] Apache CGI Script Source Code Information Disclosure Vulnerability
5046| [19204] Apache Mod_Rewrite Off-By-One Buffer Overflow Vulnerability
5047| [19106] Apache Tomcat Information Disclosure Vulnerability
5048| [18138] Apache James SMTP Denial Of Service Vulnerability
5049| [17342] Apache Struts Multiple Remote Vulnerabilities
5050| [17095] Apache Log4Net Denial Of Service Vulnerability
5051| [16916] Apache mod_python FileSession Code Execution Vulnerability
5052| [16710] Apache Libapreq2 Quadratic Behavior Denial of Service Vulnerability
5053| [16260] Apache Geronimo Multiple Input Validation Vulnerabilities
5054| [16153] Apache mod_auth_pgsql Multiple Format String Vulnerabilities
5055| [16152] Apache Mod_SSL Custom Error Document Remote Denial Of Service Vulnerability
5056| [15834] Apache 'mod_imap' Referer Cross-Site Scripting Vulnerability
5057| [15765] Apache James Spooler Memory Leak Denial Of Service Vulnerability
5058| [15762] Apache MPM Worker.C Denial Of Service Vulnerability
5059| [15512] Apache Struts Error Response Cross-Site Scripting Vulnerability
5060| [15413] PHP Apache 2 Virtual() Safe_Mode and Open_Basedir Restriction Bypass Vulnerability
5061| [15325] Apache Tomcat Simultaneous Directory Listing Denial Of Service Vulnerability
5062| [15224] Apache Mod_Auth_Shadow Authentication Bypass Vulnerability
5063| [15177] PHP Apache 2 Local Denial of Service Vulnerability
5064| [14982] ApacheTop Insecure Temporary File Creation Vulnerability
5065| [14721] Apache Mod_SSL SSLVerifyClient Restriction Bypass Vulnerability
5066| [14660] Apache CGI Byterange Request Denial of Service Vulnerability
5067| [14366] Apache mod_ssl CRL Handling Off-By-One Buffer Overflow Vulnerability
5068| [14106] Apache HTTP Request Smuggling Vulnerability
5069| [13778] Apache HTPasswd Password Command Line Argument Buffer Overflow Vulnerability
5070| [13777] Apache HTPasswd User Command Line Argument Buffer Overflow Vulnerability
5071| [13756] Apache Tomcat Java Security Manager Bypass Vulnerability
5072| [13537] Apache HTDigest Realm Command Line Argument Buffer Overflow Vulnerability
5073| [12877] Apache mod_ssl ssl_io_filter_cleanup Remote Denial Of Service Vulnerability
5074| [12795] Apache Tomcat Remote Malformed Request Denial Of Service Vulnerability
5075| [12619] Apache Software Foundation Batik Squiggle Browser Access Validation Vulnerability
5076| [12519] Apache mod_python Module Publisher Handler Information Disclosure Vulnerability
5077| [12308] Apache Utilities Insecure Temporary File Creation Vulnerability
5078| [12217] Apache mod_auth_radius Malformed RADIUS Server Reply Integer Overflow Vulnerability
5079| [12181] Mod_DOSEvasive Apache Module Local Insecure Temporary File Creation Vulnerability
5080| [11803] Apache Jakarta Results.JSP Remote Cross-Site Scripting Vulnerability
5081| [11471] Apache mod_include Local Buffer Overflow Vulnerability
5082| [11360] Apache mod_ssl SSLCipherSuite Restriction Bypass Vulnerability
5083| [11239] Apache Satisfy Directive Access Control Bypass Vulnerability
5084| [11187] Apache Web Server Remote IPv6 Buffer Overflow Vulnerability
5085| [11185] Apache Mod_DAV LOCK Denial Of Service Vulnerability
5086| [11182] Apache Web Server Configuration File Environment Variable Local Buffer Overflow Vulnerability
5087| [11154] Apache mod_ssl Remote Denial of Service Vulnerability
5088| [11094] Apache mod_ssl Denial Of Service Vulnerability
5089| [10789] Apache mod_userdir Module Information Disclosure Vulnerability
5090| [10736] Apache 'mod_ssl' Log Function Format String Vulnerability
5091| [10619] Apache ap_escape_html Memory Allocation Denial Of Service Vulnerability
5092| [10508] Apache Mod_Proxy Remote Negative Content-Length Buffer Overflow Vulnerability
5093| [10478] ClueCentral Apache Suexec Patch Security Weakness
5094| [10355] Apache 'mod_ssl' 'ssl_util_uuencode_binary()' Stack Buffer Overflow Vulnerability
5095| [10212] Apache mod_auth Malformed Password Potential Memory Corruption Vulnerability
5096| [9933] Apache mod_disk_cache Module Client Authentication Credential Storage Weakness
5097| [9930] Apache Error and Access Logs Escape Sequence Injection Vulnerability
5098| [9921] Apache Connection Blocking Denial Of Service Vulnerability
5099| [9885] Apache Mod_Security Module SecFilterScanPost Off-By-One Buffer Overflow Vulnerability
5100| [9874] Apache HTAccess LIMIT Directive Bypass Configuration Error Weakness
5101| [9829] Apache Mod_Access Access Control Rule Bypass Vulnerability
5102| [9826] Apache Mod_SSL HTTP Request Remote Denial Of Service Vulnerability
5103| [9733] Apache Cygwin Directory Traversal Vulnerability
5104| [9599] Apache mod_php Global Variables Information Disclosure Weakness
5105| [9590] Apache-SSL Client Certificate Forging Vulnerability
5106| [9571] Apache mod_digest Client-Supplied Nonce Verification Vulnerability
5107| [9471] Apache mod_perl Module File Descriptor Leakage Vulnerability
5108| [9404] Mod-Auth-Shadow Apache Module Expired User Credential Weakness
5109| [9302] Apache mod_php Module File Descriptor Leakage Vulnerability
5110| [9129] Apache mod_python Module Malformed Query Denial of Service Vulnerability
5111| [8926] Apache Web Server mod_cgid Module CGI Data Redirection Vulnerability
5112| [8919] Apache Mod_Security Module Heap Corruption Vulnerability
5113| [8911] Apache Web Server Multiple Module Local Buffer Overflow Vulnerability
5114| [8898] Red Hat Apache Directory Index Default Configuration Error
5115| [8883] Apache Cocoon Directory Traversal Vulnerability
5116| [8824] Apache Tomcat Non-HTTP Request Denial Of Service Vulnerability
5117| [8822] Apache Mod_Throttle Module Local Shared Memory Corruption Vulnerability
5118| [8725] Apache2 MOD_CGI STDERR Denial Of Service Vulnerability
5119| [8707] Apache htpasswd Password Entropy Weakness
5120| [8561] Apache::Gallery Insecure Local File Storage Privilege Escalation Vulnerability
5121| [8287] Mod_Mylo Apache Module REQSTR Buffer Overflow Vulnerability
5122| [8226] Apache HTTP Server Multiple Vulnerabilities
5123| [8138] Apache Web Server Type-Map Recursive Loop Denial Of Service Vulnerability
5124| [8137] Apache Web Server Prefork MPM Denial Of Service Vulnerability
5125| [8136] Macromedia Apache Web Server Encoded Space Source Disclosure Vulnerability
5126| [8135] Apache Web Server FTP Proxy IPV6 Denial Of Service Vulnerability
5127| [8134] Apache Web Server SSLCipherSuite Weak CipherSuite Renegotiation Weakness
5128| [7768] Apache Tomcat Insecure Directory Permissions Vulnerability
5129| [7725] Apache Basic Authentication Module Valid User Login Denial Of Service Vulnerability
5130| [7723] Apache APR_PSPrintf Memory Corruption Vulnerability
5131| [7448] Apache Mod_Auth_Any Remote Command Execution Vulnerability
5132| [7375] Apache Mod_Access_Referer NULL Pointer Dereference Denial of Service Vulnerability
5133| [7332] Apache Web Server OS2 Filestat Denial Of Service Vulnerability
5134| [7255] Apache Web Server File Descriptor Leakage Vulnerability
5135| [7254] Apache Web Server Linefeed Memory Allocation Denial Of Service Vulnerability
5136| [6943] Apache Web Server MIME Boundary Information Disclosure Vulnerability
5137| [6939] Apache Web Server ETag Header Information Disclosure Weakness
5138| [6722] Apache Tomcat Web.XML File Contents Disclosure Vulnerability
5139| [6721] Apache Tomcat Null Byte Directory/File Disclosure Vulnerability
5140| [6720] Apache Tomcat Example Web Application Cross Site Scripting Vulnerability
5141| [6662] Apache Web Server MS-DOS Device Name Denial Of Service Vulnerability
5142| [6661] Apache Web Server Default Script Mapping Bypass Vulnerability
5143| [6660] Apache Web Server Illegal Character HTTP Request File Disclosure Vulnerability
5144| [6659] Apache Web Server MS-DOS Device Name Arbitrary Code Execution Vulnerability
5145| [6562] Apache Tomcat Invoker Servlet File Disclosure Vulnerability
5146| [6320] Apache/Tomcat Mod_JK Chunked Encoding Denial Of Service Vulnerability
5147| [6117] Apache mod_php File Descriptor Leakage Vulnerability
5148| [6065] Apache 2 WebDAV CGI POST Request Information Disclosure Vulnerability
5149| [5996] Apache AB.C Web Benchmarking Buffer Overflow Vulnerability
5150| [5995] Apache AB.C Web Benchmarking Read_Connection() Buffer Overflow Vulnerability
5151| [5993] Multiple Apache HTDigest Buffer Overflow Vulnerabilities
5152| [5992] Apache HTDigest Insecure Temporary File Vulnerability
5153| [5991] Apache HTDigest Arbitrary Command Execution Vulnerability
5154| [5990] Apache HTPasswd Insecure Temporary File Vulnerability
5155| [5981] Multiple Apache HTDigest and HTPassWD Component Vulnerabilites
5156| [5884] Apache Web Server Scoreboard Memory Segment Overwriting SIGUSR1 Sending Vulnerability
5157| [5847] Apache Server Side Include Cross Site Scripting Vulnerability
5158| [5838] Apache Tomcat 3.2 Directory Disclosure Vulnerability
5159| [5816] Apache 2 mod_dav Denial Of Service Vulnerability
5160| [5791] HP VirtualVault Apache mod_ssl Denial Of Service Vulnerability
5161| [5787] Apache Oversized STDERR Buffer Denial Of Service Vulnerability
5162| [5786] Apache Tomcat DefaultServlet File Disclosure Vulnerability
5163| [5542] Apache Tomcat 4.1 JSP Request Cross Site Scripting Vulnerability
5164| [5486] Apache 2.0 CGI Path Disclosure Vulnerability
5165| [5485] Apache 2.0 Path Disclosure Vulnerability
5166| [5434] Apache 2.0 Encoded Backslash Directory Traversal Vulnerability
5167| [5256] Apache httpd 2.0 CGI Error Path Disclosure Vulnerability
5168| [5194] Apache Tomcat DOS Device Name Cross Site Scripting Vulnerability
5169| [5193] Apache Tomcat Servlet Mapping Cross Site Scripting Vulnerability
5170| [5067] Apache Tomcat Null Character Malformed Request Denial Of Service Vulnerability
5171| [5054] Apache Tomcat Web Root Path Disclosure Vulnerability
5172| [5033] Apache Chunked-Encoding Memory Corruption Vulnerability
5173| [4995] Apache Tomcat JSP Engine Denial of Service Vulnerability
5174| [4878] Apache Tomcat RealPath.JSP Malformed Request Information Disclosure Vulnerability
5175| [4877] Apache Tomcat Example Files Web Root Path Disclosure Vulnerability
5176| [4876] Apache Tomcat Source.JSP Malformed Request Information Disclosure Vulnerability
5177| [4575] Apache Tomcat Servlet Path Disclosure Vulnerability
5178| [4557] Apache Tomcat System Path Information Disclosure Vulnerability
5179| [4437] Apache Error Message Cross-Site Scripting Vulnerability
5180| [4431] Apache PrintEnv/Test_CGI Script Injection Vulnerability
5181| [4358] Apache Double-Reverse Lookup Log Entry Spoofing Vulnerability
5182| [4335] Apache Win32 Batch File Remote Command Execution Vulnerability
5183| [4292] Oracle 9iAS Apache PL/SQL Module Web Administration Access Vulnerability
5184| [4189] Apache mod_ssl/Apache-SSL Buffer Overflow Vulnerability
5185| [4057] Apache 2 for Windows OPTIONS request Path Disclosure Vulnerability
5186| [4056] Apache 2 for Windows php.exe Path Disclosure Vulnerability
5187| [4037] Oracle 9iAS Apache PL/SQL Module Denial of Service Vulnerability
5188| [4032] Oracle 9iAS Apache PL/SQL Module Multiple Buffer Overflows Vulnerability
5189| [3796] Apache HTTP Request Unexpected Behavior Vulnerability
5190| [3790] Apache Non-Existent Log Directory Denial Of Service Vulnerability
5191| [3786] Apache Win32 PHP.EXE Remote File Disclosure Vulnerability
5192| [3727] Oracle 9I Application Server PL/SQL Apache Module Directory Traversal Vulnerability
5193| [3726] Oracle 9I Application Server PL/SQL Apache Module Buffer Overflow Vulnerability
5194| [3596] Apache Split-Logfile File Append Vulnerability
5195| [3521] Apache mod_usertrack Predictable ID Generation Vulnerability
5196| [3335] Red Hat Linux Apache Remote Username Enumeration Vulnerability
5197| [3316] MacOS X Client Apache Directory Contents Disclosure Vulnerability
5198| [3256] Apache mod_auth_oracle Remote SQL Query Manipulation Vulnerability
5199| [3255] Apache mod_auth_mysql Remote SQL Query Manipulation Vulnerability
5200| [3254] Apache AuthPG Remote SQL Query Manipulation Vulnerability
5201| [3253] Apache mod_auth_pgsql_sys Remote SQL Query Manipulation Vulnerability
5202| [3251] Apache mod_auth_pgsql Remote SQL Query Manipulation Vulnerability
5203| [3176] Apache Mod ReWrite Rules Bypassing Image Linking Vulnerability
5204| [3169] Apache Server Address Disclosure Vulnerability
5205| [3009] Apache Possible Directory Index Disclosure Vulnerability
5206| [2982] Apache Tomcat Cross-Site Scripting Vulnerability
5207| [2852] MacOS X Client Apache File Protection Bypass Vulnerability
5208| [2740] Apache Web Server HTTP Request Denial of Service Vulnerability
5209| [2518] Apache Tomcat 3.0 Directory Traversal Vulnerability
5210| [2503] Apache Artificially Long Slash Path Directory Listing Vulnerability
5211| [2300] NCSA/Apache httpd ScriptAlias Source Retrieval Vulnerability
5212| [2216] Apache Web Server DoS Vulnerability
5213| [2182] Apache /tmp File Race Vulnerability
5214| [2171] Oracle Apache+WebDB Documented Backdoor Vulnerability
5215| [2060] Apache Web Server with Php 3 File Disclosure Vulnerability
5216| [1821] Apache mod_cookies Buffer Overflow Vulnerability
5217| [1728] Apache Rewrite Module Arbitrary File Disclosure Vulnerability
5218| [1658] SuSE Apache CGI Source Code Viewing Vulnerability
5219| [1656] SuSE Apache WebDAV Directory Listings Vulnerability
5220| [1575] Trustix Apache-SSL RPM Permissions Vulnerability
5221| [1548] Apache Jakarta-Tomcat /admin Context Vulnerability
5222| [1532] Apache Tomcat Snoop Servlet Information Disclosure Vulnerability
5223| [1531] Apache Tomcat 3.1 Path Revealing Vulnerability
5224| [1457] Apache::ASP source.asp Example Script Vulnerability
5225| [1284] Apache HTTP Server (win32) Root Directory Access Vulnerability
5226| [1083] Cobalt Raq Apache .htaccess Disclosure Vulnerability
5227|
5228| IBM X-Force - https://exchange.xforce.ibmcloud.com:
5229| [86258] Apache CloudStack text fields cross-site scripting
5230| [85983] Apache Subversion mod_dav_svn module denial of service
5231| [85875] Apache OFBiz UEL code execution
5232| [85874] Apache OFBiz Webtools View Log screen cross-site scripting
5233| [85871] Apache HTTP Server mod_session_dbd unspecified
5234| [85756] Apache Struts OGNL expression command execution
5235| [85755] Apache Struts DefaultActionMapper class open redirect
5236| [85586] Apache ActiveMQ CVE-2013-1879 cross-site scripting
5237| [85574] Apache HTTP Server mod_dav denial of service
5238| [85573] Apache Struts Showcase App OGNL code execution
5239| [85496] Apache CXF denial of service
5240| [85423] Apache Geronimo RMI classloader code execution
5241| [85326] Apache Santuario XML Security for C++ buffer overflow
5242| [85323] Apache Santuario XML Security for Java spoofing
5243| [85319] Apache Qpid Python client SSL spoofing
5244| [85019] Apache Santuario XML Security for C++ CVE-2013-2156 buffer overflow
5245| [85018] Apache Santuario XML Security for C++ CVE-2013-2155 denial of service
5246| [85017] Apache Santuario XML Security for C++ CVE-2013-2154 buffer overflow
5247| [85016] Apache Santuario XML Security for C++ CVE-2013-2153 spoofing
5248| [84952] Apache Tomcat CVE-2012-3544 denial of service
5249| [84763] Apache Struts CVE-2013-2135 security bypass
5250| [84762] Apache Struts CVE-2013-2134 security bypass
5251| [84719] Apache Subversion CVE-2013-2088 command execution
5252| [84718] Apache Subversion CVE-2013-2112 denial of service
5253| [84717] Apache Subversion CVE-2013-1968 denial of service
5254| [84577] Apache Tomcat security bypass
5255| [84576] Apache Tomcat symlink
5256| [84543] Apache Struts CVE-2013-2115 security bypass
5257| [84542] Apache Struts CVE-2013-1966 security bypass
5258| [84154] Apache Tomcat session hijacking
5259| [84144] Apache Tomcat denial of service
5260| [84143] Apache Tomcat information disclosure
5261| [84111] Apache HTTP Server command execution
5262| [84043] Apache Virtual Computing Lab cross-site scripting
5263| [84042] Apache Virtual Computing Lab cross-site scripting
5264| [83782] Apache CloudStack information disclosure
5265| [83781] Apache CloudStack security bypass
5266| [83720] Apache ActiveMQ cross-site scripting
5267| [83719] Apache ActiveMQ denial of service
5268| [83718] Apache ActiveMQ denial of service
5269| [83263] Apache Subversion denial of service
5270| [83262] Apache Subversion denial of service
5271| [83261] Apache Subversion denial of service
5272| [83259] Apache Subversion denial of service
5273| [83035] Apache mod_ruid2 security bypass
5274| [82852] Apache Qpid federation_tag security bypass
5275| [82851] Apache Qpid qpid::framing::Buffer denial of service
5276| [82758] Apache Rave User RPC API information disclosure
5277| [82663] Apache Subversion svn_fs_file_length() denial of service
5278| [82642] Apache Qpid qpid::framing::Buffer::checkAvailable() denial of service
5279| [82641] Apache Qpid AMQP denial of service
5280| [82626] Apache HTTP Server on Debian GNU/Linux Debian apache2ctl symlink
5281| [82618] Apache Commons FileUpload symlink
5282| [82360] Apache HTTP Server manager interface cross-site scripting
5283| [82359] Apache HTTP Server hostnames cross-site scripting
5284| [82338] Apache Tomcat log/logdir information disclosure
5285| [82328] Apache Maven and Apache Maven Wagon SSL spoofing
5286| [82268] Apache OpenJPA deserialization command execution
5287| [81981] Apache CXF UsernameTokens security bypass
5288| [81980] Apache CXF WS-Security security bypass
5289| [81398] Apache OFBiz cross-site scripting
5290| [81240] Apache CouchDB directory traversal
5291| [81226] Apache CouchDB JSONP code execution
5292| [81225] Apache CouchDB Futon user interface cross-site scripting
5293| [81211] Apache Axis2/C SSL spoofing
5294| [81167] Apache CloudStack DeployVM information disclosure
5295| [81166] Apache CloudStack AddHost API information disclosure
5296| [81165] Apache CloudStack createSSHKeyPair API information disclosure
5297| [80518] Apache Tomcat cross-site request forgery security bypass
5298| [80517] Apache Tomcat FormAuthenticator security bypass
5299| [80516] Apache Tomcat NIO denial of service
5300| [80408] Apache Tomcat replay-countermeasure security bypass
5301| [80407] Apache Tomcat HTTP Digest Access Authentication security bypass
5302| [80317] Apache Tomcat slowloris denial of service
5303| [79984] Apache Commons HttpClient SSL spoofing
5304| [79983] Apache CXF SSL spoofing
5305| [79830] Apache Axis2/Java SSL spoofing
5306| [79829] Apache Axis SSL spoofing
5307| [79809] Apache Tomcat DIGEST security bypass
5308| [79806] Apache Tomcat parseHeaders() denial of service
5309| [79540] Apache OFBiz unspecified
5310| [79487] Apache Axis2 SAML security bypass
5311| [79212] Apache Cloudstack code execution
5312| [78734] Apache CXF SOAP Action security bypass
5313| [78730] Apache Qpid broker denial of service
5314| [78617] Eucalyptus Apache Santuario (XML Security for Java) denial of service
5315| [78563] Apache mod_pagespeed module unspecified cross-site scripting
5316| [78562] Apache mod_pagespeed module security bypass
5317| [78454] Apache Axis2 security bypass
5318| [78452] Websense Web Security and Web Filter Apache Tomcat information disclosure
5319| [78451] Websense Web Security and Web Filter Apache Tomcat cross-site scripting
5320| [78321] Apache Wicket unspecified cross-site scripting
5321| [78183] Apache Struts parameters denial of service
5322| [78182] Apache Struts cross-site request forgery
5323| [78153] Apache Solr Autocomplete module for Drupal autocomplete results cross-site scripting
5324| [77987] mod_rpaf module for Apache denial of service
5325| [77958] Apache Struts skill name code execution
5326| [77914] Apache HTTP Server mod_negotiation module cross-site scripting
5327| [77913] Apache HTTP Server mod_proxy_ajp information disclosure
5328| [77568] Apache Qpid broker security bypass
5329| [77421] Apache Libcloud spoofing
5330| [77059] Oracle Solaris Cluster Apache Tomcat Agent unspecified
5331| [77046] Oracle Solaris Apache HTTP Server information disclosure
5332| [76837] Apache Hadoop information disclosure
5333| [76802] Apache Sling CopyFrom denial of service
5334| [76692] Apache Hadoop symlink
5335| [76535] Apache Roller console cross-site request forgery
5336| [76534] Apache Roller weblog cross-site scripting
5337| [76152] Apache CXF elements security bypass
5338| [76151] Apache CXF child policies security bypass
5339| [75983] MapServer for Windows Apache file include
5340| [75857] Apache Commons Compress and Apache Ant bzip2 denial of service
5341| [75558] Apache POI denial of service
5342| [75545] PHP apache_request_headers() buffer overflow
5343| [75302] Apache Qpid SASL security bypass
5344| [75211] Debian GNU/Linux apache 2 cross-site scripting
5345| [74901] Apache HTTP Server LD_LIBRARY_PATH privilege escalation
5346| [74871] Apache OFBiz FlexibleStringExpander code execution
5347| [74870] Apache OFBiz multiple cross-site scripting
5348| [74750] Apache Hadoop unspecified spoofing
5349| [74319] Apache Struts XSLTResult.java file upload
5350| [74313] Apache Traffic Server header buffer overflow
5351| [74276] Apache Wicket directory traversal
5352| [74273] Apache Wicket unspecified cross-site scripting
5353| [74181] Apache HTTP Server mod_fcgid module denial of service
5354| [73690] Apache Struts OGNL code execution
5355| [73432] Apache Solr extension for TYPO3 unspecified cross-site scripting
5356| [73100] Apache MyFaces in directory traversal
5357| [73096] Apache APR hash denial of service
5358| [73052] Apache Struts name cross-site scripting
5359| [73030] Apache CXF UsernameToken security bypass
5360| [72888] Apache Struts lastName cross-site scripting
5361| [72758] Apache HTTP Server httpOnly information disclosure
5362| [72757] Apache HTTP Server MPM denial of service
5363| [72585] Apache Struts ParameterInterceptor security bypass
5364| [72438] Apache Tomcat Digest security bypass
5365| [72437] Apache Tomcat Digest security bypass
5366| [72436] Apache Tomcat DIGEST security bypass
5367| [72425] Apache Tomcat parameter denial of service
5368| [72422] Apache Tomcat request object information disclosure
5369| [72377] Apache HTTP Server scoreboard security bypass
5370| [72345] Apache HTTP Server HTTP request denial of service
5371| [72229] Apache Struts ExceptionDelegator command execution
5372| [72089] Apache Struts ParameterInterceptor directory traversal
5373| [72088] Apache Struts CookieInterceptor command execution
5374| [72047] Apache Geronimo hash denial of service
5375| [72016] Apache Tomcat hash denial of service
5376| [71711] Apache Struts OGNL expression code execution
5377| [71654] Apache Struts interfaces security bypass
5378| [71620] Apache ActiveMQ failover denial of service
5379| [71617] Apache HTTP Server mod_proxy module information disclosure
5380| [71508] Apache MyFaces EL security bypass
5381| [71445] Apache HTTP Server mod_proxy security bypass
5382| [71203] Apache Tomcat servlets privilege escalation
5383| [71181] Apache HTTP Server ap_pregsub() denial of service
5384| [71093] Apache HTTP Server ap_pregsub() buffer overflow
5385| [70336] Apache HTTP Server mod_proxy information disclosure
5386| [69804] Apache HTTP Server mod_proxy_ajp denial of service
5387| [69472] Apache Tomcat AJP security bypass
5388| [69396] Apache HTTP Server ByteRange filter denial of service
5389| [69394] Apache Wicket multi window support cross-site scripting
5390| [69176] Apache Tomcat XML information disclosure
5391| [69161] Apache Tomcat jsvc information disclosure
5392| [68799] mod_authnz_external module for Apache mysql-auth.pl SQL injection
5393| [68541] Apache Tomcat sendfile information disclosure
5394| [68420] Apache XML Security denial of service
5395| [68238] Apache Tomcat JMX information disclosure
5396| [67860] Apache Rampart/C rampart_timestamp_token_validate security bypass
5397| [67804] Apache Subversion control rules information disclosure
5398| [67803] Apache Subversion control rules denial of service
5399| [67802] Apache Subversion baselined denial of service
5400| [67672] Apache Archiva multiple cross-site scripting
5401| [67671] Apache Archiva multiple cross-site request forgery
5402| [67564] Apache APR apr_fnmatch() denial of service
5403| [67532] IBM WebSphere Application Server org.apache.jasper.runtime.JspWriterImpl.response denial of service
5404| [67515] Apache Tomcat annotations security bypass
5405| [67480] Apache Struts s:submit information disclosure
5406| [67414] Apache APR apr_fnmatch() denial of service
5407| [67356] Apache Struts javatemplates cross-site scripting
5408| [67354] Apache Struts Xwork cross-site scripting
5409| [66676] Apache Tomcat HTTP BIO information disclosure
5410| [66675] Apache Tomcat web.xml security bypass
5411| [66640] Apache HttpComponents HttpClient Proxy-Authorization information disclosure
5412| [66241] Apache HttpComponents information disclosure
5413| [66154] Apache Tomcat ServletSecurity security bypass
5414| [65971] Apache Tomcat ServletSecurity security bypass
5415| [65876] Apache Subversion mod_dav_svn denial of service
5416| [65343] Apache Continuum unspecified cross-site scripting
5417| [65162] Apache Tomcat NIO connector denial of service
5418| [65161] Apache Tomcat javax.servlet.ServletRequest.getLocale() denial of service
5419| [65160] Apache Tomcat HTML Manager interface cross-site scripting
5420| [65159] Apache Tomcat ServletContect security bypass
5421| [65050] Apache CouchDB web-based administration UI cross-site scripting
5422| [64773] Oracle HTTP Server Apache Plugin unauthorized access
5423| [64473] Apache Subversion blame -g denial of service
5424| [64472] Apache Subversion walk() denial of service
5425| [64407] Apache Axis2 CVE-2010-0219 code execution
5426| [63926] Apache Archiva password privilege escalation
5427| [63785] Apache CouchDB LD_LIBRARY_PATH privilege escalation
5428| [63493] Apache Archiva credentials cross-site request forgery
5429| [63477] Apache Tomcat HttpOnly session hijacking
5430| [63422] Apache Tomcat sessionsList.jsp cross-site scripting
5431| [63303] Apache mod_fcgid module fcgid_header_bucket_read() buffer overflow
5432| [62959] Apache Shiro filters security bypass
5433| [62790] Apache Perl cgi module denial of service
5434| [62576] Apache Qpid exchange denial of service
5435| [62575] Apache Qpid AMQP denial of service
5436| [62354] Apache Qpid SSL denial of service
5437| [62235] Apache APR-util apr_brigade_split_line() denial of service
5438| [62181] Apache XML-RPC SAX Parser information disclosure
5439| [61721] Apache Traffic Server cache poisoning
5440| [61202] Apache Derby BUILTIN authentication functionality information disclosure
5441| [61186] Apache CouchDB Futon cross-site request forgery
5442| [61169] Apache CXF DTD denial of service
5443| [61070] Apache Jackrabbit search.jsp SQL injection
5444| [61006] Apache SLMS Quoting cross-site request forgery
5445| [60962] Apache Tomcat time cross-site scripting
5446| [60883] Apache mod_proxy_http information disclosure
5447| [60671] Apache HTTP Server mod_cache and mod_dav denial of service
5448| [60264] Apache Tomcat Transfer-Encoding denial of service
5449| [59746] Apache Axis2 axis2/axis2-admin page session hijacking
5450| [59588] Apache Axis2/Java XML DTD (Document Type Declaration) data denial of service
5451| [59413] Apache mod_proxy_http timeout information disclosure
5452| [59058] Apache MyFaces unencrypted view state cross-site scripting
5453| [58827] Apache Axis2 xsd file include
5454| [58790] Apache Axis2 modules cross-site scripting
5455| [58299] Apache ActiveMQ queueBrowse cross-site scripting
5456| [58169] Apache Tomcat Web Application Manager / Host Manager cross-site request forgery
5457| [58056] Apache ActiveMQ .jsp source code disclosure
5458| [58055] Apache Tomcat realm name information disclosure
5459| [58046] Apache HTTP Server mod_auth_shadow security bypass
5460| [57841] Apache Open For Business Project (OFBiz) subject cross-site scripting
5461| [57840] Apache Open For Business Project (OFBiz) multiple parameters cross-site scripting
5462| [57429] Apache CouchDB algorithms information disclosure
5463| [57398] Apache ActiveMQ Web console cross-site request forgery
5464| [57397] Apache ActiveMQ createDestination.action cross-site scripting
5465| [56653] Apache HTTP Server DNS spoofing
5466| [56652] Apache HTTP Server DNS cross-site scripting
5467| [56625] Apache HTTP Server request header information disclosure
5468| [56624] Apache HTTP Server mod_isapi orphaned callback pointer code execution
5469| [56623] Apache HTTP Server mod_proxy_ajp denial of service
5470| [55941] mod_proxy module for Apache ap_proxy_send_fb() buffer overflow
5471| [55857] Apache Tomcat WAR files directory traversal
5472| [55856] Apache Tomcat autoDeploy attribute security bypass
5473| [55855] Apache Tomcat WAR directory traversal
5474| [55210] Intuit component for Joomla! Apache information disclosure
5475| [54533] Apache Tomcat 404 error page cross-site scripting
5476| [54182] Apache Tomcat admin default password
5477| [53878] Apache Solr Search (solr) extension for TYPO3 unspecified cross-site scripting
5478| [53666] Apache HTTP Server Solaris pollset support denial of service
5479| [53650] Apache HTTP Server HTTP basic-auth module security bypass
5480| [53124] mod_proxy_ftp module for Apache HTTP header security bypass
5481| [53041] mod_proxy_ftp module for Apache denial of service
5482| [52540] Apache Portable Runtime and Apache Portable Utility library multiple buffer overflow
5483| [51953] Apache Tomcat Path Disclosure
5484| [51952] Apache Tomcat Path Traversal
5485| [51951] Apache stronghold-status Information Disclosure
5486| [51950] Apache stronghold-info Information Disclosure
5487| [51949] Apache PHP Source Code Disclosure
5488| [51948] Apache Multiviews Attack
5489| [51946] Apache JServ Environment Status Information Disclosure
5490| [51945] Apache error_log Information Disclosure
5491| [51944] Apache Default Installation Page Pattern Found
5492| [51943] Apache AXIS XML Parser echoheaders.jws Sample Web Service Denial of Service
5493| [51942] Apache AXIS XML External Entity File Retrieval
5494| [51941] Apache AXIS Sample Servlet Information Leak
5495| [51940] Apache access_log Information Disclosure
5496| [51626] Apache mod_deflate denial of service
5497| [51532] mod_proxy module for the Apache HTTP Server stream_reqbody_cl denial of service
5498| [51365] Apache Tomcat RequestDispatcher security bypass
5499| [51273] Apache HTTP Server Incomplete Request denial of service
5500| [51195] Apache Tomcat XML information disclosure
5501| [50994] Apache APR-util xml/apr_xml.c denial of service
5502| [50993] Apache APR-util apr_brigade_vprintf denial of service
5503| [50964] Apache APR-util apr_strmatch_precompile() denial of service
5504| [50930] Apache Tomcat j_security_check information disclosure
5505| [50928] Apache Tomcat AJP denial of service
5506| [50884] Apache HTTP Server XML ENTITY denial of service
5507| [50808] Apache HTTP Server AllowOverride privilege escalation
5508| [50108] Apache Struts s:a tag and s:url tag cross-site scripting
5509| [50059] Apache mod_proxy_ajp information disclosure
5510| [49951] Apache Tiles Expression Language (EL) expressions cross-site scripting
5511| [49925] Apache Geronimo Web Administrative Console cross-site request forgery
5512| [49924] Apache Geronimo console/portal/Server/Monitoring cross-site scripting
5513| [49921] Apache ActiveMQ Web interface cross-site scripting
5514| [49898] Apache Geronimo Services/Repository directory traversal
5515| [49725] Apache Tomcat mod_jk module information disclosure
5516| [49715] Apache mod_perl Apache::Status and Apache2::Status modules cross-site scripting
5517| [49712] Apache Struts unspecified cross-site scripting
5518| [49213] Apache Tomcat cal2.jsp cross-site scripting
5519| [48934] Apache Tomcat POST doRead method information disclosure
5520| [48211] Apache Tomcat header HTTP request smuggling
5521| [48163] libapache2-mod-auth-mysql module for Debian multibyte encoding SQL injection
5522| [48110] Apache Jackrabbit search.jsp and swr.jsp cross-site scripting
5523| [47709] Apache Roller "
5524| [47104] Novell Netware ApacheAdmin console security bypass
5525| [47086] Apache HTTP Server OS fingerprinting unspecified
5526| [46329] Apache Struts FilterDispatcher and DefaultStaticContentLoader class directory traversal
5527| [45791] Apache Tomcat RemoteFilterValve security bypass
5528| [44435] Oracle WebLogic Apache Connector buffer overflow
5529| [44411] Apache Tomcat allowLinking UTF-8 directory traversal
5530| [44223] Apache HTTP Server mod_proxy_ftp cross-site scripting
5531| [44156] Apache Tomcat RequestDispatcher directory traversal
5532| [44155] Apache Tomcat HttpServletResponse.sendError() cross-site scripting
5533| [43885] Oracle WebLogic Server Apache Connector buffer overflow
5534| [42987] Apache HTTP Server mod_proxy module denial of service
5535| [42915] Apache Tomcat JSP files path disclosure
5536| [42914] Apache Tomcat MS-DOS path disclosure
5537| [42892] Apache Tomcat unspecified unauthorized access
5538| [42816] Apache Tomcat Host Manager cross-site scripting
5539| [42303] Apache 403 error cross-site scripting
5540| [41618] Apache-SSL ExpandCert() authentication bypass
5541| [40761] Apache Derby RDBNAM parameter and DatabaseMetaData.getURL information disclosure
5542| [40736] Apache Tomcat HTTP/1.1 connector information disclosure
5543| [40614] Apache mod_jk2 HTTP Host header buffer overflow
5544| [40562] Apache Geronimo init information disclosure
5545| [40478] Novell Web Manager webadmin-apache.conf security bypass
5546| [40411] Apache Tomcat exception handling information disclosure
5547| [40409] Apache Tomcat native (APR based) connector weak security
5548| [40403] Apache Tomcat quotes and %5C cookie information disclosure
5549| [40388] Sun Java Plug-In org.apache.crimson.tree.XmlDocument security bypass
5550| [39893] Apache HTTP Server mod_negotiation HTTP response splitting
5551| [39867] Apache HTTP Server mod_negotiation cross-site scripting
5552| [39804] Apache Tomcat SingleSignOn information disclosure
5553| [39615] Apache HTTP Server mod_proxy_ftp.c UTF-7 cross-site scripting
5554| [39612] Apache HTTP Server mod_proxy_balancer buffer overflow
5555| [39608] Apache HTTP Server balancer manager cross-site request forgery
5556| [39476] Apache mod_proxy_balancer balancer_handler function denial of service
5557| [39474] Apache HTTP Server mod_proxy_balancer cross-site scripting
5558| [39472] Apache HTTP Server mod_status cross-site scripting
5559| [39201] Apache Tomcat JULI logging weak security
5560| [39158] Apache HTTP Server Windows SMB shares information disclosure
5561| [39001] Apache HTTP Server mod_imap and mod_imagemap module cross-site scripting
5562| [38951] Apache::AuthCAS Perl module cookie SQL injection
5563| [38800] Apache HTTP Server 413 error page cross-site scripting
5564| [38211] Apache Geronimo SQLLoginModule authentication bypass
5565| [37243] Apache Tomcat WebDAV directory traversal
5566| [37178] RHSA update for Apache HTTP Server mod_status module cross-site scripting not installed
5567| [37177] RHSA update for Apache HTTP Server Apache child process denial of service not installed
5568| [37119] RHSA update for Apache mod_auth_kerb off-by-one buffer overflow not installed
5569| [37100] RHSA update for Apache and IBM HTTP Server Expect header cross-site scripting not installed
5570| [36782] Apache Geronimo MEJB unauthorized access
5571| [36586] Apache HTTP Server UTF-7 cross-site scripting
5572| [36468] Apache Geronimo LoginModule security bypass
5573| [36467] Apache Tomcat functions.jsp cross-site scripting
5574| [36402] Apache Tomcat calendar cross-site request forgery
5575| [36354] Apache HTTP Server mod_proxy module denial of service
5576| [36352] Apache HTTP Server ap_proxy_date_canon() denial of service
5577| [36336] Apache Derby lock table privilege escalation
5578| [36335] Apache Derby schema privilege escalation
5579| [36006] Apache Tomcat "
5580| [36001] Apache Tomcat Host Manager Servlet alias cross-site scripting
5581| [35999] Apache Tomcat \"
5582| [35795] Apache Tomcat CookieExample cross-site scripting
5583| [35536] Apache Tomcat SendMailServlet example cross-site scripting
5584| [35384] Apache HTTP Server mod_cache module denial of service
5585| [35097] Apache HTTP Server mod_status module cross-site scripting
5586| [35095] Apache HTTP Server Prefork MPM module denial of service
5587| [34984] Apache HTTP Server recall_headers information disclosure
5588| [34966] Apache HTTP Server MPM content spoofing
5589| [34965] Apache HTTP Server MPM information disclosure
5590| [34963] Apache HTTP Server MPM multiple denial of service
5591| [34872] Apache MyFaces Tomahawk autoscroll parameter cross-site scripting
5592| [34869] Apache Tomcat JSP example Web application cross-site scripting
5593| [34868] Apache Tomcat Manager and Host Manager cross-site scripting
5594| [34496] Apache Tomcat JK Connector security bypass
5595| [34377] Apache Tomcat hello.jsp cross-site scripting
5596| [34212] Apache Tomcat SSL configuration security bypass
5597| [34210] Apache Tomcat Accept-Language cross-site scripting
5598| [34209] Apache Tomcat calendar application cross-site scripting
5599| [34207] Apache Tomcat implicit-objects.jsp cross-site scripting
5600| [34167] Apache Axis WSDL file path disclosure
5601| [34068] Apache Tomcat AJP connector information disclosure
5602| [33584] Apache HTTP Server suEXEC privilege escalation
5603| [32988] Apache Tomcat proxy module directory traversal
5604| [32794] Apache Tomcat JK Web Server Connector map_uri_to_worker() buffer overflow
5605| [32708] Debian Apache tty privilege escalation
5606| [32441] ApacheStats extract() PHP call unspecified
5607| [32128] Apache Tomcat default account
5608| [31680] Apache Tomcat RequestParamExample cross-site scripting
5609| [31649] Apache Tomcat Sample Servlet TroubleShooter detected
5610| [31557] BEA WebLogic Server and WebLogic Express Apache proxy plug-in denial of service
5611| [31236] Apache HTTP Server htpasswd.c strcpy buffer overflow
5612| [30456] Apache mod_auth_kerb off-by-one buffer overflow
5613| [29550] Apache mod_tcl set_var() format string
5614| [28620] Apache and IBM HTTP Server Expect header cross-site scripting
5615| [28357] Apache HTTP Server mod_alias script source information disclosure
5616| [28063] Apache mod_rewrite off-by-one buffer overflow
5617| [27902] Apache Tomcat URL information disclosure
5618| [26786] Apache James SMTP server denial of service
5619| [25680] libapache2 /tmp/svn file upload
5620| [25614] Apache Struts lookupMap cross-site scripting
5621| [25613] Apache Struts ActionForm denial of service
5622| [25612] Apache Struts isCancelled() security bypass
5623| [24965] Apache mod_python FileSession command execution
5624| [24716] Apache James spooler memory leak denial of service
5625| [24159] Apache Geronimo Web-Access-Log Viewer cross-site scripting
5626| [24158] Apache Geronimo jsp-examples cross-site scripting
5627| [24030] Apache auth_ldap module multiple format strings
5628| [24008] Apache mod_ssl custom error message denial of service
5629| [24003] Apache mod_auth_pgsql module multiple syslog format strings
5630| [23612] Apache mod_imap referer field cross-site scripting
5631| [23173] Apache Struts error message cross-site scripting
5632| [22942] Apache Tomcat directory listing denial of service
5633| [22858] Apache Multi-Processing Module code allows denial of service
5634| [22602] RHSA-2005:582 updates for Apache httpd not installed
5635| [22520] Apache mod-auth-shadow "
5636| [22466] ApacheTop symlink
5637| [22109] Apache HTTP Server ssl_engine_kernel client certificate validation
5638| [22006] Apache HTTP Server byte-range filter denial of service
5639| [21567] Apache mod_ssl off-by-one buffer overflow
5640| [21195] Apache HTTP Server header HTTP request smuggling
5641| [20383] Apache HTTP Server htdigest buffer overflow
5642| [19681] Apache Tomcat AJP12 request denial of service
5643| [18993] Apache HTTP server check_forensic symlink attack
5644| [18790] Apache Tomcat Manager cross-site scripting
5645| [18349] Apache HTTP server Apple HFS+ filesystem obtain information
5646| [18348] Apache HTTP server Apple HFS+ filesystem .DS_Store and .ht file disclosure
5647| [18347] Apache HTTP server Apple Mac OS X Server mod_digest_apple module could allow an attacker to replay responses
5648| [17961] Apache Web server ServerTokens has not been set
5649| [17930] Apache HTTP Server HTTP GET request denial of service
5650| [17785] Apache mod_include module buffer overflow
5651| [17671] Apache HTTP Server SSLCipherSuite bypass restrictions
5652| [17473] Apache HTTP Server Satisfy directive allows access to resources
5653| [17413] Apache htpasswd buffer overflow
5654| [17384] Apache HTTP Server environment variable configuration file buffer overflow
5655| [17382] Apache HTTP Server IPv6 apr_util denial of service
5656| [17366] Apache HTTP Server mod_dav module LOCK denial of service
5657| [17273] Apache HTTP Server speculative mode denial of service
5658| [17200] Apache HTTP Server mod_ssl denial of service
5659| [16890] Apache HTTP Server server-info request has been detected
5660| [16889] Apache HTTP Server server-status request has been detected
5661| [16705] Apache mod_ssl format string attack
5662| [16524] Apache HTTP Server ap_get_mime_headers_core denial of service
5663| [16387] Apache HTTP Server mod_proxy Content-Length buffer overflow
5664| [16230] Apache HTTP Server PHP denial of service
5665| [16214] Apache mod_ssl ssl_util_uuencode_binary buffer overflow
5666| [15958] Apache HTTP Server authentication modules memory corruption
5667| [15547] Apache HTTP Server mod_disk_cache local information disclosure
5668| [15540] Apache HTTP Server socket starvation denial of service
5669| [15467] Novell GroupWise WebAccess using Apache Web server allows viewing of files on the server
5670| [15422] Apache HTTP Server mod_access information disclosure
5671| [15419] Apache HTTP Server mod_ssl plain HTTP request denial of service
5672| [15293] Apache for Cygwin "
5673| [15065] Apache-SSL has a default password
5674| [15041] Apache HTTP Server mod_digest module could allow an attacker to replay responses
5675| [15015] Apache httpd server httpd.conf could allow a local user to bypass restrictions
5676| [14751] Apache Mod_python output filter information disclosure
5677| [14125] Apache HTTP Server mod_userdir module information disclosure
5678| [14075] Apache HTTP Server mod_php file descriptor leak
5679| [13703] Apache HTTP Server account
5680| [13689] Apache HTTP Server configuration allows symlinks
5681| [13688] Apache HTTP Server configuration allows SSI
5682| [13687] Apache HTTP Server Server: header value
5683| [13685] Apache HTTP Server ServerTokens value
5684| [13684] Apache HTTP Server ServerSignature value
5685| [13672] Apache HTTP Server config allows directory autoindexing
5686| [13671] Apache HTTP Server default content
5687| [13670] Apache HTTP Server config file directive references outside content root
5688| [13668] Apache HTTP Server httpd not running in chroot environment
5689| [13666] Apache HTTP Server CGI directory contains possible command interpreter or compiler
5690| [13664] Apache HTTP Server config file contains ScriptAlias entry
5691| [13663] Apache HTTP Server CGI support modules loaded
5692| [13661] Apache HTTP Server config file contains AddHandler entry
5693| [13660] Apache HTTP Server 500 error page not CGI script
5694| [13659] Apache HTTP Server 413 error page not CGI script
5695| [13658] Apache HTTP Server 403 error page not CGI script
5696| [13657] Apache HTTP Server 401 error page not CGI script
5697| [13552] Apache HTTP Server mod_cgid module information disclosure
5698| [13550] Apache GET request directory traversal
5699| [13516] Apache Cocoon XMLForm and JXForm could allow execution of code
5700| [13499] Apache Cocoon directory traversal allows downloading of boot.ini file
5701| [13429] Apache Tomcat non-HTTP request denial of service
5702| [13400] Apache HTTP server mod_alias and mod_rewrite buffer overflow
5703| [13295] Apache weak password encryption
5704| [13254] Apache Tomcat .jsp cross-site scripting
5705| [13125] Apache::Gallery Inline::C could allow arbitrary code execution
5706| [13086] Apache Jakarta Tomcat mod_jk format string allows remote access
5707| [12681] Apache HTTP Server mod_proxy could allow mail relaying
5708| [12662] Apache HTTP Server rotatelogs denial of service
5709| [12554] Apache Tomcat stores password in plain text
5710| [12553] Apache HTTP Server redirects and subrequests denial of service
5711| [12552] Apache HTTP Server FTP proxy server denial of service
5712| [12551] Apache HTTP Server prefork MPM denial of service
5713| [12550] Apache HTTP Server weaker than expected encryption
5714| [12549] Apache HTTP Server type-map file denial of service
5715| [12206] Apache Tomcat /opt/tomcat directory insecure permissions
5716| [12102] Apache Jakarta Tomcat MS-DOS device name request denial of service
5717| [12091] Apache HTTP Server apr_password_validate denial of service
5718| [12090] Apache HTTP Server apr_psprintf code execution
5719| [11804] Apache HTTP Server mod_access_referer denial of service
5720| [11750] Apache HTTP Server could leak sensitive file descriptors
5721| [11730] Apache HTTP Server error log and access log terminal escape sequence injection
5722| [11703] Apache long slash path allows directory listing
5723| [11695] Apache HTTP Server LF (Line Feed) denial of service
5724| [11694] Apache HTTP Server filestat.c denial of service
5725| [11438] Apache HTTP Server MIME message boundaries information disclosure
5726| [11412] Apache HTTP Server error log terminal escape sequence injection
5727| [11196] Apache Tomcat examples and ROOT Web applications cross-site scripting
5728| [11195] Apache Tomcat web.xml could be used to read files
5729| [11194] Apache Tomcat URL appended with a null character could list directories
5730| [11139] Apache HTTP Server mass virtual hosting with mod_rewrite or mod_vhost_alias could allow an attacker to obtain files
5731| [11126] Apache HTTP Server illegal character file disclosure
5732| [11125] Apache HTTP Server DOS device name HTTP POST code execution
5733| [11124] Apache HTTP Server DOS device name denial of service
5734| [11088] Apache HTTP Server mod_vhost_alias CGI source disclosure
5735| [10938] Apache HTTP Server printenv test CGI cross-site scripting
5736| [10771] Apache Tomcat mod_jk module multiple HTTP GET request buffer overflow
5737| [10575] Apache mod_php module could allow an attacker to take over the httpd process
5738| [10499] Apache HTTP Server WebDAV HTTP POST view source
5739| [10457] Apache HTTP Server mod_ssl "
5740| [10415] Apache HTTP Server htdigest insecure system() call could allow command execution
5741| [10414] Apache HTTP Server htdigest multiple buffer overflows
5742| [10413] Apache HTTP Server htdigest temporary file race condition
5743| [10412] Apache HTTP Server htpasswd temporary file race condition
5744| [10376] Apache Tomcat invoker servlet used in conjunction with the default servlet reveals source code
5745| [10348] Apache Tomcat HTTP GET request DOS device reference could cause a denial of service
5746| [10281] Apache HTTP Server ab.c ApacheBench long response buffer overflow
5747| [10280] Apache HTTP Server shared memory scorecard overwrite
5748| [10263] Apache Tomcat mod_jk or mod_jserv connector directory disclosure
5749| [10241] Apache HTTP Server Host: header cross-site scripting
5750| [10230] Slapper worm variants A, B, and C target OpenSSL/Apache systems
5751| [10208] Apache HTTP Server mod_dav denial of service
5752| [10206] HP VVOS Apache mod_ssl denial of service
5753| [10200] Apache HTTP Server stderr denial of service
5754| [10175] Apache Tomcat org.apache.catalina.servlets.DefaultServlet reveals source code
5755| [10169] Slapper worm variant (Slapper.C) targets OpenSSL/Apache systems
5756| [10154] Slapper worm variant (Slapper.B) targets OpenSSL/Apache systems
5757| [10098] Slapper worm targets OpenSSL/Apache systems
5758| [9876] Apache HTTP Server cgi/cgid request could disclose the path to a requested script
5759| [9875] Apache HTTP Server .var file request could disclose installation path
5760| [9863] Apache Tomcat web.xml file could allow a remote attacker to bypass restrictions
5761| [9808] Apache HTTP Server non-Unix version URL encoded directory traversal
5762| [9623] Apache HTTP Server ap_log_rerror() path disclosure
5763| [9520] Apache Tomcat /servlet/ mapping cross-site scripting
5764| [9415] Apache HTTP Server mod_ssl .htaccess off-by-one buffer overflow
5765| [9396] Apache Tomcat null character to threads denial of service
5766| [9394] Apache Tomcat HTTP request for LPT9 reveals Web root path
5767| [9249] Apache HTTP Server chunked encoding heap buffer overflow
5768| [9208] Apache Tomcat sample file requests could reveal directory listing and path to Web root directory
5769| [8932] Apache Tomcat example class information disclosure
5770| [8633] Apache HTTP Server with mod_rewrite could allow an attacker to bypass directives
5771| [8629] Apache HTTP Server double-reverse DNS lookup spoofing
5772| [8589] Apache HTTP Server for Windows DOS batch file remote command execution
5773| [8457] Oracle9i Application Server Apache PL/SQL HTTP Location header buffer overflow
5774| [8455] Oracle9i Application Server default installation could allow an attacker to access certain Apache Services
5775| [8400] Apache HTTP Server mod_frontpage buffer overflows
5776| [8326] Apache HTTP Server multiple MIME headers (sioux) denial of service
5777| [8308] Apache "
5778| [8275] Apache HTTP Server with Multiviews enabled could disclose directory contents
5779| [8119] Apache and PHP OPTIONS request reveals "
5780| [8054] Apache is running on the system
5781| [8029] Mandrake Linux default Apache configuration could allow an attacker to browse files and directories
5782| [8027] Mandrake Linux default Apache configuration has remote management interface enabled
5783| [8026] Mandrake Linux Apache sample programs could disclose sensitive information about the server
5784| [7836] Apache HTTP Server log directory denial of service
5785| [7815] Apache for Windows "
5786| [7810] Apache HTTP request could result in unexpected behavior
5787| [7599] Apache Tomcat reveals installation path
5788| [7494] Apache "
5789| [7419] Apache Web Server could allow remote attackers to overwrite .log files
5790| [7363] Apache Web Server hidden HTTP requests
5791| [7249] Apache mod_proxy denial of service
5792| [7129] Linux with Apache Web server could allow an attacker to determine if a specified username exists
5793| [7103] Apple Mac OS X used with Apache Web server could disclose directory contents
5794| [7059] Apache "
5795| [7057] Apache "
5796| [7056] Apache "
5797| [7055] Apache "
5798| [7054] Apache "
5799| [6997] Apache Jakarta Tomcat error message may reveal information
5800| [6971] Apache Jakarta Tomcat may reveal JSP source code with missing HTTP protocol specification
5801| [6970] Apache crafted HTTP request could reveal the internal IP address
5802| [6921] Apache long slash path allows directory listing
5803| [6687] Apple Mac OS X used with Apache Web server could allow arbitrary file disclosure
5804| [6527] Apache Web Server for Windows and OS2 denial of service
5805| [6316] Apache Jakarta Tomcat may reveal JSP source code
5806| [6305] Apache Jakarta Tomcat directory traversal
5807| [5926] Linux Apache symbolic link
5808| [5659] Apache Web server discloses files when used with php script
5809| [5310] Apache mod_rewrite allows attacker to view arbitrary files
5810| [5204] Apache WebDAV directory listings
5811| [5197] Apache Web server reveals CGI script source code
5812| [5160] Apache Jakarta Tomcat default installation
5813| [5099] Trustix Secure Linux installs Apache with world writable access
5814| [4968] Apache Jakarta Tomcat snoop servlet gives out information which could be used in attack
5815| [4967] Apache Jakarta Tomcat 404 error reveals the pathname of the requested file
5816| [4931] Apache source.asp example file allows users to write to files
5817| [4575] IBM HTTP Server running Apache allows users to directory listing and file retrieval
5818| [4205] Apache Jakarta Tomcat delivers file contents
5819| [2084] Apache on Debian by default serves the /usr/doc directory
5820| [1630] MessageMedia UnityMail and Apache Web server MIME header flood denial of service
5821| [697] Apache HTTP server beck exploit
5822| [331] Apache cookies buffer overflow
5823|
5824| Exploit-DB - https://www.exploit-db.com:
5825| [31130] Apache Tomcat <= 6.0.15 Cookie Quote Handling Remote Information Disclosure Vulnerability
5826| [31052] Apache <= 2.2.6 'mod_negotiation' HTML Injection and HTTP Response Splitting Vulnerability
5827| [30901] Apache HTTP Server 2.2.6 Windows Share PHP File Extension Mapping Information Disclosure Vulnerability
5828| [30835] Apache HTTP Server <= 2.2.4 413 Error HTTP Request Method Cross-Site Scripting Weakness
5829| [30563] Apache Tomcat <= 5.5.15 Cal2.JSP Cross-Site Scripting Vulnerability
5830| [30496] Apache Tomcat <= 6.0.13 Cookie Handling Quote Delimiter Session ID Disclosure
5831| [30495] Apache Tomcat <= 6.0.13 Host Manager Servlet Cross Site Scripting Vulnerability
5832| [30191] Apache MyFaces Tomahawk JSF Framework 1.1.5 Autoscroll Parameter Cross Site Scripting Vulnerability
5833| [30189] Apache Tomcat <= 6.0.13 JSP Example Web Applications Cross Site Scripting Vulnerability
5834| [30052] Apache Tomcat 6.0.10 Documentation Sample Application Multiple Cross-Site Scripting Vulnerabilities
5835| [29930] Apache AXIS 1.0 Non-Existent WSDL Path Information Disclosure Vulnerability
5836| [29859] Apache Roller OGNL Injection
5837| [29739] Apache HTTP Server Tomcat 5.x/6.0.x Directory Traversal Vulnerability
5838| [29435] Apache Tomcat 5.5.25 - CSRF Vulnerabilities
5839| [29316] Apache + PHP 5.x - Remote Code Execution (Multithreaded Scanner) (2)
5840| [29290] Apache / PHP 5.x Remote Code Execution Exploit
5841| [28713] Apache Tomcat/JBoss EJBInvokerServlet / JMXInvokerServlet (RMI over HTTP) Marshalled Object RCE
5842| [28424] Apache 2.x HTTP Server Arbitrary HTTP Request Headers Security Weakness
5843| [28365] Apache 2.2.2 CGI Script Source Code Information Disclosure Vulnerability
5844| [28254] Apache Tomcat 5 Information Disclosure Vulnerability
5845| [27915] Apache James 2.2 SMTP Denial of Service Vulnerability
5846| [27397] Apache suEXEC Privilege Elevation / Information Disclosure
5847| [27135] Apache Struts 2 DefaultActionMapper Prefixes OGNL Code Execution
5848| [27096] Apache Geronimo 1.0 Error Page XSS
5849| [27095] Apache Tomcat / Geronimo 1.0 Sample Script cal2.jsp time Parameter XSS
5850| [26710] Apache CXF prior to 2.5.10, 2.6.7 and 2.7.4 - Denial of Service
5851| [26542] Apache Struts 1.2.7 Error Response Cross-Site Scripting Vulnerability
5852| [25986] Plesk Apache Zeroday Remote Exploit
5853| [25980] Apache Struts includeParams Remote Code Execution
5854| [25625] Apache 1.3.x HTDigest Realm Command Line Argument Buffer Overflow Vulnerability (2)
5855| [25624] Apache 1.3.x HTDigest Realm Command Line Argument Buffer Overflow Vulnerability (1)
5856| [24874] Apache Struts ParametersInterceptor Remote Code Execution
5857| [24744] Apache Rave 0.11 - 0.20 - User Information Disclosure
5858| [24694] Apache 1.3.x mod_include Local Buffer Overflow Vulnerability
5859| [24590] Apache 2.0.x mod_ssl Remote Denial of Service Vulnerability
5860| [23751] Apache Cygwin 1.3.x/2.0.x Directory Traversal Vulnerability
5861| [23581] Apache 2.0.4x mod_perl Module File Descriptor Leakage Vulnerability
5862| [23482] Apache 2.0.4x mod_php Module File Descriptor Leakage Vulnerability (2)
5863| [23481] Apache 2.0.4x mod_php Module File Descriptor Leakage Vulnerability (1)
5864| [23296] Red Hat Apache 2.0.40 Directory Index Default Configuration Error
5865| [23282] apache cocoon 2.14/2.2 - Directory Traversal vulnerability
5866| [23245] Apache Tomcat 4.0.x Non-HTTP Request Denial of Service Vulnerability
5867| [23119] Apache::Gallery 0.4/0.5/0.6 Insecure Local File Storage Privilege Escalation Vulnerability
5868| [22505] Apache Mod_Access_Referer 1.0.2 NULL Pointer Dereference Denial of Service Vulnerability
5869| [22205] Apache Tomcat 3.x Null Byte Directory/File Disclosure Vulnerability
5870| [22191] Apache Web Server 2.0.x MS-DOS Device Name Denial of Service Vulnerability
5871| [22068] Apache 1.3.x,Tomcat 4.0.x/4.1.x Mod_JK Chunked Encoding Denial of Service Vulnerability
5872| [21885] Apache 1.3/2.0.x Server Side Include Cross Site Scripting Vulnerability
5873| [21882] Apache Tomcat 3.2 Directory Disclosure Vulnerability
5874| [21854] Apache 2.0.39/40 Oversized STDERR Buffer Denial of Service Vulnerability
5875| [21853] Apache Tomcat 3/4 DefaultServlet File Disclosure Vulnerability
5876| [21734] Apache Tomcat 4.1 JSP Request Cross Site Scripting Vulnerability
5877| [21719] Apache 2.0 Path Disclosure Vulnerability
5878| [21697] Apache 2.0 Encoded Backslash Directory Traversal Vulnerability
5879| [21605] Apache Tomcat 4.0.3 DoS Device Name Cross Site Scripting Vulnerability
5880| [21604] Apache Tomcat 4.0.3 Servlet Mapping Cross Site Scripting Vulnerability
5881| [21560] Apache 1.x/2.0.x Chunked-Encoding Memory Corruption Vulnerability (2)
5882| [21559] Apache 1.x/2.0.x Chunked-Encoding Memory Corruption Vulnerability (1)
5883| [21534] Apache Tomcat 3/4 JSP Engine Denial of Service Vulnerability
5884| [21492] Apache Tomcat 3.2.3/3.2.4 RealPath.JSP Malformed Request Information Disclosure
5885| [21491] Apache Tomcat 3.2.3/3.2.4 Example Files Web Root Path Disclosure
5886| [21490] Apache Tomcat 3.2.3/3.2.4 Source.JSP Malformed Request Information Disclosure
5887| [21412] Apache Tomcat 4.0/4.1 Servlet Path Disclosure Vulnerability
5888| [21350] Apache Win32 1.3.x/2.0.x Batch File Remote Command Execution Vulnerability
5889| [21204] Apache 1.3.20 Win32 PHP.EXE Remote File Disclosure Vulnerability
5890| [21112] Red Hat Linux 7.0 Apache Remote Username Enumeration Vulnerability
5891| [21067] Apache 1.0/1.2/1.3 Server Address Disclosure Vulnerability
5892| [21002] Apache 1.3 Possible Directory Index Disclosure Vulnerability
5893| [20911] Apache 1.3.14 Mac File Protection Bypass Vulnerability
5894| [20716] apache tomcat 3.0 - Directory Traversal vulnerability
5895| [20695] Apache 1.3 Artificially Long Slash Path Directory Listing Vulnerability (4)
5896| [20694] Apache 1.3 Artificially Long Slash Path Directory Listing Vulnerability (3)
5897| [20693] Apache 1.3 Artificially Long Slash Path Directory Listing Vulnerability (2)
5898| [20692] Apache 1.3 Artificially Long Slash Path Directory Listing Vulnerability (1)
5899| [20595] NCSA 1.3/1.4.x/1.5,Apache httpd 0.8.11/0.8.14 ScriptAlias Source Retrieval Vulnerability
5900| [20558] Apache 1.2 Web Server DoS Vulnerability
5901| [20466] Apache 1.3 Web Server with Php 3 File Disclosure Vulnerability
5902| [20435] Apache 0.8.x/1.0.x,NCSA httpd 1.x test-cgi Directory Listing Vulnerability
5903| [20272] Apache 1.2.5/1.3.1,UnityMail 2.0 MIME Header DoS Vulnerability
5904| [20210] Apache 1.3.12 WebDAV Directory Listings Vulnerability
5905| [20131] Apache Tomcat 3.1 Path Revealing Vulnerability
5906| [19975] Apache 1.3.6/1.3.9/1.3.11/1.3.12/1.3.20 Root Directory Access Vulnerability
5907| [19828] Cobalt RaQ 2.0/3.0 Apache .htaccess Disclosure Vulnerability
5908| [19536] Apache <= 1.1,NCSA httpd <= 1.5.2,Netscape Server 1.12/1.1/2.0 a nph-test-cgi Vulnerability
5909| [19231] PHP apache_request_headers Function Buffer Overflow
5910| [18984] Apache Struts <= 2.2.1.1 - Remote Command Execution
5911| [18897] Oracle Weblogic Apache Connector POST Request Buffer Overflow
5912| [18619] Apache Tomcat Remote Exploit (PUT Request) and Account Scanner
5913| [18452] Apache Struts Multiple Persistent Cross-Site Scripting Vulnerabilities
5914| [18442] Apache httpOnly Cookie Disclosure
5915| [18329] Apache Struts2 <= 2.3.1 - Multiple Vulnerabilities
5916| [18221] Apache HTTP Server Denial of Service
5917| [17969] Apache mod_proxy Reverse Proxy Exposure Vulnerability PoC
5918| [17696] Apache httpd Remote Denial of Service (memory exhaustion)
5919| [17691] Apache Struts < 2.2.0 - Remote Command Execution
5920| [16798] Apache mod_jk 1.2.20 Buffer Overflow
5921| [16782] Apache Win32 Chunked Encoding
5922| [16752] Apache module mod_rewrite LDAP protocol Buffer Overflow
5923| [16317] Apache Tomcat Manager Application Deployer Authenticated Code Execution
5924| [15710] Apache Archiva 1.0 - 1.3.1 CSRF Vulnerability
5925| [15319] Apache 2.2 (Windows) Local Denial of Service
5926| [14617] Apache JackRabbit 2.0.0 webapp XPath Injection
5927| [14489] Apache Tomcat < 6.0.18 utf8 - Directory Traversal vulnerability
5928| [12721] Apache Axis2 1.4.1 - Local File Inclusion Vulnerability
5929| [12689] Authenticated Cross-Site Scripting Vulnerability (XSS) within Apache Axis2 administration console
5930| [12343] Apache Tomcat 5.5.0 to 5.5.29 & 6.0.0 to 6.0.26 - Information Disclosure Vulnerability
5931| [12330] Apache OFBiz - Multiple XSS
5932| [12264] Apache OFBiz - FULLADMIN Creator PoC Payload
5933| [12263] Apache OFBiz - SQL Remote Execution PoC Payload
5934| [11662] Apache Spamassassin Milter Plugin Remote Root Command Execution
5935| [11650] Apache 2.2.14 mod_isapi Dangling Pointer Remote SYSTEM Exploit
5936| [10811] Joomla.Tutorials GHDB: Apache directory listing Download Vulnerability
5937| [10292] Apache Tomcat 3.2.1 - 404 Error Page Cross Site Scripting Vulnerability
5938| [9995] Apache Tomcat Form Authentication Username Enumeration Weakness
5939| [9994] Apache Tomcat Cookie Quote Handling Remote Information Disclosure Vulnerability
5940| [9993] Apache mod_perl 'Apache::Status' and 'Apache2::Status' Cross Site Scripting Vulnerability
5941| [8842] Apache mod_dav / svn Remote Denial of Service Exploit
5942| [8458] Apache Geronimo <= 2.1.3 - Multiple Directory Traversal Vulnerabilities
5943| [7264] Apache Tomcat runtime.getRuntime().exec() Privilege Escalation (win)
5944| [6229] apache tomcat < 6.0.18 utf8 - Directory Traversal vulnerability
5945| [6100] Apache mod_jk 1.2.19 Remote Buffer Overflow Exploit (win32)
5946| [6089] Bea Weblogic Apache Connector Code Exec / Denial of Service Exploit
5947| [5386] Apache Tomcat Connector jk2-2.0.2 (mod_jk2) Remote Overflow Exploit
5948| [5330] Apache 2.0 mod_jk2 2.0.2 - Remote Buffer Overflow Exploit (win32)
5949| [4552] Apache Tomcat (webdav) Remote File Disclosure Exploit (ssl support)
5950| [4530] Apache Tomcat (webdav) Remote File Disclosure Exploit
5951| [4162] Apache Tomcat Connector (mod_jk) Remote Exploit (exec-shield)
5952| [4093] Apache mod_jk 1.2.19/1.2.20 Remote Buffer Overflow Exploit
5953| [3996] Apache 2.0.58 mod_rewrite Remote Overflow Exploit (win2k3)
5954| [3680] Apache Mod_Rewrite Off-by-one Remote Overflow Exploit (win32)
5955| [3384] Ubuntu/Debian Apache 1.3.33/1.3.34 (CGI TTY) Local Root Exploit
5956| [2237] Apache < 1.3.37, 2.0.59, 2.2.3 (mod_rewrite) Remote Overflow PoC
5957| [2061] Apache Tomcat < 5.5.17 Remote Directory Listing Vulnerability
5958| [1056] Apache <= 2.0.49 Arbitrary Long HTTP Headers Denial of Service
5959| [855] Apache <= 2.0.52 HTTP GET request Denial of Service Exploit
5960| [764] Apache OpenSSL - Remote Exploit (Multiple Targets) (OpenFuckV2.c)
5961| [587] Apache <= 1.3.31 mod_include Local Buffer Overflow Exploit
5962| [466] htpasswd Apache 1.3.31 - Local Exploit
5963| [371] Apache HTTPd Arbitrary Long HTTP Headers DoS (c version)
5964| [360] Apache HTTPd Arbitrary Long HTTP Headers DoS
5965| [132] Apache 1.3.x - 2.0.48 - mod_userdir Remote Users Disclosure Exploit
5966| [126] Apache mod_gzip (with debug_mode) <= 1.2.26.1a Remote Exploit
5967| [67] Apache 1.3.x mod_mylo Remote Code Execution Exploit
5968| [38] Apache <= 2.0.45 APR Remote Exploit -Apache-Knacker.pl
5969| [34] Webfroot Shoutbox < 2.32 (Apache) Remote Exploit
5970| [11] Apache <= 2.0.44 Linux Remote Denial of Service Exploit
5971| [9] Apache HTTP Server 2.x Memory Leak Exploit
5972|
5973| OpenVAS (Nessus) - http://www.openvas.org:
5974| [902924] Apache Struts2 Showcase Skill Name Remote Code Execution Vulnerability
5975| [902837] PHP 'apache_request_headers()' Function Buffer Overflow Vulnerability (Windows)
5976| [902830] Apache HTTP Server 'httpOnly' Cookie Information Disclosure Vulnerability
5977| [902664] Apache Traffic Server HTTP Host Header Denial of Service Vulnerability
5978| [901203] Apache httpd Web Server Range Header Denial of Service Vulnerability
5979| [901110] Apache ActiveMQ Source Code Information Disclosure Vulnerability
5980| [901105] Apache OFBiz Multiple Cross Site Scripting Vulnerabilities
5981| [900842] Apache 'mod_proxy_ftp' Module Command Injection Vulnerability (Linux)
5982| [900841] Apache 'mod_proxy_ftp' Module Denial Of Service Vulnerability (Linux)
5983| [900573] Apache APR-Utils XML Parser Denial of Service Vulnerability
5984| [900572] Apache APR-Utils Multiple Denial of Service Vulnerabilities
5985| [900571] Apache APR-Utils Version Detection
5986| [900499] Apache mod_proxy_ajp Information Disclosure Vulnerability
5987| [900496] Apache Tiles Multiple XSS Vulnerability
5988| [900493] Apache Tiles Version Detection
5989| [900107] Apache mod_proxy_ftp Wildcard Characters XSS Vulnerability
5990| [900021] Apache Tomcat Cross-Site Scripting and Security Bypass Vulnerabilities
5991| [880086] CentOS Update for apache CESA-2008:0004-01 centos2 i386
5992| [870175] RedHat Update for apache RHSA-2008:0004-01
5993| [864591] Fedora Update for apache-poi FEDORA-2012-10835
5994| [864383] Fedora Update for apache-commons-compress FEDORA-2012-8428
5995| [864280] Fedora Update for apache-commons-compress FEDORA-2012-8465
5996| [864250] Fedora Update for apache-poi FEDORA-2012-7683
5997| [864249] Fedora Update for apache-poi FEDORA-2012-7686
5998| [863993] Fedora Update for apache-commons-daemon FEDORA-2011-10880
5999| [863466] Fedora Update for apache-commons-daemon FEDORA-2011-10936
6000| [855821] Solaris Update for Apache 1.3 122912-19
6001| [855812] Solaris Update for Apache 1.3 122911-19
6002| [855737] Solaris Update for Apache 1.3 122911-17
6003| [855731] Solaris Update for Apache 1.3 122912-17
6004| [855695] Solaris Update for Apache 1.3 122911-16
6005| [855645] Solaris Update for Apache 1.3 122912-16
6006| [855587] Solaris Update for kernel update and Apache 108529-29
6007| [855566] Solaris Update for Apache 116973-07
6008| [855531] Solaris Update for Apache 116974-07
6009| [855524] Solaris Update for Apache 2 120544-14
6010| [855494] Solaris Update for Apache 1.3 122911-15
6011| [855478] Solaris Update for Apache Security 114145-11
6012| [855472] Solaris Update for Apache Security 113146-12
6013| [855179] Solaris Update for Apache 1.3 122912-15
6014| [855147] Solaris Update for kernel update and Apache 108528-29
6015| [855077] Solaris Update for Apache 2 120543-14
6016| [850196] SuSE Update for apache2 openSUSE-SU-2012:0314-1 (apache2)
6017| [850088] SuSE Update for apache2 SUSE-SA:2007:061
6018| [850009] SuSE Update for apache2,apache SUSE-SA:2008:021
6019| [841209] Ubuntu Update for apache2 USN-1627-1
6020| [840900] Ubuntu Update for apache2 USN-1368-1
6021| [840798] Ubuntu Update for apache2 USN-1259-1
6022| [840734] Ubuntu Update for apache2 USN-1199-1
6023| [840542] Ubuntu Update for apache2 vulnerabilities USN-1021-1
6024| [840504] Ubuntu Update for apache2 vulnerability USN-990-2
6025| [840399] Ubuntu Update for apache2 vulnerabilities USN-908-1
6026| [840304] Ubuntu Update for apache2 vulnerabilities USN-575-1
6027| [840118] Ubuntu Update for libapache2-mod-perl2 vulnerability USN-488-1
6028| [840092] Ubuntu Update for apache2 vulnerabilities USN-499-1
6029| [840039] Ubuntu Update for libapache2-mod-python vulnerability USN-430-1
6030| [835253] HP-UX Update for Apache Web Server HPSBUX02645
6031| [835247] HP-UX Update for Apache-based Web Server HPSBUX02612
6032| [835243] HP-UX Update for Apache Running Tomcat Servlet Engine HPSBUX02579
6033| [835236] HP-UX Update for Apache with PHP HPSBUX02543
6034| [835233] HP-UX Update for Apache-based Web Server HPSBUX02531
6035| [835224] HP-UX Update for Apache-based Web Server HPSBUX02465
6036| [835200] HP-UX Update for Apache Web Server Suite HPSBUX02431
6037| [835190] HP-UX Update for Apache Web Server Suite HPSBUX02401
6038| [835188] HP-UX Update for Apache HPSBUX02308
6039| [835181] HP-UX Update for Apache With PHP HPSBUX02332
6040| [835180] HP-UX Update for Apache with PHP HPSBUX02342
6041| [835172] HP-UX Update for Apache HPSBUX02365
6042| [835168] HP-UX Update for Apache HPSBUX02313
6043| [835148] HP-UX Update for Apache HPSBUX01064
6044| [835139] HP-UX Update for Apache with PHP HPSBUX01090
6045| [835131] HP-UX Update for Apache HPSBUX00256
6046| [835119] HP-UX Update for Apache Remote Execution of Arbitrary Code HPSBUX02186
6047| [835104] HP-UX Update for Apache HPSBUX00224
6048| [835103] HP-UX Update for Apache mod_cgid HPSBUX00301
6049| [835101] HP-UX Update for Apache HPSBUX01232
6050| [835080] HP-UX Update for Apache HPSBUX02273
6051| [835078] HP-UX Update for ApacheStrong HPSBUX00255
6052| [835044] HP-UX Update for Apache HPSBUX01019
6053| [835040] HP-UX Update for Apache PHP HPSBUX00207
6054| [835025] HP-UX Update for Apache HPSBUX00197
6055| [835023] HP-UX Update for Apache HPSBUX01022
6056| [835022] HP-UX Update for Apache HPSBUX02292
6057| [835005] HP-UX Update for Apache HPSBUX02262
6058| [831759] Mandriva Update for apache-mod_security MDVSA-2012:182 (apache-mod_security)
6059| [831737] Mandriva Update for apache MDVSA-2012:154-1 (apache)
6060| [831534] Mandriva Update for apache MDVSA-2012:012 (apache)
6061| [831523] Mandriva Update for apache MDVSA-2012:003 (apache)
6062| [831491] Mandriva Update for apache MDVSA-2011:168 (apache)
6063| [831460] Mandriva Update for apache MDVSA-2011:144 (apache)
6064| [831449] Mandriva Update for apache MDVSA-2011:130 (apache)
6065| [831357] Mandriva Update for apache MDVSA-2011:057 (apache)
6066| [831132] Mandriva Update for apache MDVSA-2010:153 (apache)
6067| [831131] Mandriva Update for apache MDVSA-2010:152 (apache)
6068| [830989] Mandriva Update for apache-mod_auth_shadow MDVSA-2010:081 (apache-mod_auth_shadow)
6069| [830931] Mandriva Update for apache MDVSA-2010:057 (apache)
6070| [830926] Mandriva Update for apache MDVSA-2010:053 (apache)
6071| [830918] Mandriva Update for apache-mod_security MDVSA-2010:050 (apache-mod_security)
6072| [830799] Mandriva Update for apache-conf MDVSA-2009:300-2 (apache-conf)
6073| [830797] Mandriva Update for apache-conf MDVSA-2009:300-1 (apache-conf)
6074| [830791] Mandriva Update for apache-conf MDVA-2010:011 (apache-conf)
6075| [830652] Mandriva Update for apache MDVSA-2008:195 (apache)
6076| [830621] Mandriva Update for apache-conf MDVA-2008:129 (apache-conf)
6077| [830581] Mandriva Update for apache MDVSA-2008:016 (apache)
6078| [830294] Mandriva Update for apache MDKSA-2007:140 (apache)
6079| [830196] Mandriva Update for apache MDKSA-2007:235 (apache)
6080| [830112] Mandriva Update for apache MDKSA-2007:127 (apache)
6081| [830109] Mandriva Update for apache-mod_perl MDKSA-2007:083 (apache-mod_perl)
6082| [802425] Apache Struts2 Showcase Arbitrary Java Method Execution vulnerability
6083| [802423] Apache Struts CookBook/Examples Multiple Cross-Site Scripting Vulnerabilities
6084| [802422] Apache Struts Showcase Multiple Persistence Cross-Site Scripting Vulnerabilities
6085| [802415] Apache Tomcat Multiple Security Bypass Vulnerabilities (Win)
6086| [802385] Apache Tomcat Request Object Security Bypass Vulnerability (Win)
6087| [802384] Apache Tomcat Parameter Handling Denial of Service Vulnerability (Win)
6088| [802378] Apache Tomcat Hash Collision Denial Of Service Vulnerability
6089| [801942] Apache Archiva Multiple Vulnerabilities
6090| [801940] Apache Struts2 'XWork' Information Disclosure Vulnerability
6091| [801663] Apache Struts2/XWork Remote Command Execution Vulnerability
6092| [801521] Apache APR-util 'buckets/apr_brigade.c' Denial Of Service Vulnerability
6093| [801284] Apache Derby Information Disclosure Vulnerability
6094| [801203] Apache ActiveMQ Persistent Cross-Site Scripting Vulnerability
6095| [800837] Apache 'mod_deflate' Denial Of Service Vulnerability - July09
6096| [800827] Apache 'mod_proxy_http.c' Denial Of Service Vulnerability
6097| [800680] Apache APR Version Detection
6098| [800679] Apache APR and APR-util Multiple Integer Overflow Vulnerabilities
6099| [800678] Apache Roller 'q' Parameter Cross Site Scripting Vulnerability
6100| [800677] Apache Roller Version Detection
6101| [800279] Apache mod_jk Module Version Detection
6102| [800278] Apache Struts Cross Site Scripting Vulnerability
6103| [800277] Apache Tomcat mod_jk Information Disclosure Vulnerability
6104| [800276] Apache Struts Version Detection
6105| [800271] Apache Struts Directory Traversal Vulnerability
6106| [800024] Apache Tomcat RemoteFilterValve Security Bypass Vulnerability
6107| [103333] Apache HTTP Server 'ap_pregsub()' Function Local Denial of Service Vulnerability
6108| [103293] Apache HTTP Server 'mod_proxy' Reverse Proxy Information Disclosure Vulnerability
6109| [103122] Apache Web Server ETag Header Information Disclosure Weakness
6110| [103074] Apache Continuum Cross Site Scripting Vulnerability
6111| [103073] Apache Continuum Detection
6112| [103053] Apache CouchDB Web Administration Interface Cross Site Scripting Vulnerability
6113| [101023] Apache Open For Business Weak Password security check
6114| [101020] Apache Open For Business HTML injection vulnerability
6115| [101019] Apache Open For Business service detection
6116| [100924] Apache Archiva Cross Site Request Forgery Vulnerability
6117| [100923] Apache Archiva Detection
6118| [100858] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
6119| [100814] Apache Axis2 Document Type Declaration Processing Security Vulnerability
6120| [100813] Apache Axis2 Detection
6121| [100797] Apache Traffic Server Remote DNS Cache Poisoning Vulnerability
6122| [100795] Apache Derby Detection
6123| [100762] Apache CouchDB Cross Site Request Forgery Vulnerability
6124| [100725] Apache HTTP Server Multiple Remote Denial of Service Vulnerabilities
6125| [100613] Apache ActiveMQ 'admin/queueBrowse' Cross Site Scripting Vulnerability
6126| [100514] Apache Multiple Security Vulnerabilities
6127| [100211] Apache 'Options' and 'AllowOverride' Directives Security Bypass Vulnerability
6128| [100172] Apache Web Server Configuration File Environment Variable Local Buffer Overflow Vulnerability
6129| [100171] Apache Web Server Linefeed Memory Allocation Denial Of Service Vulnerability
6130| [100130] Apache mod_perl 'Apache::Status' and 'Apache2::Status' Cross Site Scripting Vulnerability
6131| [72626] Debian Security Advisory DSA 2579-1 (apache2)
6132| [72612] FreeBSD Ports: apache22
6133| [71551] Gentoo Security Advisory GLSA 201206-25 (apache)
6134| [71550] Gentoo Security Advisory GLSA 201206-24 (apache tomcat)
6135| [71512] FreeBSD Ports: apache
6136| [71485] Debian Security Advisory DSA 2506-1 (libapache-mod-security)
6137| [71256] Debian Security Advisory DSA 2452-1 (apache2)
6138| [71238] Debian Security Advisory DSA 2436-1 (libapache2-mod-fcgid)
6139| [70737] FreeBSD Ports: apache
6140| [70724] Debian Security Advisory DSA 2405-1 (apache2)
6141| [70600] FreeBSD Ports: apache
6142| [70253] FreeBSD Ports: apache, apache-event, apache-itk, apache-peruser, apache-worker
6143| [70235] Debian Security Advisory DSA 2298-2 (apache2)
6144| [70233] Debian Security Advisory DSA 2298-1 (apache2)
6145| [69988] Debian Security Advisory DSA 2279-1 (libapache2-mod-authnz-external)
6146| [69338] Debian Security Advisory DSA 2202-1 (apache2)
6147| [67868] FreeBSD Ports: apache
6148| [66816] FreeBSD Ports: apache
6149| [66553] Mandriva Security Advisory MDVSA-2009:189-1 (apache-mod_auth_mysql)
6150| [66414] Mandriva Security Advisory MDVSA-2009:323 (apache)
6151| [66106] SuSE Security Advisory SUSE-SA:2009:050 (apache2,libapr1)
6152| [66081] SLES11: Security update for Apache 2
6153| [66074] SLES10: Security update for Apache 2
6154| [66070] SLES9: Security update for Apache 2
6155| [65998] SLES10: Security update for apache2-mod_python
6156| [65893] SLES10: Security update for Apache 2
6157| [65888] SLES10: Security update for Apache 2
6158| [65575] SLES9: Security update for apache2,apache2-prefork,apache2-worker
6159| [65510] SLES9: Security update for Apache 2
6160| [65472] SLES9: Security update for Apache
6161| [65467] SLES9: Security update for Apache
6162| [65450] SLES9: Security update for apache2
6163| [65390] SLES9: Security update for Apache2
6164| [65363] SLES9: Security update for Apache2
6165| [65309] SLES9: Security update for Apache and mod_ssl
6166| [65296] SLES9: Security update for webdav apache module
6167| [65283] SLES9: Security update for Apache2
6168| [65249] SLES9: Security update for Apache 2
6169| [65230] SLES9: Security update for Apache 2
6170| [65228] SLES9: Security update for Apache 2
6171| [65212] SLES9: Security update for apache2-mod_python
6172| [65209] SLES9: Security update for apache2-worker
6173| [65207] SLES9: Security update for Apache 2
6174| [65168] SLES9: Security update for apache2-mod_python
6175| [65142] SLES9: Security update for Apache2
6176| [65136] SLES9: Security update for Apache 2
6177| [65132] SLES9: Security update for apache
6178| [65131] SLES9: Security update for Apache 2 oes/CORE
6179| [65113] SLES9: Security update for apache2
6180| [65072] SLES9: Security update for apache and mod_ssl
6181| [65017] SLES9: Security update for Apache 2
6182| [64950] Mandrake Security Advisory MDVSA-2009:240 (apache)
6183| [64783] FreeBSD Ports: apache
6184| [64774] Ubuntu USN-802-2 (apache2)
6185| [64653] Ubuntu USN-813-2 (apache2)
6186| [64559] Debian Security Advisory DSA 1834-2 (apache2)
6187| [64532] Mandrake Security Advisory MDVSA-2009:189 (apache-mod_auth_mysql)
6188| [64527] Mandrake Security Advisory MDVSA-2009:184 (apache-mod_security)
6189| [64526] Mandrake Security Advisory MDVSA-2009:183 (apache-mod_security)
6190| [64500] Mandrake Security Advisory MDVSA-2009:168 (apache)
6191| [64443] Ubuntu USN-802-1 (apache2)
6192| [64426] Gentoo Security Advisory GLSA 200907-04 (apache)
6193| [64423] Debian Security Advisory DSA 1834-1 (apache2)
6194| [64391] Mandrake Security Advisory MDVSA-2009:149 (apache)
6195| [64377] Mandrake Security Advisory MDVSA-2009:124-1 (apache)
6196| [64251] Debian Security Advisory DSA 1816-1 (apache2)
6197| [64201] Ubuntu USN-787-1 (apache2)
6198| [64140] Mandrake Security Advisory MDVSA-2009:124 (apache)
6199| [64136] Mandrake Security Advisory MDVSA-2009:102 (apache)
6200| [63565] FreeBSD Ports: apache
6201| [63562] Ubuntu USN-731-1 (apache2)
6202| [61381] Gentoo Security Advisory GLSA 200807-06 (apache)
6203| [61185] FreeBSD Ports: apache
6204| [60582] Gentoo Security Advisory GLSA 200803-19 (apache)
6205| [60387] Slackware Advisory SSA:2008-045-02 apache
6206| [58826] FreeBSD Ports: apache-tomcat
6207| [58825] FreeBSD Ports: apache-tomcat
6208| [58804] FreeBSD Ports: apache
6209| [58745] Gentoo Security Advisory GLSA 200711-06 (apache)
6210| [58360] Debian Security Advisory DSA 1312-1 (libapache-mod-jk)
6211| [57851] Gentoo Security Advisory GLSA 200608-01 (apache)
6212| [57788] Debian Security Advisory DSA 1247-1 (libapache-mod-auth-kerb)
6213| [57335] Debian Security Advisory DSA 1167-1 (apache)
6214| [57201] Debian Security Advisory DSA 1131-1 (apache)
6215| [57200] Debian Security Advisory DSA 1132-1 (apache2)
6216| [57168] Slackware Advisory SSA:2006-209-01 Apache httpd
6217| [57145] FreeBSD Ports: apache
6218| [56731] Slackware Advisory SSA:2006-129-01 Apache httpd
6219| [56729] Slackware Advisory SSA:2006-130-01 Apache httpd redux
6220| [56246] Gentoo Security Advisory GLSA 200602-03 (Apache)
6221| [56212] Debian Security Advisory DSA 952-1 (libapache-auth-ldap)
6222| [56115] Debian Security Advisory DSA 935-1 (libapache2-mod-auth-pgsql)
6223| [56067] FreeBSD Ports: apache
6224| [55803] Slackware Advisory SSA:2005-310-04 apache
6225| [55519] Debian Security Advisory DSA 839-1 (apachetop)
6226| [55392] Gentoo Security Advisory GLSA 200509-12 (Apache)
6227| [55355] FreeBSD Ports: apache
6228| [55284] Debian Security Advisory DSA 807-1 (libapache-mod-ssl)
6229| [55261] Debian Security Advisory DSA 805-1 (apache2)
6230| [55259] Debian Security Advisory DSA 803-1 (apache)
6231| [55129] Gentoo Security Advisory GLSA 200508-15 (apache)
6232| [54739] Gentoo Security Advisory GLSA 200411-18 (apache)
6233| [54724] Gentoo Security Advisory GLSA 200411-03 (apache)
6234| [54712] Gentoo Security Advisory GLSA 200410-21 (apache)
6235| [54689] Gentoo Security Advisory GLSA 200409-33 (net=www/apache)
6236| [54677] Gentoo Security Advisory GLSA 200409-21 (apache)
6237| [54610] Gentoo Security Advisory GLSA 200407-03 (Apache)
6238| [54601] Gentoo Security Advisory GLSA 200406-16 (Apache)
6239| [54590] Gentoo Security Advisory GLSA 200406-05 (Apache)
6240| [54582] Gentoo Security Advisory GLSA 200405-22 (Apache)
6241| [54529] Gentoo Security Advisory GLSA 200403-04 (Apache)
6242| [54499] Gentoo Security Advisory GLSA 200310-04 (Apache)
6243| [54498] Gentoo Security Advisory GLSA 200310-03 (Apache)
6244| [54439] FreeBSD Ports: apache
6245| [53931] Slackware Advisory SSA:2004-133-01 apache
6246| [53903] Slackware Advisory SSA:2004-299-01 apache, mod_ssl, php
6247| [53902] Slackware Advisory SSA:2004-305-01 apache+mod_ssl
6248| [53878] Slackware Advisory SSA:2003-308-01 apache security update
6249| [53851] Debian Security Advisory DSA 135-1 (libapache-mod-ssl)
6250| [53849] Debian Security Advisory DSA 132-1 (apache-ssl)
6251| [53848] Debian Security Advisory DSA 131-1 (apache)
6252| [53784] Debian Security Advisory DSA 021-1 (apache)
6253| [53738] Debian Security Advisory DSA 195-1 (apache-perl)
6254| [53737] Debian Security Advisory DSA 188-1 (apache-ssl)
6255| [53735] Debian Security Advisory DSA 187-1 (apache)
6256| [53703] Debian Security Advisory DSA 532-1 (libapache-mod-ssl)
6257| [53577] Debian Security Advisory DSA 120-1 (libapache-mod-ssl, apache-ssl)
6258| [53568] Debian Security Advisory DSA 067-1 (apache,apache-ssl)
6259| [53519] Debian Security Advisory DSA 689-1 (libapache-mod-python)
6260| [53433] Debian Security Advisory DSA 181-1 (libapache-mod-ssl)
6261| [53282] Debian Security Advisory DSA 594-1 (apache)
6262| [53248] Debian Security Advisory DSA 558-1 (libapache-mod-dav)
6263| [53224] Debian Security Advisory DSA 532-2 (libapache-mod-ssl)
6264| [53215] Debian Security Advisory DSA 525-1 (apache)
6265| [53151] Debian Security Advisory DSA 452-1 (libapache-mod-python)
6266| [52529] FreeBSD Ports: apache+ssl
6267| [52501] FreeBSD Ports: apache
6268| [52461] FreeBSD Ports: apache
6269| [52390] FreeBSD Ports: apache
6270| [52389] FreeBSD Ports: apache
6271| [52388] FreeBSD Ports: apache
6272| [52383] FreeBSD Ports: apache
6273| [52339] FreeBSD Ports: apache+mod_ssl
6274| [52331] FreeBSD Ports: apache
6275| [52329] FreeBSD Ports: ru-apache+mod_ssl
6276| [52314] FreeBSD Ports: apache
6277| [52310] FreeBSD Ports: apache
6278| [15588] Detect Apache HTTPS
6279| [15555] Apache mod_proxy content-length buffer overflow
6280| [15554] Apache mod_include priviledge escalation
6281| [14771] Apache <= 1.3.33 htpasswd local overflow
6282| [14177] Apache mod_access rule bypass
6283| [13644] Apache mod_rootme Backdoor
6284| [12293] Apache Input Header Folding and mod_ssl ssl_io_filter_cleanup DoS Vulnerabilities
6285| [12280] Apache Connection Blocking Denial of Service
6286| [12239] Apache Error Log Escape Sequence Injection
6287| [12123] Apache Tomcat source.jsp malformed request information disclosure
6288| [12085] Apache Tomcat servlet/JSP container default files
6289| [11438] Apache Tomcat Directory Listing and File disclosure
6290| [11204] Apache Tomcat Default Accounts
6291| [11092] Apache 2.0.39 Win32 directory traversal
6292| [11046] Apache Tomcat TroubleShooter Servlet Installed
6293| [11042] Apache Tomcat DOS Device Name XSS
6294| [11041] Apache Tomcat /servlet Cross Site Scripting
6295| [10938] Apache Remote Command Execution via .bat files
6296| [10839] PHP.EXE / Apache Win32 Arbitrary File Reading Vulnerability
6297| [10773] MacOS X Finder reveals contents of Apache Web files
6298| [10766] Apache UserDir Sensitive Information Disclosure
6299| [10756] MacOS X Finder reveals contents of Apache Web directories
6300| [10752] Apache Auth Module SQL Insertion Attack
6301| [10704] Apache Directory Listing
6302| [10678] Apache /server-info accessible
6303| [10677] Apache /server-status accessible
6304| [10440] Check for Apache Multiple / vulnerability
6305|
6306| SecurityTracker - https://www.securitytracker.com:
6307| [1028865] Apache Struts Bugs Permit Remote Code Execution and URL Redirection Attacks
6308| [1028864] Apache Struts Wildcard Matching and Expression Evaluation Bugs Let Remote Users Execute Arbitrary Code
6309| [1028824] Apache mod_dav_svn URI Processing Flaw Lets Remote Users Deny Service
6310| [1028823] Apache Unspecified Flaw in mod_session_dbd Has Unspecified Impact
6311| [1028724] (HP Issues Fix for HP-UX) Apache Web Server Bugs Permit Cross-Site Scripting and Information Disclosure Attacks
6312| [1028722] (Red Hat Issues Fix for JBoss) Apache Tomcat Lets Remote Users Conduct DIGEST Authentication Replay Attacks
6313| [1028693] (Red Hat Issues Fix) Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks
6314| [1028622] Apache Struts 'includeParams' Bugs Permit Remote Command Execution and Cross-Site Scripting Attacks
6315| [1028621] Apache Subversion Bugs Let Remote Authenticated Users Execute Arbitrary Commands and Deny Service
6316| [1028540] Apache mod_rewrite Input Validation Flaw Lets Remote Users Execute Arbitrary Commands
6317| [1028534] Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks
6318| [1028533] Apache Tomcat Lack of Chunked Transfer Encoding Extension Size Limit Lets Remote Users Deny Service
6319| [1028532] Apache Tomcat AsyncListeners Bug May Disclose Information from One Request to Another User
6320| [1028515] Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges
6321| [1028457] Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information
6322| [1028287] Apache CXF WSS4JInInterceptor Grants Service Access to Remote Users
6323| [1028286] Apache CXF WS-Security UsernameToken Processing Flaw Lets Remote Users Bypass Authentication
6324| [1028252] Apache Commons FileUpload Unsafe Temporary File Lets Local Users Gain Elevated Privileges
6325| [1028207] Apache Input Validation Bugs Permit Cross-Site Scripting Attacks
6326| [1027836] Apache Tomcat Connection Processing Bug Lets Remote Users Deny Service
6327| [1027834] Apache Tomcat Bug Lets Remote Users Bypass Cross-Site Request Forgery Prevention Filter
6328| [1027833] Apache Tomcat Bug Lets Remote Users Bypass Security Constraints
6329| [1027729] Apache Tomcat Header Processing Bug Lets Remote Users Deny Service
6330| [1027728] Apache Tomcat Lets Remote Users Conduct DIGEST Authentication Replay Attacks
6331| [1027554] Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions
6332| [1027508] Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks
6333| [1027421] Apache Web Server Bugs Permit Cross-Site Scripting and Information Disclosure Attacks
6334| [1027096] Apache Commons Compress BZip2CompressorOutputStream() Sorting Algorithm Lets Remote or Local Users Deny Service
6335| [1026932] Apache LD_LIBRARY_PATH Processing Lets Local Users Gain Elevated Privileges
6336| [1026928] Apache OFBiz Unspecified Flaw Lets Remote Users Execute Arbitrary Code
6337| [1026927] Apache OFBiz Input Validation Flaws Permit Cross-Site Scripting Attacks
6338| [1026847] Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service
6339| [1026846] Apache Wicket Discloses Hidden Application Files to Remote Users
6340| [1026839] Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks
6341| [1026616] Apache Bugs Let Remote Users Deny Service and Obtain Cookie Data
6342| [1026575] Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands
6343| [1026484] Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code
6344| [1026477] Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service
6345| [1026402] Apache Struts Conversion Error Lets Remote Users Inject Arbitrary Commands
6346| [1026353] Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers
6347| [1026295] Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges
6348| [1026267] Apache .htaccess File Integer Overflow Lets Local Users Execute Arbitrary Code
6349| [1026144] Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers
6350| [1026095] Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks
6351| [1026054] Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service
6352| [1025993] Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information
6353| [1025976] Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks
6354| [1025960] Apache httpd Byterange Filter Processing Error Lets Remote Users Deny Service
6355| [1025925] Apache Tomcat Commons Daemon jsvc Lets Local Users Gain Elevated Privileges
6356| [1025924] Apache Tomcat XML Validation Flaw Lets Applications Obtain Potentially Sensitive Information
6357| [1025788] Apache Tomcat Lets Malicious Applications Obtain Information and Deny Service
6358| [1025755] Apache Santuario Buffer Overflow Lets Remote Users Deny Service
6359| [1025712] Apache Tomcat Discloses Passwords to Local Users in Certain Cases
6360| [1025577] Apache Archiva Input Validation Hole Permits Cross-Site Scripting Attacks
6361| [1025576] Apache Archiva Request Validation Flaw Permits Cross-Site Request Forgery Attacks
6362| [1025527] Apache APR Library apr_fnmatch() Flaw Lets Remote Users Execute Arbitrary Code
6363| [1025303] Apache Tomcat HTTP BIO Connector Error Discloses Information From Different Requests to Remote Users
6364| [1025215] Apache Tomcat May Ignore @ServletSecurity Annotation Protections
6365| [1025066] Apache Continuum Input Validation Flaw Permits Cross-Site Request Forgery Attacks
6366| [1025065] Apache Continuum Input Validation Hole Permits Cross-Site Scripting Attacks
6367| [1025027] Apache Tomcat maxHttpHeaderSize Parsing Error Lets Remote Users Deny Service
6368| [1025026] Apache Tomcat Manager Input Validation Hole Permits Cross-Site Scripting Attacks
6369| [1025025] Apache Tomcat Security Manager Lets Local Users Bypass File Permissions
6370| [1024764] Apache Tomcat Manager Input Validation Hole in 'sessionList.jsp' Permits Cross-Site Scripting Attacks
6371| [1024417] Apache Traffic Server Insufficient Randomization Lets Remote Users Poison the DNS Cache
6372| [1024332] Apache mod_cache and mod_dav Request Processing Flaw Lets Remote Users Deny Service
6373| [1024180] Apache Tomcat 'Transfer-Encoding' Header Processing Flaw Lets Remote Users Deny Service and Obtain Potentially Sensitive Information
6374| [1024096] Apache mod_proxy_http May Return Results for a Different Request
6375| [1023942] Apache mod_proxy_ajp Error Condition Lets Remote Users Deny Service
6376| [1023941] Apache ap_read_request() Memory Error May Let Remote Users Access Potentially Sensitive Information
6377| [1023778] Apache ActiveMQ Input Validation Flaw Permits Cross-Site Scripting Attacks
6378| [1023701] Apache mod_isapi Error Processing Flaw May Let Remote Users Deny Service
6379| [1023533] Apache mod_proxy Integer Overflow May Let Remote Users Execute Arbitrary Code
6380| [1022988] Apache Solaris Support Code Bug Lets Remote Users Deny Service
6381| [1022529] Apache mod_deflate Connection State Bug Lets Remote Users Deny Service
6382| [1022509] Apache mod_proxy stream_reqbody_cl() Infinite Loop Lets Remote Users Deny Service
6383| [1022296] Apache IncludesNoExec Options Restrictions Can Be Bypass By Local Users
6384| [1022264] Apache mod_proxy_ajp Bug May Disclose Another User's Response Data
6385| [1022001] Apache Tomcat mod_jk May Disclose Responses to the Wrong User
6386| [1021988] mod_perl Input Validation Flaw in Apache::Status and Apache2::Status Permits Cross-Site Scripting Attacks
6387| [1021350] NetWare Bug Lets Remote Users Access the ApacheAdmin Console
6388| [1020635] Apache Input Validation Hole in mod_proxy_ftp Permits Cross-Site Scripting Attacks
6389| [1020520] Oracle WebLogic Apache Connector Lets Remote Users Execute Arbitrary Code
6390| [1020267] Apache mod_proxy Interim Response Process Bug Lets Remote Users Deny Service
6391| [1019784] Apache-SSL Certificate Processing Bug May Let Remote Users View Portions of Kernel Memory
6392| [1019256] Apache mod_negotiation Input Validation Hole Permits Cross-Site Scripting Attacks
6393| [1019194] Apache Input Validation Hole in Mod_AutoIndex When the Character Set is Undefined May Permit Cross-Site Scripting Attacks
6394| [1019185] Apache Input Validation Hole in mod_proxy_ftp Permits Cross-Site Scripting Attacks
6395| [1019154] Apache Input Validation Hole in mod_status Permits Cross-Site Scripting Attacks
6396| [1019093] Apache Input Validation Hole in mod_imap Permits Cross-Site Scripting Attacks
6397| [1019030] Apache Input Validation Hole in Default HTTP 413 Error Page Permits Cross-Site Scripting Attacks
6398| [1018633] Apache mod_proxy Bug Lets Remote Users Deny Service
6399| [1018304] Apache HTTPD scoreboard Protection Flaw Lets Local Users Terminate Arbitrary Processes
6400| [1018303] Apache HTTPD mod_cache May Let Remote Users Deny Service
6401| [1018302] Apache mod_status Input Validation Hole Permits Cross-Site Scripting Attacks
6402| [1018269] Apache Tomcat Input Validation Hole in Processing Accept-Language Header Permits Cross-Site Scripting Attacks
6403| [1017904] Apache suEXEC Bugs May Let Local Users Gain Elevated Privileges
6404| [1017719] Apache Tomcat JK Web Server Connector Buffer Overflow in map_uri_to_worker() Lets Remote Users Execute Arbitrary Code
6405| [1017062] Apache mod_tcl Format String Bug in set_var() Function May Let Remote Users Execute Arbitrary Code
6406| [1016601] Apache mod_rewrite Off-by-one Error Lets Remote Users Execute Arbitrary Code
6407| [1016576] Apache Tomcat Discloses Directory Listings to Remote Users
6408| [1015447] Apache mod_ssl Null Pointer Dereference May Let Remote Users Deny Service
6409| [1015344] Apache mod_imap Input Validation Flaw in Referer Field Lets Remote Users Conduct Cross-Site Scripting Attacks
6410| [1015093] Apache Memory Leak in MPM 'worker.c' Code May Let Remote Users Deny Service
6411| [1014996] ApacheTop Unsafe Temporary File May Let Local Users Gain Elevated Privileges
6412| [1014833] Apache ssl_hook_Access() Function May Fail to Verify Client Certificates
6413| [1014826] Apache Memory Leak in 'byterange filter' Lets Remote Users Deny Service
6414| [1014575] Apache mod_ssl Off-by-one Buffer Overflow in Processing CRLs May Let Remote Users Deny Service
6415| [1014323] Apache Chunked Transfer-Encoding and Content-Length Processing Lets Remote Users Smuggle HTTP Requests
6416| [1013156] Apache mod_python Publisher Handler Discloses Information to Remote Users
6417| [1012829] Apache mod_auth_radius radcpy() Integer Overflow Lets Remote Users Deny Service in Certain Cases
6418| [1012416] Apache on Apple OS X Lets Remote Users Bypass Apache File Handlers and Directly Access Files
6419| [1012415] Apache on Apple HFS+ Filesystems May Disclose '.DS_Store' Files to Remote Users
6420| [1012414] Apache mod_digest_apple Lets Remote Users Replay Authentication Credentials
6421| [1012083] Apache Web Server Error in Processing Requests With Many Space Characters Lets Remote Users Deny Service
6422| [1011783] Apache mod_include Buffer Overflow Lets Local Users Execute Arbitrary Code
6423| [1011557] Apache mod_ssl SSLCipherSuite Directive Can By Bypassed in Certain Cases
6424| [1011385] Apache Satsify Directive Error May Let Remote Users Access Restricted Resources
6425| [1011340] Apache SSL Connection Abort State Error Lets Remote Users Deny Service
6426| [1011303] Apache ap_resolve_env() Buffer Overflow in Reading Configuration Files May Let Local Users Gain Elevated Privileges
6427| [1011299] Apache IPv6 Address Parsing Flaw May Let Remote Users Deny Service
6428| [1011248] Apache mod_dav LOCK Method Error May Let Remote Users Deny Service
6429| [1011213] Apache mod_ssl Can Be Crashed By Remote Users When Reverse Proxying SSL Connections
6430| [1010674] Apache Can Be Crashed By PHP Code Invoking Nested Remote Sockets
6431| [1010599] Apache httpd Header Line Memory Allocation Lets Remote Users Crash the Server
6432| [1010462] Apache mod_proxy Buffer Overflow May Let Remote Users Execute Arbitrary Code
6433| [1010322] Apache mod_ssl Stack Overflow in ssl_util_uuencode_binary() May Let Remote Users Execute Arbitrary Code
6434| [1010270] cPanel Apache mod_phpsuexec Options Let Local Users Gain Elevated Privileges
6435| [1009934] Apache Web Server Has Buffer Overflow in ebcdic2ascii() on Older Processor Architectures
6436| [1009516] Apache mod_survey HTML Report Format Lets Remote Users Conduct Cross-Site Scripting Attacks
6437| [1009509] Apache mod_disk_cache Stores Authentication Credentials on Disk
6438| [1009495] Apache Web Server Socket Starvation Flaw May Let Remote Users Deny Service
6439| [1009417] GroupWise WebAccess With Apache on NetWare Has Configuration Flaw That May Grant Web Access to Remote Users
6440| [1009338] Apache mod_access Parsing Flaw May Fail to Enforce Allow/Deny Rules
6441| [1009337] Apache mod_ssl Memory Leak Lets Remote Users Crash the Daemon
6442| [1009182] Apache for Cygwin '..%5C' Input Validation Flaw Discloses Files to Remote Users
6443| [1008973] PHP May Apply Incorrect php_admin_* Settings To Requests for Apache Virtual Hosts
6444| [1008967] Apache-SSL 'SSLFakeBasicAuth' Lets Remote Users Forge Client Certificates to Be Authenticated
6445| [1008920] Apache mod_digest May Validate Replayed Client Responses
6446| [1008828] Apache mod_python String Processing Bug Still Lets Remote Users Crash the Web Server
6447| [1008822] Apache mod_perl File Descriptor Leak May Let Local Users Hijack the http and https Services
6448| [1008675] mod_auth_shadow Apache Module Authenticates Expired Passwords
6449| [1008559] Apache mod_php File Descriptor Leak May Let Local Users Hijack the https Service
6450| [1008335] Apache mod_python String Processing Bug Lets Remote Users Crash the Web Server
6451| [1008196] Apache 2.x on Windows May Return Unexpected Files For URLs Ending With Certain Characters
6452| [1008030] Apache mod_rewrite Contains a Buffer Overflow
6453| [1008029] Apache mod_alias Contains a Buffer Overflow
6454| [1008028] Apache mod_cgid May Disclose CGI Output to Another Client
6455| [1007995] Apache Cocoon Forms May Let Remote Users Execute Arbitrary Java Code on the System
6456| [1007993] Apache Cocoon 'view-source' Sample Script Discloses Files to Remote Users
6457| [1007823] Apache Web Server mod_cgi Error May Let Malicious CGI Scripts Crash the Web Service
6458| [1007664] Apache::Gallery Unsafe Temporary Files May Let Local Users Gain Apache Web Server Privileges
6459| [1007557] Apache Web Server Does Not Filter Terminal Escape Sequences From Log Files
6460| [1007230] Apache HTTP Server 'rotatelogs' Bug on Win32 and OS/2 May Cause the Logging to Stop
6461| [1007146] Apache HTTP Server FTP Proxy Bug May Cause Denial of Service Conditions
6462| [1007145] Apache 'accept()' Errors May Cause Denial of Service Conditions
6463| [1007144] Apache Web Server 'type-map' File Error Permits Local Denial of Service Attacks
6464| [1007143] Apache 2.0 Web Server May Use a Weaker Encryption Implementation Than Specified in Some Cases
6465| [1006864] Apache Web Server Can Be Crashed By Remote Users Via mod_dav Flaws and Also Via Basic Authentication
6466| [1006709] Apache mod_survey Input Validation Flaw Lets Remote Users Fill Up Disk Space
6467| [1006614] Apache mod_ntlm Buffer Overflow and Format String Flaw Let Remote Users Execute Arbitary Code
6468| [1006591] Apache mod_access_referer Module Null Pointer Dereference May Faciliate Denial of Service Attacks
6469| [1006444] Apache 2.0 Web Server Line Feed Buffer Allocation Flaw Lets Remote Users Deny Service
6470| [1006021] Apache Tomcat Server URL Parsing Error May Disclose Otherwise Inaccessible Web Directory Listings and Files to Remote Users
6471| [1005963] Apache Web Server 2.x Windows Device Access Flaw Lets Remote Users Crash the Server or Possibly Execute Arbitrary Code
6472| [1005962] Apache Web Server Path Parsing Flaw May Allow Remote Users to Execute Code in Certain Configurations
6473| [1005848] Apache 'printenv' Script Input Validation Bugs in Older Versions May Let Remote Users Conduct Cross-Site Scripting Attacks
6474| [1005765] Apache mod_jk Module Processing Bug When Used With Tomcat May Disclose Information to Remote Users or Crash
6475| [1005548] Apache mod_php Module May Allow Local Users to Gain Control of the Web Port
6476| [1005499] Apache Web Server (2.0.42) May Disclose CGI Source Code to Remote Users When Used With WebDAV
6477| [1005410] Apache Tomcat Java Servlet Engine Can Be Crashed Via Multiple Requests for DOS Device Names
6478| [1005351] Apache Web Server (1.3.x) Shared Memory Scoreboard Bug Lets Certain Local Users Issue Signals With Root Privileges
6479| [1005331] Apache Web Server (2.x) SSI Server Signature Filtering Hole Lets Remote Users Conduct Cross-Site Scripting Attacks
6480| [1005290] Apache Tomcat Java Server Default Servlet Returns JSP Source Code to Remote Users
6481| [1005285] Apache Web Server 'mod_dav' Has Null Pointer Bug That May Allow Remote Users to Cause Denial of Service Conditions
6482| [1005010] Apache Web Server (2.0) Has Unspecified Flaw That Allows Remote Users to Obtain Sensitive Data and Cause Denial of Service Conditions
6483| [1004770] Apache 2.x Web Server ap_log_rerror() Function May Disclose Full Installation Path to Remote Users
6484| [1004745] Apache Tomcat Java Server Allows Cross-Site Scripting Attacks
6485| [1004636] Apache mod_ssl 'Off-by-One' Bug May Let Local Users Crash the Web Server or Possibly Execute Arbitrary Code
6486| [1004602] Apache Tomcat Java Server for Windows Can Be Crashed By Remote Users Sending Malicious Requests to Hang All Available Working Threads
6487| [1004586] Apache Tomcat Java Server May Disclose the Installation Path to Remote Users
6488| [1004555] Apache Web Server Chunked Encoding Flaw May Let Remote Users Execute Arbitrary Code on the Server
6489| [1004209] Apache 'mod_python' Python Language Interpreter Bug in Publisher Handler May Allow Remote Users to Modify Files on the System
6490| [1003874] Apache Web Server for Windows Has Batch File Processing Hole That Lets Remote Users Execute Commands on the System
6491| [1003767] 'mod_frontpage' Module for Apache Web Server Has Buffer Overlow in 'fpexec.c' That Allows Remote Users to Execute Arbitrary Code on the System with Root Privileges
6492| [1003723] Apache-SSL for Apache Web Server Has Buffer Overflow That Can Be Triggered By Remote Users
6493| [1003664] 'mod_ssl' Security Package for Apache Web Server Has Buffer Overflow That Can Be Triggered By Remote Users
6494| [1003602] GNUJSP Java Server Pages Implementation Discloses Web Files and Source Code to Remote Users and Bypasses Apache Access Control Restrictions
6495| [1003465] PHP for Apache Web Server May Disclose Installation Path Information to Remote Users Making 'OPTIONS' Requests
6496| [1003451] Oracle Application Server PL/SQL Module for Apache Has Buffer Overflows That Allow Remote Users to Execute Arbitrary Code and Gain Access to the Server
6497| [1003131] Apache Web Server in Virtual Hosting Mode Can Be Crashed By a Local User Removing a Log Directory
6498| [1003104] PHP.EXE Windows CGI for Apache Web Server May Let Remote Users View Files on the Server Due to Configuration Error
6499| [1003008] Apache 'mod_bf' Module Lets Remote Users Execute Arbitrary Code
6500| [1002629] Apache suEXEC Wrapper Fails to Observe Minimum Group ID Security Settings in Certain Situations
6501| [1002542] Apache Web Server Virtual Hosting Split-Logfile Function Lets Remote Users Write Log Entries to Arbitrary Files on the System
6502| [1002400] Apache mod_gzip Module Has Buffer Overflow That Can Be Exploited By Local Users to Gain Elevated Privileges
6503| [1002303] Several 3rd Party Apache Authentication Modules Allow Remote Users to Execute Arbitrary Code to Gain Access to the System or Execute Stored Procedures to Obtain Arbitrary Database Information
6504| [1002188] Apache Web Server Discloses Internal IP Addresses to Remote Users in Certain Configurations
6505| [1001989] Apache Web Server May Disclose Directory Contents Even If an Index.html File is Present in the Directory
6506| [1001719] Apache Web Server on Mac OS X Client Fails to Enforce File and Directory Access Protections, Giving Remote Users Access to Restricted Pages
6507| [1001572] Apache Web Server on Microsoft Windows Platforms Allows Remote Users to Crash the Web Server
6508| [1001304] Apache Web Server for Windows Lets Remote Users Crash the Web Server Application
6509| [1001083] Apache Web Server May Display Directory Index Listings Even if Directory Listings Are Disabled
6510|
6511| OSVDB - http://www.osvdb.org:
6512| [96078] Apache CloudStack Infrastructure Menu Setup Network Multiple Field XSS
6513| [96077] Apache CloudStack Global Settings Multiple Field XSS
6514| [96076] Apache CloudStack Instances Menu Display Name Field XSS
6515| [96075] Apache CloudStack Instances Menu Add Instances Network Name Field XSS
6516| [96074] Apache CloudStack Instances Menu Add Instances Review Step Multiple Field XSS
6517| [96031] Apache HTTP Server suEXEC Symlink Arbitrary File Access
6518| [95888] Apache Archiva Single / Double Quote Character Handling XSS Weakness
6519| [95885] Apache Subversion mod_dav_svn Module Crafted HTTP Request Handling Remote DoS
6520| [95706] Apache OpenOffice.org (OOo) OOXML Document File XML Element Handling Memory Corruption
6521| [95704] Apache OpenOffice.org (OOo) DOC File PLCF Data Handling Memory Corruption
6522| [95603] Apache Continuum web/util/GenerateRecipentNotifier.java recipient Parameter XSS
6523| [95602] Apache Continuum web/action/notifier/JabberProjectNotifierEditAction-jabberProjectNotifierSave-validation.xml Multiple Parameter XSS
6524| [95601] Apache Continuum web/action/notifier/JabberGroupNotifierEditAction-jabberProjectGroupNotifierSave-validation.xml Multiple Parameter XSS
6525| [95600] Apache Continuum web/action/ScheduleAction-saveSchedule-validation.xml Multiple Parameter XSS
6526| [95599] Apache Continuumweb/action/BuildDefinitionAction-saveBuildDefinition-validation.xml Multiple Parameter XSS
6527| [95598] Apache Continuum web/action/AddProjectAction-addProject-validation.xml Multiple Parameter XSS
6528| [95597] Apache Continuum web/action/ProjectEditAction-projectSave-validation.xml Multiple Parameter XSS
6529| [95596] Apache Continuum web/action/notifier/IrcGroupNotifierEditAction-ircProjectGroupNotifierSave-validation.xml Multiple Parameter XSS
6530| [95595] Apache Continuum web/action/notifier/IrcProjectNotifierEditAction-ircProjectNotifierSave-validation.xml Multiple Parameter XSS
6531| [95594] Apache Continuum web/action/ProjectGroupAction.java Multiple Parameter XSS
6532| [95593] Apache Continuum web/action/AddProjectGroupAction.java Multiple Parameter XSS
6533| [95592] Apache Continuum web/action/AddProjectAction.java Multiple Parameter XSS
6534| [95523] Apache OFBiz Webtools Application View Log Screen Unspecified XSS
6535| [95522] Apache OFBiz Nested Expression Evaluation Arbitrary UEL Function Execution
6536| [95521] Apache HTTP Server mod_session_dbd Session Saving Unspecified Issue
6537| [95498] Apache HTTP Server mod_dav.c Crafted MERGE Request Remote DoS
6538| [95406] Apache Struts DefaultActionMapper Multiple Prefixing Parameters Arbitrary Site Redirect
6539| [95405] Apache Struts DefaultActionMapper Multiple Prefixing Parameters Remote Code Execution
6540| [95011] Apache CXF XML Parser SOAP Message Handling CPU Resource Exhaustion Remote DoS
6541| [94705] Apache Geronimo RMI Classloader Exposure Serialized Object Handling Remote Code Execution
6542| [94651] Apache Santuario (XML Security for C++) XML Signature CanonicalizationMethod Parameter Spoofing Weakness
6543| [94636] Apache Continuum workingCopy.action userDirectory Traversal Arbitrary File Access
6544| [94635] Apache Maven SCM SvnCommandlineUtils Process Listing Local Password Disclosure
6545| [94632] Apache Maven Wagon SSH (wagon-ssh) Host Verification Failure MitM Weakness
6546| [94625] Apache Santuario (XML Security for C++) XML Signature Reference Crafted XPointer Expression Handling Heap Buffer Overflow
6547| [94618] Apache Archiva /archiva/security/useredit.action username Parameter XSS
6548| [94617] Apache Archiva /archiva/security/roleedit.action name Parameter XSS
6549| [94616] Apache Archiva /archiva/security/userlist!show.action roleName Parameter XSS
6550| [94615] Apache Archiva /archiva/deleteArtifact!doDelete.action groupId Parameter XSS
6551| [94614] Apache Archiva /archiva/admin/addLegacyArtifactPath!commit.action legacyArtifactPath.path Parameter XSS
6552| [94613] Apache Archiva /archiva/admin/addRepository.action Multiple Parameter XSS
6553| [94612] Apache Archiva /archiva/admin/editAppearance.action Multiple Parameter XSS
6554| [94611] Apache Archiva /archiva/admin/addLegacyArtifactPath.action Multiple Parameter XSS
6555| [94610] Apache Archiva /archiva/admin/addNetworkProxy.action Multiple Parameter XSS
6556| [94403] Apache Santuario (XML Security for C++) InclusiveNamespace PrefixList Processing Heap Overflow
6557| [94402] Apache Santuario (XML Security for C++) HMAC-based XML Signature Processing DoS
6558| [94401] Apache Santuario (XML Security for C++) XPointer Evaluation Stack Overflow
6559| [94400] Apache Santuario (XML Security for C++) HMAC-Based XML Signature Reference Element Validation Spoofing Weakness
6560| [94279] Apache Qpid CA Certificate Validation Bypass
6561| [94275] Apache Solr JettySolrRunner.java Can Not Find Error Message XSS
6562| [94233] Apache OpenJPA Object Deserialization Arbitrary Executable Creation
6563| [94042] Apache Axis JAX-WS Java Unspecified Exposure
6564| [93969] Apache Struts OGNL Expression Handling Double Evaluation Error Remote Command Execution
6565| [93796] Apache Subversion Filename Handling FSFS Repository Corruption Remote DoS
6566| [93795] Apache Subversion svnserve Server Aborted Connection Message Handling Remote DoS
6567| [93794] Apache Subversion contrib/hook-scripts/check-mime-type.pl svnlook Hyphenated argv Argument Handling Remote DoS
6568| [93793] Apache Subversion contrib/hook-scripts/svn-keyword-check.pl Filename Handling Remote Command Execution
6569| [93646] Apache Struts Crafted Parameter Arbitrary OGNL Code Execution
6570| [93645] Apache Struts URL / Anchor Tag includeParams Attribute Remote Command Execution
6571| [93636] Apache Pig Multiple Physical Operator Memory Exhaustion Remote Remote DoS
6572| [93635] Apache Wink DTD (Document Type Definition) Expansion Data Parsing Information Disclosure
6573| [93605] RT Apache::Session::File Session Replay Reuse Information Disclosure
6574| [93599] Apache Derby SYSCS_UTIL.SYSCS_SET_DATABASE_PROPERTY Boot Password Manipulation Re-encryption Failure Password Corruption
6575| [93555] Apache Commons Codec Invalid Base32 String Information Tunneling Weakness
6576| [93554] Apache HBase bulkLoadHFiles() Method ACL Bypass
6577| [93543] JBoss Enterprise Application Platform org.apache.catalina.connector.Response.encodeURL() Method MitM jsessionid Disclosure
6578| [93542] Apache ManifoldCF (Connectors Framework) org.apache.manifoldcf.crawler.ExportConfiguration Class Configuration Export Password Disclosure
6579| [93541] Apache Solr json.wrf Callback XSS
6580| [93524] Apache Hadoop GetSecurityDescriptorControl() Function Absolute Security Descriptor Handling NULL Descriptor Weakness
6581| [93521] Apache jUDDI Security API Token Session Persistence Weakness
6582| [93520] Apache CloudStack Default SSL Key Weakness
6583| [93519] Apache Shindig /ifr Cross-site Arbitrary Gadget Invocation
6584| [93518] Apache Solr /admin/analysis.jsp name Parameter XSS
6585| [93517] Apache CloudStack setup-cloud-management /etc/sudoers Modification Local Privilege Escalation
6586| [93516] Apache CXF UsernameTokenInterceptor Nonce Caching Replay Weakness
6587| [93515] Apache HBase table.jsp name Parameter XSS
6588| [93514] Apache CloudStack Management Server Unauthenticated Remote JMX Connection Default Setting Weakness
6589| [93463] Apache Struts EL / OGNL Interpretation Unspecified Remote Code Execution
6590| [93462] Apache CXF WS-SecurityPolicy AlgorithmSuite Arbitrary Ciphertext Decryption Weakness
6591| [93401] Apache Hadoop core-site.xml Permission Weakness Local Alfredo Secret Disclosure
6592| [93400] Apache Hadoop Map/Reduce Job Log Directory Symlink Arbitrary File Mode Manipulation
6593| [93397] Apache Wicket Referrer HTTP Header Session ID Disclosure
6594| [93366] Apache HTTP Server modules/mappers/mod_rewrite.c do_rewritelog() Function Log File Terminal Escape Sequence Filtering Remote Command Execution
6595| [93254] Apache Tomcat AsyncListener Method Cross-session Information Disclosure
6596| [93253] Apache Tomcat Chunked Transfer Encoding Data Saturation Remote DoS
6597| [93252] Apache Tomcat FORM Authenticator Session Fixation
6598| [93172] Apache Camel camel/endpoints/ Endpoint XSS
6599| [93171] Apache Sling HtmlResponse Error Message XSS
6600| [93170] Apache Directory DelegatingAuthenticator MitM Spoofing Weakness
6601| [93169] Apache Wave AuthenticationServlet.java Session Fixation Weakness
6602| [93168] Apache Click ErrorReport.java id Parameter XSS
6603| [93167] Apache ActiveMQ JMSXUserId Spoofing Weakness
6604| [93166] Apache CXF Crafted Message Element Count Handling System Resource Exhaustion Remote DoS
6605| [93165] Apache CXF Crafted Message Element Level Handling System Resource Exhaustion Remote DoS
6606| [93164] Apache Harmony DatagramSocket Class connect Method CheckAccept() IP Blacklist Bypass
6607| [93163] Apache Hadoop Map/Reduce Daemon Symlink Arbitrary File Overwrite
6608| [93162] Apache VelocityStruts struts/ErrorsTool.getMsgs Error Message XSS
6609| [93161] Apache CouchDB Rewriter VM Atom Table Memory Exhaustion Remote DoS
6610| [93158] Apache Wicket BookmarkablePageLink Feature XSS CSRF
6611| [93157] Apache Struts UrlHelper.java s:url includeParams Functionality XSS
6612| [93156] Apache Tapestry Calendar Component datefield.js datefield Parameter XSS
6613| [93155] Apache Struts fielderror.ftl fielderror Parameter Error Message XSS
6614| [93154] Apache JSPWiki Edit.jsp createPages WikiPermission Bypass
6615| [93153] Apache PDFBox PDFXrefStreamParser Missing Element Handling PDF Parsing DoS
6616| [93152] Apache Hadoop HttpServer.java Multiple Function XSS
6617| [93151] Apache Shiro Search Filter userName Parameter LDAP Code Injection Weakness
6618| [93150] Apache Harmony java.net.SocketPermission Class boolean equals Function checkConnect() Weakness Host Name Retrieval
6619| [93149] Apache Harmony java.security.Provider Class void load Function checkSecurityAccess() Weakness
6620| [93148] Apache Harmony java.security.ProtectionDomain Class java.lang.String.toString() Function checkPermission() Weakness
6621| [93147] Apache Harmony java.net.URLConnection openConnection Function checkConnect Weakness Proxy Connection Permission Bypass
6622| [93146] Apache Harmony java.net.ServerSocket Class void implAccept Function checkAccept() Weakness SerSocket Subclass Creation
6623| [93145] Apache Qpid JMS Client Detached Session Frame Handling NULL Pointer Dereference Remote DoS
6624| [93144] Apache Solr Admin Command Execution CSRF
6625| [93009] Apache VCL XMLRPC API Unspecified Function Remote Privilege Escalation
6626| [93008] Apache VCL Web GUI Unspecified Remote Privilege Escalation
6627| [92997] Apache Commons Codec org.apache.commons.codec.net.URLCodec Fields Missing 'final' Thread-safety Unspecified Issue
6628| [92976] Apache ActiveMQ scheduled.jsp crontab Command XSS
6629| [92947] Apache Commons Codec org.apache.commons.codec.language.Soundex.US_ENGLISH_MAPPING Missing MS_PKGPROTECT Field Manipulation Unspecified Issue
6630| [92749] Apache CloudStack Predictable Hash Virtual Machine Console Console Access URL Generation
6631| [92748] Apache CloudStack VM Console Access Restriction Bypass
6632| [92709] Apache ActiveMQ Web Console Unauthenticated Remote Access
6633| [92708] Apache ActiveMQ Sample Web Application Broker Resource Consumption Remote DoS
6634| [92707] Apache ActiveMQ webapp/websocket/chat.js Subscribe Message XSS
6635| [92706] Apache ActiveMQ Debug Log Rendering XSS
6636| [92705] Apache ActiveMQ PortfolioPublishServlet.java refresh Parameter XSS
6637| [92270] Apache Tomcat Unspecified CSRF
6638| [92094] Apache Subversion mod_dav_svn Module Nonexistent URL Lock Request Handling NULL Pointer Dereference Remote DoS
6639| [92093] Apache Subversion mod_dav_svn Module Activity URL PROPFIND Request Handling NULL Pointer Dereference Remote DoS
6640| [92092] Apache Subversion mod_dav_svn Module Log REPORT Request Handling NULL Pointer Dereference Remote DoS
6641| [92091] Apache Subversion mod_dav_svn Module Node Property Handling Resource Exhaustion Remote DoS
6642| [92090] Apache Subversion mod_dav_svn Module Activity URL Lock Request Handling NULL Pointer Dereference Remote DoS
6643| [91774] Apache Commons Codec Unspecified Non-private Field Manipulation Weakness
6644| [91628] mod_ruid2 for Apache HTTP Server fchdir() Inherited File Descriptor chroot Restriction Bypass
6645| [91328] Apache Wicket $up$ Traversal Arbitrary File Access
6646| [91295] Apple Mac OS X Apache Unicode Character URI Handling Authentication Bypass
6647| [91235] Apache Rave /app/api/rpc/users/get User Object Hashed Password Remote Disclosure
6648| [91185] Munin Default Apache Configuration Permission Weakness Remote Information Disclosure
6649| [91173] Apache Wicket WebApplicationPath Constructor Bypass /WEB-INF/ Directory File Access
6650| [91172] Apache Wicket PackageResourceGuard File Extension Filter Bypass
6651| [91025] Apache Qpid qpid::framing::Buffer Class Multiple Method Out-of-bounds Access Remote DoS
6652| [91024] Apache Qpid federation_tag Attribute Handling Federated Interbroker Link Access Restriction Bypass
6653| [91023] Apache Qpid AMQP Type Decoder Exposure Array Size Value Handling Memory Consumption Remote DoS
6654| [91022] Apache Qpid qpid/cpp/include/qpid/framing/Buffer.h qpid::framing::Buffer::checkAvailable() Function Integer Overflow
6655| [90986] Apache Jena ARQ INSERT DATA Request Handling Overflow
6656| [90907] Apache Subversion mod_dav_svn / libsvn_fs svn_fs_file_length() Function MKACTIVITY / PROPFIND Option Request Handling Remote DoS
6657| [90906] Apache Commons FileUpload /tmp Storage Symlink Arbitrary File Overwrite
6658| [90864] Apache Batik 1xx Redirect Script Origin Restriction Bypass
6659| [90858] Apache Ant Malformed TAR File Handling Infinite Loop DoS
6660| [90852] Apache HTTP Server for Debian apachectl /var/lock Permission Weakness Symlink Directory Permission Manipulation
6661| [90804] Apache Commons CLI Path Subversion Local Privilege Escalation
6662| [90802] Apache Avro Recursive Schema Handling Infinite Recursion DoS
6663| [90592] Apache Batik ApplicationSecurityEnforcer.java Multiple Method Security Restriction Bypass
6664| [90591] Apache Batik XML External Entity (XXE) Data Parsing Arbitrary File Disclosure
6665| [90565] Apache Tomcat Log Directory Permission Weakness Local Information Disclosure
6666| [90564] Apache Maven / Maven Wagon SSL Certificate Validation MitM Spoofing Weakness
6667| [90557] Apache HTTP Server mod_proxy_balancer balancer-manager Interface Multiple Parameter XSS
6668| [90556] Apache HTTP Server Multiple Module Multiple Parameter XSS
6669| [90276] Apache Axis2 axis2.xml Plaintext Password Local Disclosure
6670| [90249] Apache Axiom ClassLoader XMLInputFactory / XMLOutputFactory Construction Unspecified Issue
6671| [90235] Apache Commons HttpClient Certificate Wildcard Matching Weakness
6672| [90079] Apache CXF WSS4JInInterceptor URIMappingInterceptor WS-Security SOAP Service Access Restriction Bypass
6673| [90078] Apache CXF WS-SecurityPolicy Enabled Plaintext UsernameTokens Handling Authentication Bypass
6674| [89453] Apache Open For Business Project (OFBiz) Screenlet.title Widget Attribute XSS
6675| [89452] Apache Open For Business Project (OFBiz) Image.alt Widget Attribute XSS
6676| [89294] Apache CouchDB Futon UI Browser-based Test Suite Query Parameter XSS
6677| [89293] Apache CouchDB Unspecified Traversal Arbitrary File Access
6678| [89275] Apache HTTP Server mod_proxy_ajp Module Expensive Request Parsing Remote DoS
6679| [89267] Apache CouchDB JSONP Callback Handling Unspecified XSS
6680| [89146] Apache CloudStack Master Server log4j.conf SSH Private Key / Plaintext Password Disclosure
6681| [88603] Apache OpenOffice.org (OOo) Unspecified Information Disclosure
6682| [88602] Apache OpenOffice.org (OOo) Unspecified Manifest-processing Issue
6683| [88601] Apache OpenOffice.org (OOo) Unspecified PowerPoint File Handling Issue
6684| [88285] Apache Tomcat Partial HTTP Request Saturation Remote DoS
6685| [88095] Apache Tomcat NIO Connector Terminated Connection Infinte Loop DoS
6686| [88094] Apache Tomcat FORM Authentication Crafted j_security_check Request Security Constraint Bypass
6687| [88093] Apache Tomcat Null Session Requst CSRF Prevention Filter Bypass
6688| [88043] IBM Tivoli Netcool/Reporter Apache CGI Unspecified Remote Command Execution
6689| [87580] Apache Tomcat DIGEST Authentication Session State Caching Authentication Bypass Weakness
6690| [87579] Apache Tomcat DIGEST Authentication Stale Nonce Verification Authentication Bypass Weakness
6691| [87477] Apache Tomcat Project Woodstock Service Error Page UTF-7 XSS Weakness
6692| [87227] Apache Tomcat InternalNioInputBuffer.java parseHeaders() Function Request Header Size Parsing Remote DoS
6693| [87223] Apache Tomcat DIGEST Authentication replay-countermeasure Functionality cnonce / cn Verification Authentication Bypass Weakness
6694| [87160] Apache Commons HttpClient X.509 Certificate Domain Name Matching MiTM Weakness
6695| [87159] Apache CXF X.509 Certificate Domain Name Matching MiTM Weakness
6696| [87150] Apache Axis / Axis2 X.509 Certificate Domain Name Matching MiTM Weakness
6697| [86902] Apache HTTP Server 3xx Redirect Internal IP Address Remote Disclosure
6698| [86901] Apache Tomcat Error Message Path Disclosure
6699| [86684] Apache CloudStack Unauthorized Arbitrary API Call Invocation
6700| [86556] Apache Open For Business Project (OFBiz) Unspecified Issue
6701| [86503] Visual Tools VS home/apache/DiskManager/cron/init_diskmgr Local Command Execution
6702| [86401] Apache ActiveMQ ResourceHandler Traversal Arbitrary File Access
6703| [86225] Apache Axis2 XML Signature Wrapping (XSW) Authentication Bypass
6704| [86206] Apache Axis2 Crafted SAML Assertion Signature Exclusion Attack Authentication Bypass
6705| [85722] Apache CXF SOAP Request Parsing Access Restriction Bypass
6706| [85704] Apache Qpid Incoming Client Connection Saturation Remote DoS
6707| [85474] Eucalyptus Apache Santuario (XML Security for Java) Library XML Signature Transform Handling DoS
6708| [85430] Apache mod_pagespeed Module Unspecified XSS
6709| [85429] Apache mod_pagespeed Module Hostname Verification Cross-host Resource Disclosure
6710| [85249] Apache Wicket Unspecified XSS
6711| [85236] Apache Hadoop conf/hadoop-env.sh Temporary File Symlink Arbitrary File Manipulation
6712| [85090] Apache HTTP Server mod_proxy_ajp.c mod_proxy_ajp Module Proxy Functionality Cross-client Information Disclosure
6713| [85089] Apache HTTP Server mod_proxy_http.c mod_proxy_http Module Cross-client Information Disclosure
6714| [85062] Apache Solr Autocomplete Module for Drupal Autocomplete Results XSS
6715| [85010] Apache Struts Token Handling Mechanism Token Name Configuration Parameter CSRF Weakness
6716| [85009] Apache Struts Request Parameter OGNL Expression Parsing Remote DoS
6717| [84911] libapache2-mod-rpaf X-Forward-For HTTP Header Parsing Remote DoS
6718| [84823] Apache HTTP Server Multiple Module Back End Server Error Handling HTTP Request Parsing Remote Information Disclosure
6719| [84818] Apache HTTP Server mod_negotiation Module mod_negotiation.c make_variant_list Function XSS
6720| [84562] Apache Qpid Broker Authentication Mechanism AMQP Client Shadow Connection NullAuthenticator Request Parsing Authentication Bypass
6721| [84458] Apache Libcloud SSL Certificate Validation MitM Spoofing Weakness
6722| [84279] PHP on Apache php_default_post_reader POST Request Handling Overflow DoS
6723| [84278] PHP w/ Apache PDO::ATTR_DEFAULT_FETCH_MODE / PDO::FETCH_CLASS DoS
6724| [84231] Apache Hadoop DataNodes Client BlockTokens Arbitrary Block Access
6725| [83943] Oracle Solaris Cluster Apache Tomcat Agent Subcomponent Unspecified Local Privilege Escalation
6726| [83939] Oracle Solaris Apache HTTP Server Subcomponent Unspecified Remote Information Disclosure
6727| [83685] svnauthcheck Apache HTTP Configuration File Permission Revocation Weakness
6728| [83682] Apache Sling POST Servlet @CopyFrom Operation HTTP Request Parsing Infinite Loop Remote DoS
6729| [83339] Apache Roller Blogger Roll Unspecified XSS
6730| [83270] Apache Roller Unspecified Admin Action CSRF
6731| [82782] Apache CXF WS-SecurityPolicy 1.1 SupportingToken Policy Bypass
6732| [82781] Apache CXF WS-SecurityPolicy Supporting Token Children Specification Token Signing Verification Weakness
6733| [82611] cPanel Apache Piped Log Configuration Log Message Formatting Traversal Arbitrary File Creation
6734| [82436] MapServer for Windows Bundled Apache / PHP Configuration Local File Inclusion
6735| [82215] PHP sapi/cgi/cgi_main.c apache_request_headers Function HTTP Header Handling Remote Overflow
6736| [82161] Apache Commons Compress bzip2 File Compression BZip2CompressorOutputStream Class File Handling Remote DoS
6737| [81965] Apache Batik Squiggle SVG Browser JAR File Arbitrary Code Execution
6738| [81790] Apache POI src/org/apache/poi/hwpf/model/UnhandledDataStructure.java UnhandledDataStructure() constructor Length Attribute CDF / CFBF File Handling Remote DoS
6739| [81660] Apache Qpid Credential Checking Cluster Authentication Bypass
6740| [81511] Apache for Debian /usr/share/doc HTTP Request Parsing Local Script Execution
6741| [81359] Apache HTTP Server LD_LIBRARY_PATH Variable Local Privilege Escalation
6742| [81349] Apache Open For Business Project (OFBiz) Webslinger Component Unspecified XSS
6743| [81348] Apache Open For Business Project (OFBiz) Content IDs / Map-Keys Unspecified XSS
6744| [81347] Apache Open For Business Project (OFBiz) Parameter Arrays Unspecified XSS
6745| [81346] Apache Open For Business Project (OFBiz) checkoutProcess.js getServerError() Function Unspecified XSS
6746| [81196] Apache Open For Business Project (OFBiz) FlexibleStringExpander Nested Script String Parsing Remote Code Execution
6747| [80981] Apache Hadoop Kerberos/MapReduce Security Feature User Impersonation Weakness
6748| [80571] Apache Traffic Server Host HTTP Header Parsing Remote Overflow
6749| [80547] Apache Struts XSLTResult.java File Upload Arbitrary Command Execution
6750| [80360] AskApache Password Protector Plugin for WordPress Error Page $_SERVER Superglobal XSS
6751| [80349] Apache HTTP Server mod_fcgid Module fcgid_spawn_ctl.c FcgidMaxProcessesPerClass Virtual Host Directive HTTP Request Parsing Remote DoS
6752| [80301] Apache Wicket /resources/ Absolute Path Arbitrary File Access
6753| [80300] Apache Wicket wicket:pageMapName Parameter XSS
6754| [79478] Apache Solr Extension for TYPO3 Unspecified XSS
6755| [79002] Apache MyFaces javax.faces.resource In Parameter Traversal Arbitrary File Access
6756| [78994] Apache Struts struts-examples/upload/upload-submit.do name Parameter XSS
6757| [78993] Apache Struts struts-cookbook/processDyna.do message Parameter XSS
6758| [78992] Apache Struts struts-cookbook/processSimple.do message Parameter XSS
6759| [78991] Apache Struts struts2-rest-showcase/orders clientName Parameter XSS
6760| [78990] Apache Struts struts2-showcase/person/editPerson.action Multiple Parameter XSS
6761| [78932] Apache APR Hash Collision Form Parameter Parsing Remote DoS
6762| [78903] Apache CXF SOAP Request Parsing WS-Security UsernameToken Policy Bypass
6763| [78600] Apache Tomcat HTTP DIGEST Authentication DigestAuthenticator.java Catalina Weakness Security Bypass
6764| [78599] Apache Tomcat HTTP DIGEST Authentication Realm Value Parsing Security Bypass
6765| [78598] Apache Tomcat HTTP DIGEST Authentication qop Value Parsing Security Bypass
6766| [78573] Apache Tomcat Parameter Saturation CPU Consumption Remote DoS
6767| [78556] Apache HTTP Server Status Code 400 Default Error Response httpOnly Cookie Disclosure
6768| [78555] Apache HTTP Server Threaded MPM %{cookiename}C Log Format String Cookie Handling Remote DoS
6769| [78501] Apache Struts ParameterInterceptor Class OGNL Expression Parsing Remote Command Execution
6770| [78331] Apache Tomcat Request Object Recycling Information Disclosure
6771| [78293] Apache HTTP Server Scoreboard Invalid Free Operation Local Security Bypass
6772| [78277] Apache Struts ExceptionDelegator Component Parameter Parsing Remote Code Execution
6773| [78276] Apache Struts DebuggingInterceptor Component Developer Mode Unspecified Remote Command Execution
6774| [78113] Apache Tomcat Hash Collision Form Parameter Parsing Remote DoS
6775| [78112] Apache Geronimo Hash Collision Form Parameter Parsing Remote DoS
6776| [78109] Apache Struts ParameterInterceptor Traversal Arbitrary File Overwrite
6777| [78108] Apache Struts CookieInterceptor Cookie Name Handling Remote Command Execution
6778| [77593] Apache Struts Conversion Error OGNL Expression Injection
6779| [77496] Apache ActiveMQ Failover Mechanism Openwire Request Parsing Remote DoS
6780| [77444] Apache HTTP Server mod_proxy Mdule Web Request HTTP/0.9 Protocol URL Parsing Proxy Remote Security Bypass
6781| [77374] Apache MyFaces Java Bean includeViewParameters Parsing EL Expression Security Weakness
6782| [77310] Apache HTTP Server mod_proxy Reverse Proxy Mode Security Bypass Weakness (2011-4317)
6783| [77234] Apache HTTP Server on cygwin Encoded Traversal Arbitrary File Access
6784| [77012] Apache HTTP Server server/utils.c ap_pregsub() Function htaccess File Handling Local Memory Consumption DoS
6785| [76944] Apache Tomcat Manager Application Servlets Access Restriction Bypass
6786| [76744] Apache HTTP Server server/utils.c ap_pregsub() Function htaccess File Handling Local Overflow
6787| [76189] Apache Tomcat HTTP DIGEST Authentication Weakness
6788| [76079] Apache HTTP Server mod_proxy Mdule Web Request URL Parsing Proxy Remote Security Bypass (2011-3368)
6789| [76072] Apache JServ jserv.conf jserv-status Handler jserv/ URI Request Parsing Local Information Disclosure
6790| [75807] Apache HTTP Server Incomplete Header Connection Saturation Remote DoS
6791| [75647] Apache HTTP Server mod_proxy_ajp Module mod_proxy_balancer HTTP Request Remote DoS
6792| [75376] Apache Libcloud SSL Certificate Validation MitM Server Spoofing Weakness
6793| [74853] Domain Technologie Control /etc/apache2/apache2.conf File Permissions Weakness dtcdaemons User Password Disclosure
6794| [74818] Apache Tomcat AJP Message Injection Authentication Bypass
6795| [74725] Apache Wicket Multi Window Support Unspecified XSS
6796| [74721] Apache HTTP Server ByteRange Filter Memory Exhaustion Remote DoS
6797| [74541] Apache Commons Daemon Jsvc Permissions Weakness Arbitrary File Access
6798| [74535] Apache Tomcat XML Parser Cross-application Multiple File Manipulation
6799| [74447] Apache Struts XWork Nonexistent Method s:submit Element Internal Java Class Remote Path Disclosure
6800| [74262] Apache HTTP Server Multi-Processing Module itk.c Configuration Merger mpm-itk root UID / GID Remote Privilege Escalation
6801| [74120] Apache HTTP Server mod_authnz_external mysql/mysql-auth.pl user Field SQL Injection
6802| [73920] Oracle Secure Backup /apache/htdocts/php/common.php username Parameter Remote Code Execution
6803| [73798] Apache Tomcat sendfile Request Start / Endpoint Parsing Local DoS
6804| [73797] Apache Tomcat sendfile Request Attribute Validation Weakness Local Access Restriction Bypass
6805| [73776] Apache Tomcat HTTP BIO Connector HTTP Pipelining Cross-user Remote Response Access
6806| [73644] Apache XML Security Signature Key Parsing Overflow DoS
6807| [73600] Apache Struts javatemplates Plugin Component Handlers .action URI Multiple Parameter XSS
6808| [73462] Apache Rampart/C util/rampart_timestamp_token.c rampart_timestamp_token_validate Function Expired Token Remote Access Restriction Bypass
6809| [73429] Apache Tomcat JMX MemoryUserDatabase Local Password Disclosure
6810| [73384] Apache HTTP Server mod_rewrite PCRE Resource Exhaustion DoS
6811| [73383] Apache HTTP Server Portable Runtime (APR) Library apr_fnmatch() Infinite Loop Remote DoS
6812| [73378] IBM WebSphere Application Server (WAS) JavaServer Pages org.apache.jasper.runtime.JspWriterImpl.response JSP Page Application Restart Remote DoS
6813| [73247] Apache Subversion mod_dav_svn File Permission Weakness Information Disclosure
6814| [73246] Apache Subversion mod_dav_svn Path-based Access Control Rule Handling Remote DoS
6815| [73245] Apache Subversion mod_dav_svn Baselined Resource Request Handling Remote DoS
6816| [73154] Apache Archiva Multiple Unspecified CSRF
6817| [73153] Apache Archiva /archiva/admin/deleteNetworkProxy!confirm.action proxyid Parameter XSS
6818| [72407] Apache Tomcat @ServletSecurity Initial Load Annotation Security Constraint Bypass Information Disclosure
6819| [72238] Apache Struts Action / Method Names <
6820| [71647] Apache HttpComponents HttpClient Proxy-Authorization Credentials Remote Disclosure
6821| [71558] Apache Tomcat SecurityManager ServletContext Attribute Traversal Arbitrary File Manipulation
6822| [71557] Apache Tomcat HTML Manager Multiple XSS
6823| [71075] Apache Archiva User Management Page XSS
6824| [71027] Apache Tomcat @ServletSecurity Annotation Security Constraint Bypass Information Disclosure
6825| [70925] Apache Continuum Project Pages Unspecified XSS (2011-0533)
6826| [70924] Apache Continuum Multiple Admin Function CSRF
6827| [70809] Apache Tomcat NIO HTTP Connector Request Line Processing DoS
6828| [70734] Apache CouchDB Request / Cookie Handling Unspecified XSS
6829| [70585] Oracle Fusion Middleware Oracle HTTP Server Apache Plugin Unspecified Remote Issue
6830| [70333] Apache Subversion rev_hunt.c blame Command Multiple Memory Leak Remote DoS
6831| [70332] Apache Subversion Apache HTTP Server mod_dav_svn repos.c walk FunctionSVNParentPath Collection Remote DoS
6832| [69659] Apache Archiva Admin Authentication Weakness Privilege Escalation
6833| [69520] Apache Archiva Administrator Credential Manipulation CSRF
6834| [69512] Apache Tomcat Set-Cookie Header HTTPOnly Flag Session Hijacking Weakness
6835| [69456] Apache Tomcat Manager manager/html/sessions Multiple Parameter XSS
6836| [69275] Apache mod_fcgid Module fcgid_bucket.c fcgid_header_bucket_read() Function Remote Overflow
6837| [69067] Apache Shiro URI Path Security Traversal Information Disclosure
6838| [68815] Apache MyFaces shared/util/StateUtils.java View State MAC Weakness Cryptographic Padding Remote View State Modification
6839| [68670] Apache Qpid C++ Broker Component broker/SessionAdapter.cpp SessionAdapter::ExchangeHandlerImpl::checkAlternate Function Exchange Alternate Remote DoS
6840| [68669] Apache Qpid cluster/Cluster.cpp Cluster::deliveredEvent Function Invalid AMQP Data Remote DoS
6841| [68662] Apache Axis2 dswsbobje.war Module Admin Account Default Password
6842| [68531] Apache Qpid qpidd sys/ssl/SslSocket.cpp Incomplete SSL Handshake Remote DoS
6843| [68327] Apache APR-util buckets/apr_brigade.c apr_brigade_split_line() Function Memory Consumption DoS
6844| [68314] Apache XML-RPC SAX Parser External Entity Information Disclosure
6845| [67964] Apache Traffic Server Transaction ID / Source Port Randomization Weakness DNS Cache Poisoning
6846| [67846] SUSE Lifecycle Management Server on SUSE Linux Enterprise apache2-slms Parameter Quoting CSRF
6847| [67294] Apache CXF XML SOAP Message Crafted Document Type Declaration Remote DoS
6848| [67240] Apache CouchDB Installation Page Direct Request Arbitrary JavaScript Code Execution CSRF
6849| [67205] Apache Derby BUILTIN Authentication Password Hash Generation Algorithm SHA-1 Transformation Password Substitution
6850| [66745] Apache HTTP Server Multiple Modules Pathless Request Remote DoS
6851| [66319] Apache Tomcat Crafted Transfer-Encoding Header Handling Buffer Recycling Remote DoS
6852| [66280] Apache Struts XWork ParameterInterceptor Server-Side Object Remote Code Execution
6853| [66226] Apache Axis2 Admin Interface Cookie Session Fixation
6854| [65697] Apache Axis2 / Java SOAP Message DTD Rejection Weakness Arbitrary File Access
6855| [65654] Apache HTTP Server mod_proxy_http mod_proxy_http.c Timeout Detection Weakness HTTP Request Response Disclosure
6856| [65429] Apache MyFaces Unencrypted ViewState Serialized View Object Manipulation Arbitrary Expression Language (EL) Statement Execution
6857| [65054] Apache ActiveMQ Jetty Error Handler XSS
6858| [64844] Apache Axis2/Java axis2/axis2-admin/engagingglobally modules Parameter XSS
6859| [64522] Apache Open For Business Project (OFBiz) ecommerce/control/contactus Multiple Parameter XSS
6860| [64521] Apache Open For Business Project (OFBiz) Web Tools Section entityName Parameter XSS
6861| [64520] Apache Open For Business Project (OFBiz) ecommerce/control/ViewBlogArticle contentId Parameter XSS
6862| [64519] Apache Open For Business Project (OFBiz) Control Servlet URI XSS
6863| [64518] Apache Open For Business Project (OFBiz) Show Portal Page Section start Parameter XSS
6864| [64517] Apache Open For Business Project (OFBiz) View Profile Section partyId Parameter XSS
6865| [64516] Apache Open For Business Project (OFBiz) Export Product Listing Section productStoreId Parameter XSS
6866| [64307] Apache Tomcat Web Application Manager/Host Manager CSRF
6867| [64056] mod_auth_shadow for Apache HTTP Server wait() Function Authentication Bypass
6868| [64023] Apache Tomcat WWW-Authenticate Header Local Host Information Disclosure
6869| [64020] Apache ActiveMQ Jetty ResourceHandler Crafted Request JSP File Source Disclosure
6870| [63895] Apache HTTP Server mod_headers Unspecified Issue
6871| [63368] Apache ActiveMQ createDestination.action JMSDestination Parameter CSRF
6872| [63367] Apache ActiveMQ createDestination.action JMSDestination Parameter XSS
6873| [63350] Apache CouchDB Hash Verification Algorithm Predictable Execution Time Weakness
6874| [63140] Apache Thrift Service Malformed Data Remote DoS
6875| [62676] Apache HTTP Server mod_proxy_ajp Module Crafted Request Remote DoS
6876| [62675] Apache HTTP Server Multi-Processing Module (MPM) Subrequest Header Handling Cross-thread Information Disclosure
6877| [62674] Apache HTTP Server mod_isapi Module Unloading Crafted Request Remote DoS
6878| [62231] Apache HTTP Server Logging Format Weakness Crafted DNS Response IP Address Spoofing
6879| [62230] Apache HTTP Server Crafted DNS Response Inverse Lookup Log Corruption XSS
6880| [62054] Apache Tomcat WAR Filename Traversal Work-directory File Deletion
6881| [62053] Apache Tomcat Autodeployment Process appBase File HTTP Request Authentication Bypass
6882| [62052] Apache Tomcat WAR File Traversal Arbitrary File Overwrite
6883| [62009] Apache HTTP Server src/modules/proxy/proxy_util.c mod_proxy ap_proxy_send_fb() Function Overflow
6884| [61379] Apache River Outrigger Entry Storage Saturation Memory Exhaustion DoS
6885| [61378] Apache Hadoop Map/Reduce JobTracker Memory Consumption DoS
6886| [61377] Apache Commons Modeler Multiple Mutable Static Fields Weakness
6887| [61376] Apache Rampart wsse:security Tag Signature Value Checking Weakness
6888| [60687] Apache C++ Standard Library (STDCXX) strxfrm() Function Overflow
6889| [60680] Apache Hadoop JobHistory Job Name Manipulation Weakness
6890| [60679] Apache ODE DeploymentWebService OMElement zipPart CRLF Injection
6891| [60678] Apache Roller Comment Email Notification Manipulation DoS
6892| [60677] Apache CouchDB Unspecified Document Handling Remote DoS
6893| [60428] Sun Java Plug-in org.apache.crimson.tree.XmlDocument Class reateXmlDocument Method Floppy Drive Access Bypass
6894| [60413] mod_throttle for Apache Shared Memory File Manipulation Local Privilege Escalation
6895| [60412] Sun Java Plug-in org.apache.xalan.processor.XSLProcessorVersion Class Unsigned Applet Variable Sharing Privilege Escalation
6896| [60396] Apache HTTP Server on OpenBSD Multipart MIME Boundary Remote Information Disclosure
6897| [60395] Apache HTTP Server on OpenBSD ETag HTTP Header Remote Information Disclosure
6898| [60232] PHP on Apache php.exe Direct Request Remote DoS
6899| [60176] Apache Tomcat Windows Installer Admin Default Password
6900| [60016] Apache HTTP Server on HP Secure OS for Linux HTTP Request Handling Unspecified Issue
6901| [59979] Apache HTTP Server on Apple Mac OS X HTTP TRACE Method Unspecified Client XSS
6902| [59969] Apache HTTP Server mod_ssl SSL / TLS Renegotiation Handshakes MiTM Plaintext Data Injection
6903| [59944] Apache Hadoop jobhistory.jsp XSS
6904| [59374] Apache Solr Search Extension for TYPO3 Unspecified XSS
6905| [59022] Apache Shindig ConcatProxyServlet HTTP Header Response Splitting
6906| [59021] Apache Cocoon X-Cocoon-Version Header Remote Information Disclosure
6907| [59020] Apache Tapestry HTTPS Session Cookie Secure Flag Weakness
6908| [59019] Apache mod_python Cookie Salting Weakness
6909| [59018] Apache Harmony Error Message Handling Overflow
6910| [59013] Apache Derby SYSCS_EXPORT_TABLE Arbitrary File Overwrite
6911| [59012] Apache Derby Driver Auto-loading Non-deterministic Startup Weakness
6912| [59011] Apache JSPWiki Page Attachment Change Note Function XSS
6913| [59010] Apache Solr get-file.jsp XSS
6914| [59009] Apache Solr action.jsp XSS
6915| [59008] Apache Solr analysis.jsp XSS
6916| [59007] Apache Solr schema.jsp Multiple Parameter XSS
6917| [59006] Apache Beehive select / checkbox Tag XSS
6918| [59005] Apache Beehive jpfScopeID Global Parameter XSS
6919| [59004] Apache Beehive Error Message XSS
6920| [59003] Apache HttpClient POST Request Handling Memory Consumption DoS
6921| [59002] Apache Jetspeed default-page.psml URI XSS
6922| [59001] Apache Axis2 xsd Parameter Traversal Arbitrary File Disclosure
6923| [59000] Apache CXF Unsigned Message Policy Bypass
6924| [58999] Apache WSS4J CallbackHandler Plaintext Password Validation Weakness
6925| [58998] Apache OpenJPA persistence.xml Cleartext Password Local Disclosure
6926| [58997] Apache OpenEJB openejb.xml Cleartext Password Local Disclosure
6927| [58996] Apache Hadoop Map/Reduce LinuxTaskController File Group Ownership Weakness
6928| [58995] Apache Hadoop Map/Reduce Task Ownership Weakness
6929| [58994] Apache Hadoop Map/Reduce DistributedCache Localized File Permission Weakness
6930| [58993] Apache Hadoop browseBlock.jsp XSS
6931| [58991] Apache Hadoop browseDirectory.jsp XSS
6932| [58990] Apache Hadoop Map/Reduce HTTP TaskTrackers User Data Remote Disclosure
6933| [58989] Apache Hadoop Sqoop Process Listing Local Cleartext Password Disclosure
6934| [58988] Apache Hadoop Chukwa HICC Portal Unspecified XSS
6935| [58987] Apache Hadoop Map/Reduce TaskTracker User File Permission Weakness
6936| [58986] Apache Qpid Encrypted Message Handling Remote Overflow DoS
6937| [58985] Apache Qpid Process Listing Local Cleartext Password Disclosure
6938| [58984] Apache Jackrabbit Content Repository (JCR) Default Account Privilege Access Weakness
6939| [58983] Apache Jackrabbit Content Repository (JCR) NamespaceRegistry API Registration Method Race Condition
6940| [58982] Apache Synapse Proxy Service Security Policy Mismatch Weakness
6941| [58981] Apache Geronimo TomcatGeronimoRealm Security Context Persistence Weakness
6942| [58980] Apache Geronimo LDAP Realm Configuration Restart Reversion Weakness
6943| [58979] Apache MyFaces Tomahawk ExtensionsPhaseListener HTML Injection Information Disclosure
6944| [58978] Apache MyFaces Trinidad LocaleInfoScriptlet XSS
6945| [58977] Apache Open For Business Project (OFBiz) Multiple Default Accounts
6946| [58976] Apache Open For Business Project (OFBiz) URI passThru Parameter XSS
6947| [58975] Apache Open For Business Project (OFBiz) PARTYMGR_CREATE/UPDATE Permission Arbitrary User Password Modification
6948| [58974] Apache Sling /apps Script User Session Management Access Weakness
6949| [58973] Apache Tuscany Crafted SOAP Request Access Restriction Bypass
6950| [58931] Apache Geronimo Cookie Parameters Validation Weakness
6951| [58930] Apache Xalan-C++ XPath Handling Remote DoS
6952| [58879] Apache Portable Runtime (APR-util) poll/unix/port.c Event Port Backend Pollset Feature Remote DoS
6953| [58837] Apache Commons Net FTPSClient CipherSuites / Protocols Mutable Object Unspecified Data Security Issue
6954| [58813] Apache MyFaces Trinidad tr:table / HTML Comment Handling DoS
6955| [58812] Apache Open For Business Project (OFBiz) JSESSIONID Session Hijacking Weakness
6956| [58811] Apache Open For Business Project (OFBiz) /catalog/control/EditProductConfigItem configItemId Parameter XSS
6957| [58810] Apache Open For Business Project (OFBiz) /catalog/control/EditProdCatalo prodCatalogId Parameter XSS
6958| [58809] Apache Open For Business Project (OFBiz) /partymgr/control/viewprofile partyId Parameter XSS
6959| [58808] Apache Open For Business Project (OFBiz) /catalog/control/createProduct internalName Parameter XSS
6960| [58807] Apache Open For Business Project (OFBiz) Multiple Unspecified CSRF
6961| [58806] Apache FtpServer MINA Logging Filter Cleartext Credential Local Disclosure
6962| [58805] Apache Derby Unauthenticated Database / Admin Access
6963| [58804] Apache Wicket Header Contribution Unspecified Issue
6964| [58803] Apache Wicket Session Fixation
6965| [58802] Apache Directory Server (ApacheDS) userPassword Attribute Search Password Disclosure
6966| [58801] Apache ActiveMQ Stomp Client Credential Validation Bypass
6967| [58800] Apache Tapestry (context)/servicestatus Internal Service Information Disclosure
6968| [58799] Apache Tapestry Logging Cleartext Password Disclosure
6969| [58798] Apache Jetspeed pipeline Parameter pipeline-map Policy Bypass
6970| [58797] Apache Jetspeed Password Policy Multiple Weaknesses
6971| [58796] Apache Jetspeed Unsalted Password Storage Weakness
6972| [58795] Apache Rampart Crafted SOAP Header Authentication Bypass
6973| [58794] Apache Roller Admin Protocol (RAP) Malformed Header Authentication Bypass
6974| [58793] Apache Hadoop Map/Reduce mapred.system.dir Permission Weakness Job Manipulation
6975| [58792] Apache Shindig gadgets.rpc iframe RPC Call Validation Weakness
6976| [58791] Apache Synapse synapse.properties Cleartext Credential Local Disclosure
6977| [58790] Apache WSS4J SOAP Message UsernameToken Remote Password Disclosure
6978| [58789] Apache WSS4J SOAP Header Malformed UsernameToken Authentication Bypass
6979| [58776] Apache JSPWiki PreviewContent.jsp Edited Text XSS
6980| [58775] Apache JSPWiki preview.jsp action Parameter XSS
6981| [58774] Apache JSPWiki Edit.jsp Multiple Parameter XSS
6982| [58773] Apache JSPWiki Accept-Language Header Multiple Script language Parameter XSS
6983| [58772] Apache JSPWiki EditorManager.java editor Parameter XSS
6984| [58771] Apache JSPWiki GroupContent.jsp Multiple Parameter XSS
6985| [58770] Apache JSPWiki Group.jsp group Parameter XSS
6986| [58769] Apache JSPWiki Database Connection Termination DoS Weakness
6987| [58768] Apache JSPWiki Attachment Servlet nextpage Parameter Arbitrary Site Redirect
6988| [58766] Apache JSPWiki /admin/SecurityConfig.jsp Direct Request Information Disclosure
6989| [58765] Apache JSPWiki Spam Filter UniqueID RNG Weakness
6990| [58764] Apache JSPWiki Edit.jsp Multiple Parameter XSS
6991| [58763] Apache JSPWiki Include Tag Multiple Script XSS
6992| [58762] Apache JSPWiki Multiple .java Tags pageContext Parameter XSS
6993| [58761] Apache JSPWiki Wiki.jsp skin Parameter XSS
6994| [58760] Apache Commons VFS Exception Error Message Cleartext Credential Disclosure
6995| [58759] Apache Jackrabbit Content Repository (JCR) UUID System.currentTimeMillis() RNG Weakness
6996| [58758] Apache River GrantPermission Policy Manipulation Privilege Escalation
6997| [58757] Apache WS-Commons Java2 StaXUtils Multiple Unspecified Minor Issues
6998| [58756] Apache WSS4J WSHandler Client Certificate Signature Validation Weakness
6999| [58755] Apache Harmony DRLVM Non-public Class Member Access
7000| [58754] Apache Harmony File.createTempFile() Temporary File Creation Prediction Weakness
7001| [58751] Apache Geronimo GeronimoIdentityResolver Subject Handling Multiple Issues
7002| [58750] Apache MyFaces Trinidad Generated HTML Information Disclosure
7003| [58749] Apache MyFaces Trinidad Database Access Error Message Information Disclosure
7004| [58748] Apache MyFaces Trinidad Image Resource Loader Traversal Arbitrary Image Access
7005| [58747] Apache MyFaces Trinidad Error Message User Entered Data Disclosure Weakness
7006| [58746] Apache Axis2 JAX-WS Java2 WSDL4J Unspecified Issue
7007| [58744] Apache Wicket Crafted File Upload Disk Space Exhaustion DoS
7008| [58743] Apache Wicket wicket.util.crypt.SunJceCrypt Encryption Reversion Weakness
7009| [58742] Apache Rampart PolicyBasedValiadtor HttpsToken Endpoint Connection Weakness
7010| [58741] Apache Rampart WSSecSignature / WSSecEncryptedKey KeyIdentifierType Validation Weakness
7011| [58740] Apache Rampart TransportBinding Message Payload Cleartext Disclosure
7012| [58739] Apache Open For Business Project (OFBiz) Unsalted Password Storage Weakness
7013| [58738] Apache Open For Business Project (OFBiz) orderId Parameter Arbitrary Order Access
7014| [58737] Apache mod_python w/ mod_python.publisher index.py Underscore Prefixed Variable Disclosure
7015| [58735] Apache Open For Business Project (OFBiz) /ecommerce/control/keywordsearch SEARCH_STRING Parameter XSS
7016| [58734] Apache Torque Log File Cleartext Credential Local Disclosure
7017| [58733] Apache Axis2 doGet Implementation Authentication Bypass Service State Manipulation
7018| [58732] Apache MyFaces UIInput.validate() Null Value Validation Bypass Weakness
7019| [58731] Apache MyFaces /faces/* Prefix Mapping Authentication Bypass
7020| [58725] Apache Tapestry Basic String ACL Bypass Weakness
7021| [58724] Apache Roller Logout Functionality Failure Session Persistence
7022| [58723] Apache Roller User Profile / Admin Page Cleartext Password Disclosure
7023| [58722] Apache Derby Connection URL Encryption Method Reversion Weakness
7024| [58721] Apache Geronimo on Tomcat Security-constraint Resource ACL Bypass
7025| [58720] Apache Geronimo Explicit Servlet Mapping Access Bypass Weakness
7026| [58719] Apache Geronimo Keystore Unprivileged Service Disable DoS
7027| [58718] Apache Geronimo Deployment Plans Remote Password Disclosure
7028| [58717] Apache Jetspeed Portlet Application Edit Access Restriction Bypass
7029| [58716] Apache Jetspeed PSML Management Cached Constraint Authentication Weakness
7030| [58707] Apache WSS4J Crafted PasswordDigest Request Authentication Bypass
7031| [58706] Apache HttpClient Pre-emptive Authorization Remote Credential Disclosure
7032| [58705] Apache Directory Server (ApacheDS) User Passwords Cleartext Disclosure
7033| [58704] Apache Directory Server (ApacheDS) Non-existent User LDAP Bind Remote DoS
7034| [58703] Apache Geronimo Debug Console Unauthenticated Remote Information Disclosure
7035| [58702] Apache Directory Server (ApacheDS) Persistent LDAP Anonymous Bind Weakness
7036| [58701] Apache Jetspeed User Admin Portlet Unpassworded Account Creation Weakness
7037| [58700] Apache MyFaces /faces/* Path Handling Remote Overflow DoS
7038| [58699] Apache MyFaces Disable Property Client Side Manipulation Privilege Escalation
7039| [58698] Apache Roller Remember Me Functionality Cleartext Password Disclosure
7040| [58697] Apache XalanJ2 org.apache.xalan.xsltc.runtime.CallFunction Class Unspecified Issue
7041| [58696] Apache Tapestry Encoded Traversal Arbitrary File Access
7042| [58695] Apache Jetspeed Unauthenticated PSML Tags / Admin Folder Access
7043| [58694] Apache Geronimo Deploy Tool Process List Local Credential Disclosure
7044| [58693] Apache Derby service.properties File Encryption Key Information Disclosure
7045| [58692] Apache Geronimo Default Security Realm Login Brute Force Weakness
7046| [58689] Apache Roller Retrieve Last 5 Post Feature Unauthorized Blog Post Manipulation
7047| [58688] Apache Xalan-Java (XalanJ2) Static Variables Multiple Unspecified Issues
7048| [58687] Apache Axis Invalid wsdl Request XSS
7049| [58686] Apache Cocoon Temporary File Creation Unspecified Race Condition
7050| [58685] Apache Velocity Template Designer Privileged Code Execution
7051| [58684] Apache Jetspeed controls.Customize Action Security Check Bypass
7052| [58675] Apache Open For Business Project (OFBiz) eCommerce/ordermgr Multiple Field XSS
7053| [58674] Apache Open For Business Project (OFBiz) ecommerce/control/login Multiple Field XSS
7054| [58673] Apache Open For Business Project (OFBiz) ecommerce/control/viewprofile Multiple Field XSS
7055| [58672] Apache Open For Business Project (OFBiz) POS Input Panel Cleartext Password Disclosure
7056| [58671] Apache Axis2 JMS Signed Message Crafted WS-Security Header Security Bypass
7057| [58670] Apache Jetspeed JetspeedTool.getPortletFromRegistry Portlet Security Validation Failure
7058| [58669] Apache Jetspeed LDAP Cleartext Passwords Disclosure
7059| [58668] Apache Axis External Entity (XXE) Data Parsing Privilege Escalation
7060| [58667] Apache Roller Database Cleartext Passwords Disclosure
7061| [58666] Apache Xerces-C++ UTF-8 Transcoder Overlong Code Handling Unspecified Issue
7062| [58665] Apache Jetspeed Turbine: Cross-user Privileged Action Execution
7063| [58664] Apache Jetspeed EditAccount.vm Password Modification Weakness
7064| [58663] Apache Jetspeed Role Parameter Arbitrary Portlet Disclosure
7065| [58662] Apache Axis JWS Page Generated .class File Direct Request Information Disclosure
7066| [58661] Apache Jetspeed user-form.vm Password Reset Cleartext Disclosure
7067| [58660] Apache WSS4J checkReceiverResults Function Crafted SOAP Request Authentication Bypass
7068| [58658] Apache Rampart Crafted SOAP Request Security Verification Bypass
7069| [57882] Apache HTTP Server mod_proxy_ftp Authorization HTTP Header Arbitrary FTP Command Injection
7070| [57851] Apache HTTP Server mod_proxy_ftp EPSV Command NULL Dereference Remote DoS
7071| [56984] Apache Xerces2 Java Malformed XML Input DoS
7072| [56903] Apache ODE (Orchestration Director Engine) Process Deployment Web Service Traversal Arbitrary File Manipulation
7073| [56859] Apache Xerces-C++ Multiple Sub-project XML Nested DTD Structures Parsing Recursion Error DoS
7074| [56766] Apache Portable Runtime (APR-util) memory/unix/apr_pools.c Relocatable Memory Block Aligning Overflow
7075| [56765] Apache Portable Runtime (APR-util) misc/apr_rmm.c Multiple Function Overflows
7076| [56517] Apache HTTP Server File Descriptor Leak Arbitrary Local File Append
7077| [56443] PTK Unspecified Apache Sub-process Arbitrary Command Execution
7078| [56414] Apache Tiles Duplicate Expression Language (EL) Expression Evaluation XSS
7079| [55814] mod_NTLM for Apache HTTP Server ap_log_rerror() Function Remote Format String
7080| [55813] mod_NTLM for Apache HTTP Server log() Function Remote Overflow
7081| [55782] Apache HTTP Server mod_deflate Module Aborted Connection DoS
7082| [55553] Apache HTTP Server mod_proxy Module mod_proxy_http.c stream_reqbody_cl Function CPU Consumption DoS
7083| [55059] Apache APR-util strmatch/apr_strmatch.c apr_strmatch_precompile Function Crafted Input Remote DoS
7084| [55058] Apache APR-util apr_brigade_vprintf Function Crafted Input Off-by-one Remote DoS
7085| [55057] Apache APR-util xml/apr_xml.c apr_xml_* Interface Expat XML Parser Crafted XML Document Remote DoS
7086| [55056] Apache Tomcat Cross-application TLD File Manipulation
7087| [55055] Apache Tomcat Illegal URL Encoded Password Request Username Enumeration
7088| [55054] Apache Tomcat Java AJP Connector mod_jk Load Balancing Worker Malformed Header Remote DoS
7089| [55053] Apache Tomcat Crafted Request Security Restraint Bypass Arbitrary Content Access
7090| [54733] Apache HTTP Server AllowOverride Directive .htaccess Options Bypass
7091| [54713] razorCMS Security Manager apache User Account Unspecified File Permission Weakness Issue
7092| [54589] Apache Jserv Nonexistent JSP Request XSS
7093| [54122] Apache Struts s:a / s:url Tag href Element XSS
7094| [54093] Apache ActiveMQ Web Console JMS Message XSS
7095| [53932] Apache Geronimo Multiple Admin Function CSRF
7096| [53931] Apache Geronimo /console/portal/Server/Monitoring Multiple Parameter XSS
7097| [53930] Apache Geronimo /console/portal/ URI XSS
7098| [53929] Apache Geronimo on Windows Security/Keystores Portlet Traversal Arbitrary File Upload
7099| [53928] Apache Geronimo on Windows Embedded DB/DB Manager Portlet Traversal Arbitrary File Upload
7100| [53927] Apache Geronimo on Windows Services/Repository Portlet Traversal Arbitrary File Upload
7101| [53921] Apache HTTP Server mod_proxy_ajp Cross Thread/Session Information Disclosure
7102| [53766] Oracle BEA WebLogic Server Plug-ins for Apache Certificate Handling Remote Overflow
7103| [53574] PHP on Apache .htaccess mbstring.func_overload Setting Cross Hosted Site Behavior Modification
7104| [53381] Apache Tomcat JK Connector Content-Length Header Cross-user Information Disclosure
7105| [53380] Apache Struts Unspecified XSS
7106| [53289] Apache mod_perl Apache::Status /perl-status Unspecified XSS
7107| [53186] Apache HTTP Server htpasswd Predictable Salt Weakness
7108| [52899] Apache Tomcat Examples Web Application Calendar Application jsp/cal/cal2.jsp time Parameter XSS
7109| [52407] Apache Tomcat doRead Method POST Content Information Disclosure
7110| [51923] Apache HTTP Server mod-auth-mysql Module mod_auth_mysql.c Multibyte Character Encoding SQL Injection
7111| [51613] Apache HTTP Server Third-party Module Child Process File Descriptor Leak
7112| [51612] Apache HTTP Server Internal Redirect Handling Infinite Loop DoS
7113| [51468] Apache Jackrabbit Content Repository (JCR) swr.jsp q Parameter XSS
7114| [51467] Apache Jackrabbit Content Repository (JCR) search.jsp q Parameter XSS
7115| [51151] Apache Roller Search Function q Parameter XSS
7116| [50482] PHP with Apache php_value Order Unspecified Issue
7117| [50475] Novell NetWare ApacheAdmin Console Unauthenticated Access
7118| [49734] Apache Struts DefaultStaticContentLoader Class Traversal Arbitrary File Access
7119| [49733] Apache Struts FilterDispatcher Class Traversal Arbitrary File Access
7120| [49283] Oracle BEA WebLogic Server Plugins for Apache Remote Transfer-Encoding Overflow
7121| [49062] Apache Tomcat Cross-thread Concurrent Request Variable Overwrite Information Disclosure
7122| [48847] ModSecurity (mod_security) Transformation Caching Unspecified Apache DoS
7123| [48788] Apache Xerces-C++ XML Schema maxOccurs Value XML File Handling DoS
7124| [47474] Apache HTTP Server mod_proxy_ftp Directory Component Wildcard Character XSS
7125| [47464] Apache Tomcat allowLinking / UTF-8 Traversal Arbitrary File Access
7126| [47463] Apache Tomcat RequestDispatcher Traversal Arbitrary File Access
7127| [47462] Apache Tomcat HttpServletResponse.sendError Method Message Argument XSS
7128| [47096] Oracle Weblogic Apache Connector POST Request Overflow
7129| [46382] Frontend Filemanager (air_filemanager) Extension for TYPO3 on Apache Unspecified Arbitrary Code Execution
7130| [46285] TYPO3 on Apache Crafted Filename Upload Arbitrary Command Execution
7131| [46085] Apache HTTP Server mod_proxy ap_proxy_http_process_response() Function Interim Response Forwarding Remote DoS
7132| [45905] Apache Tomcat Host Manager host-manager/html/add name Parameter XSS
7133| [45879] Ragnarok Online Control Panel on Apache Crafted Traversal Authentication Bypass
7134| [45742] Apache HTTP Server on Novell Unspecified Request Directive Internal IP Disclosure
7135| [45740] Apache Derby DropSchemaNode Bind Phase Arbitrary Scheme Statement Dropping
7136| [45599] Apache Derby Lock Table Statement Privilege Requirement Bypass Arbitrary Table Lock
7137| [45585] Apache Derby ACCSEC Command RDBNAM Parameter Cleartext Credential Disclosure
7138| [45584] Apache Derby DatabaseMetaData.getURL Function Cleartext Credential Disclosure
7139| [45420] Apache HTTP Server 403 Error Page UTF-7 Encoded XSS
7140| [44728] PHP Toolkit on Gentoo Linux Interpretation Conflict Apache HTTP Server Local DoS
7141| [44618] Oracle JSP Apache/Jserv Path Translation Traversal Arbitrary JSP File Execution
7142| [44159] Apache HTTP Server Remote Virtual Host Name Disclosure
7143| [43997] Apache-SSL ExpandCert() Function Certificate Handling Arbitrary Environment Variables Manipulation
7144| [43994] suPHP for Apache (mod_suphp) Directory Symlink Local Privilege Escalation
7145| [43993] suPHP for Apache (mod_suphp) Owner Mode Race Condition Symlink Local Privilege Escalation
7146| [43663] Apache HTTP Server Mixed Platform AddType Directive Crafted Request PHP Source Disclosure
7147| [43658] AuthCAS Module (AuthCAS.pm) for Apache HTTP Server SESSION_COOKIE_NAME SQL Injection
7148| [43452] Apache Tomcat HTTP Request Smuggling
7149| [43309] Apache Geronimo LoginModule Login Method Bypass
7150| [43290] Apache JSPWiki Entry Page Attachment Unrestricted File Upload
7151| [43259] Apache HTTP Server on Windows mod_proxy_balancer URL Handling Remote Memory Corruption
7152| [43224] Apache Geronimo on SuSE Linux init Script Symlink Unspecified File/Directory Access
7153| [43189] Apache mod_jk2 Host Header Multiple Fields Remote Overflow
7154| [42937] Apache HTTP Server mod_proxy_balancer balancer-manager Unspecified CSRF
7155| [42341] MOD_PLSQL for Apache Unspecified URL SQL Injection
7156| [42340] MOD_PLSQL for Apache CGI Environment Handling Unspecified Overflow
7157| [42214] Apache HTTP Server mod_proxy_ftp UTF-7 Encoded XSS
7158| [42091] Apache Maven Site Plugin Installation Permission Weakness
7159| [42089] Apache Maven .m2/settings.xml Cleartext Password Disclosure
7160| [42088] Apache Maven Defined Repo Process Listing Password Disclosure
7161| [42087] Apache Maven Site Plugin SSH Deployment Permission Setting Weakness
7162| [42036] Apache HTTP Server MS-DOS Device Request Host OS Disclosure
7163| [41891] BEA WebLogic Apache Beehive NetUI Page Flow Unspecified XSS
7164| [41436] Apache Tomcat Native APR Connector Duplicate Request Issue
7165| [41435] Apache Tomcat %5C Cookie Handling Session ID Disclosure
7166| [41434] Apache Tomcat Exception Handling Subsequent Request Information Disclosure
7167| [41400] LimeSurvey save.php Apache Log File PHP Code Injection
7168| [41029] Apache Tomcat Calendar Examples Application cal2.jsp Multiple Parameter CSRF
7169| [41019] Apache HTTP Server mod_negotiation Module Multi-Line Filename Upload XSS
7170| [41018] Apache HTTP Server mod_negotiation Module Multi-Line Filename Upload CRLF
7171| [40853] Apache Tomcat SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) JSESSIONIDSSO Cookie Security Weakness
7172| [40264] Apache HTTP Server mod_proxy_balancer balancer_handler Function bb Variable Remote DoS
7173| [40263] Apache HTTP Server mod_proxy_balancer balancer-manager Multiple Parameter XSS
7174| [40262] Apache HTTP Server mod_status refresh XSS
7175| [39833] Apache Tomcat JULI Logging Component catalina.policy Security Bypass
7176| [39251] Coppermine Photo Gallery on Apache Multiple File Extension Upload Arbitrary Code Execution
7177| [39166] Apache Tomcat on Windows caseSensitive Attribute Mixed Case Request JSP Source Disclosure
7178| [39134] Apache mod_imagemap Module Imagemap Unspecified XSS
7179| [39133] Apache mod_imap Module Imagemap File Unspecified XSS
7180| [39035] Apache Tomcat examples/servlet/CookieExample Multiple Parameter XSS
7181| [39003] Apache HTTP Server HTTP Method Header Request Entity Too Large XSS
7182| [39000] Apache Tomcat SendMailServlet sendmail.jsp mailfrom Parameter XSS
7183| [38939] Apache HTTP Server Prefork MPM Module Array Modification Local DoS
7184| [38673] Apache Jakarta Slide WebDAV SYSTEM Request Traversal Arbitrary File Access
7185| [38662] Apache Geronimo SQLLoginModule Nonexistent User Authentication Bypass
7186| [38661] Apache Geronimo MEJB Unspecified Authentication Bypass
7187| [38641] Apache HTTP Server mod_mem_cache recall_headers Function Information Disclosure
7188| [38640] Apache HTTP Server suexec Document Root Unauthorized Operations
7189| [38639] Apache HTTP Server suexec Multiple Symlink Privilege Escalation
7190| [38636] Apache HTTP Server mod_autoindex.c P Variable UTF-7 Charset XSS
7191| [38513] BEA WebLogic Server Proxy Plug-in for Apache Protocol Error Handling Remote DoS
7192| [38187] Apache Geronimo / Tomcat WebDAV XML SYSTEM Tag Arbitrary File Access
7193| [37079] Apache HTTP Server mod_cache cache_util.c Malformed Cache-Control Header DoS
7194| [37071] Apache Tomcat Cookie Handling Session ID Disclosure
7195| [37070] Apache Tomcat Cookie Handling Quote Delimiter Session ID Disclosure
7196| [37052] Apache HTTP Server mod_status mod_status.c Unspecified XSS
7197| [37051] Apache HTTP Server mod_proxy modules/proxy/proxy_util.c Crafted Header Remote DoS
7198| [37050] Apache HTTP Server Prefork MPM Module Crafted Code Sequence Local DoS
7199| [36417] Apache Tomcat Host Manager Servlet html/add Action aliases Parameter XSS
7200| [36377] Apache MyFaces Tomahawk JSF Application autoscroll Multiple Script XSS
7201| [36080] Apache Tomcat JSP Examples Crafted URI XSS
7202| [36079] Apache Tomcat Manager Uploaded Filename XSS
7203| [34888] Apache Tomcat Example Calendar Application cal2.jsp time Parameter XSS
7204| [34887] Apache Tomcat implicit-objects.jsp Crafted Header XSS
7205| [34885] Apache Tomcat on IIS Servlet Engine MS-DOS Device Request DoS
7206| [34884] Apache Tomcat on Windows Nonexistent Resource Request Path Disclosure
7207| [34883] Apache Tomcat Crafted JSP File Request Path Disclosure
7208| [34882] Apache Tomcat Default SSL Ciphersuite Configuration Weakness
7209| [34881] Apache Tomcat Malformed Accept-Language Header XSS
7210| [34880] Apache Tomcat HTTP/1.1 Connector NULL Byte Request JSP Source Disclosure
7211| [34879] Apache Tomcat examples/jsp2/jspx/textRotate.jspx XSS
7212| [34878] Apache Tomcat examples/jsp2/el/implicit-objects.jsp XSS
7213| [34877] Apache Tomcat JK Web Server Connector (mod_jk) Double Encoded Traversal Arbitrary File Access
7214| [34876] Apache HTTP Server ScriptAlias CGI Source Disclosure
7215| [34875] Apache Tomcat appdev/sample/web/hello.jsp Multiple Parameter XSS
7216| [34874] Apache Tomcat AJP Connector mod_jk ajp_process_callback Remote Memory Disclosure
7217| [34873] Apache Stats Variable Extraction _REQUEST Ssuperglobal Array Overwrite
7218| [34872] Apache HTTP Server suexec User/Group Combination Weakness Local Privilege Escalation
7219| [34769] Apache Tomcat w/ Proxy Module Double Encoded Traversal Arbitrary File Access
7220| [34541] mod_perl for Apache HTTP Server RegistryCooker.pm PATH_INFO Crafted URI Remote DoS
7221| [34540] mod_perl for Apache HTTP Server PerlRun.pm PATH_INFO Crafted URI Remote DoS
7222| [34398] Apache Tomcat mod_jk Invalid Chunked Encoded Body Information Disclosure
7223| [34154] Apache Axis Nonexistent Java Web Service Path Disclosure
7224| [33855] Apache Tomcat JK Web Server Connector mod_jk.so Long URI Worker Map Remote Overflow
7225| [33816] Apache HTTP Server on Debian Linux TTY Local Privilege Escalation
7226| [33456] Apache HTTP Server Crafted TCP Connection Range Header DoS
7227| [33346] Avaya Multiple Products Apache Tomcat Port Weakness
7228| [32979] Apache Java Mail Enterprise Server (JAMES) Phoenix/MX4J Interface Arbitrary User Creation
7229| [32978] Apache Java Mail Enterprise Server (JAMES) POP3Server Log File Plaintext Password Disclosure
7230| [32724] Apache mod_python _filter_read Freed Memory Disclosure
7231| [32723] Apache Tomcat semicolon Crafted Filename Request Forced Directory Listing
7232| [32396] Apache Open For Business Project (OFBiz) Ecommerce Component Forum Implementation Message Body XSS
7233| [32395] Apache Open For Business Project (OFBiz) Ecommerce Component Form Field Manipulation Privilege Escalation
7234| [30354] Linux Subversion libapache2-svn Search Path Subversion Local Privilege Escalation
7235| [29603] PHP ini_restore() Apache httpd.conf Options Bypass
7236| [29536] Apache Tcl mod_tcl set_var Function Remote Format String
7237| [28919] Apache Roller Weblogger Blog Comment Multiple Field XSS
7238| [28130] PHP with Apache Mixed Case Method Limit Directive Bypass
7239| [27913] Apache HTTP Server on Windows mod_alias URL Validation Canonicalization CGI Source Disclosure
7240| [27588] Apache HTTP Server mod_rewrite LDAP Protocol URL Handling Overflow
7241| [27487] Apache HTTP Server Crafted Expect Header Cross Domain HTML Injection
7242| [26935] FCKeditor on Apache connector.php Crafted File Extension Arbitrary File Upload
7243| [26572] Apache Java Mail Enterprise Server (JAMES) MAIL Command Overflow DoS
7244| [25909] Drupal on Apache files Directory File Upload Arbitrary Code Execution
7245| [24825] Oracle ModPL/SQL for Apache Unspecified Remote HTTP Issue
7246| [24365] Apache Struts Multiple Function Error Message XSS
7247| [24364] Apache Struts getMultipartRequestHandler() Function Crafted Request DoS
7248| [24363] Apache Struts org.apache.struts.taglib.html.Constants.CANCEL Validation Bypass
7249| [24103] Pubcookie Apache mod_pubcookie Unspecified XSS
7250| [23906] Apache mod_python for Apache HTTP Server FileSession Privileged Local Command Execution
7251| [23905] Apache Log4net LocalSyslogAppender Format String Memory Corruption DoS
7252| [23198] Apache WSS4J Library SOAP Signature Verification Bypass
7253| [23124] Generic Apache Request Library (libapreq) apreq_parse_* Functions Remote DoS
7254| [22652] mod_php for Apache HTTP Server Crafted import_request_variables Function DoS
7255| [22475] PHP w/ Apache PDO::FETCH_CLASS __set() Function DoS
7256| [22473] PHP w/ Apache2 Crafted PDOStatement DoS
7257| [22459] Apache Geronimo Error Page XSS
7258| [22458] Apache Tomcat / Geronimo Sample Script cal2.jsp time Parameter XSS
7259| [22301] auth_ldap for Apache HTTP Server auth_ldap_log_reason() Function Remote Format String
7260| [22261] Apache HTTP Server mod_ssl ssl_hook_Access Error Handling DoS
7261| [22259] mod_auth_pgsql for Apache HTTP Server Log Function Format String
7262| [21736] Apache Java Mail Enterprise Server (JAMES) Spooler retrieve Function DoS
7263| [21705] Apache HTTP Server mod_imap Image Map Referer XSS
7264| [21021] Apache Struts Error Message XSS
7265| [20897] PHP w/ Apache 2 SAPI virtual() Function Unspecified INI Setting Disclosure
7266| [20491] PHP mod_php apache2handler SAPI Crafted .htaccess DoS
7267| [20462] Apache HTTP Server worker.c MPM Memory Exhaustion DoS
7268| [20439] Apache Tomcat Directory Listing Saturation DoS
7269| [20373] Apache Tomcat on HP Secure OS for Linux Unspecified Servlet Access Issue
7270| [20285] Apache HTTP Server Log File Control Character Injection
7271| [20242] Apache HTTP Server mod_usertrack Predictable Session ID Generation
7272| [20209] Brainf*ck Module (mod_bf) for Apache HTTP Server Local Overflow
7273| [20033] Apache Tomcat MS-DOS Device Request Error Message Path Disclosure
7274| [19883] apachetop atop.debug Symlink Arbitrary File Overwrite
7275| [19863] mod_auth_shadow for Apache HTTP Server require group Authentication Bypass
7276| [19855] Apache HTTP Server ErrorDocument Directive .htaccess Bypass
7277| [19821] Apache Tomcat Malformed Post Request Information Disclosure
7278| [19769] Apache HTTP Server Double-reverse DNS Lookup Spoofing
7279| [19188] Apache HTTP Server mod_ssl SSLVerifyClient Per-location Context Restriction Bypass
7280| [19137] Apache HTTP Server on Red Hat Linux Double Slash GET Request Forced Directory Listing
7281| [19136] Apache on Mandrake Linux Arbitrary Directory Forced Listing
7282| [18977] Apache HTTP Server Crafted HTTP Range Header DoS
7283| [18389] Ragnarok Online Control Panel Apache Authentication Bypass
7284| [18286] Apache HTTP Server mod_ssl ssl_callback_SSLVerify_CRL( ) Function Overflow
7285| [18233] Apache HTTP Server htdigest user Variable Overfow
7286| [17738] Apache HTTP Server HTTP Request Smuggling
7287| [16586] Apache HTTP Server Win32 GET Overflow DoS
7288| [15889] Apache HTTP Server mod_cgid Threaded MPM CGI Output Misdirection
7289| [14896] mod_dav for Apache HTTP Server Remote Null Dereference Child Process Termination
7290| [14879] Apache HTTP Server ap_log_rerror Function Error Message Path Disclosure
7291| [14770] Apache Tomcat AJP12 Protocol Malformed Packet Remote DoS
7292| [14597] Apache Tomcat IntegerOverflow.jsp Test JSP Script Path Disclosure
7293| [14596] Apache Tomcat pageSession.jsp Test JSP Script Path Disclosure
7294| [14595] Apache Tomcat pageLanguage.jsp Test JSP Script Path Disclosure
7295| [14594] Apache Tomcat pageIsThreadSafe.jsp Test JSP Script Path Disclosure
7296| [14593] Apache Tomcat pageIsErrorPage.jsp Test JSP Script Path Disclosure
7297| [14592] Apache Tomcat pageInvalid.jsp Test JSP Script Path Disclosure
7298| [14591] Apache Tomcat pageExtends.jsp Test JSP Script Path Disclosure
7299| [14590] Apache Tomcat pageDouble.jsp Test JSP Script Path Disclosure
7300| [14589] Apache Tomcat pageAutoFlush.jsp Test JSP Script Path Disclosure
7301| [14588] Apache Tomcat extends2.jsp Test JSP Script Path Disclosure
7302| [14587] Apache Tomcat extends1.jsp Test JSP Script Path Disclosure
7303| [14586] Apache Tomcat comments.jsp Test JSP Script Path Disclosure
7304| [14585] Apache Tomcat buffer4.jsp Test JSP Script Path Disclosure
7305| [14584] Apache Tomcat buffer3.jsp Test JSP Script Path Disclosure
7306| [14583] Apache Tomcat buffer2.jsp Test JSP Script Path Disclosure
7307| [14582] Apache Tomcat buffer1.jsp Test JSP Script Path Disclosure
7308| [14581] Apache Tomcat pageImport2.jsp Test JSP Script Path Disclosure
7309| [14580] Apache Tomcat pageInfo.jsp Test JSP Script Path Disclosure
7310| [14410] mod_frontpage for Apache HTTP Server fpexec Remote Overflow
7311| [14044] Apache Batik Squiggle Browser with Rhino Scripting Engine Unspecified File System Access
7312| [13737] mod_access_referer for Apache HTTP Server Malformed Referer DoS
7313| [13711] Apache mod_python publisher.py Traversal Arbitrary Object Information Disclosure
7314| [13640] mod_auth_any for Apache HTTP Server on Red Hat Linux Metacharacter Command Execution
7315| [13304] Apache Tomcat realPath.jsp Path Disclosure
7316| [13303] Apache Tomcat source.jsp Arbitrary Directory Listing
7317| [13087] Apache HTTP Server mod_log_forensic check_forensic Symlink Arbitrary File Creation / Overwrite
7318| [12849] mod_auth_radius for Apache HTTP Server radcpy() Function Overflow DoS
7319| [12848] Apache HTTP Server htdigest realm Variable Overflow
7320| [12721] Apache Tomcat examples/jsp2/el/functions.jsp XSS
7321| [12720] mod_dosevasive for Apache HTTP Server Symlink Arbitrary File Create/Overwrite
7322| [12558] Apache HTTP Server IPv6 FTP Proxy Socket Failure DoS
7323| [12557] Apache HTTP Server prefork MPM accept Error DoS
7324| [12233] Apache Tomcat MS-DOS Device Name Request DoS
7325| [12232] Apache Tomcat with JDK Arbitrary Directory/Source Disclosure
7326| [12231] Apache Tomcat web.xml Arbitrary File Access
7327| [12193] Apache HTTP Server on Mac OS X File Handler Bypass
7328| [12192] Apache HTTP Server on Mac OS X Unauthorized .ht and .DS_Store File Access
7329| [12178] Apache Jakarta Lucene results.jsp XSS
7330| [12176] mod_digest_apple for Apache HTTP Server on Mac OS X Authentication Replay
7331| [11391] Apache HTTP Server Header Parsing Space Saturation DoS
7332| [11003] Apache HTTP Server mod_include get_tag() Function Local Overflow
7333| [10976] mod_mylo for Apache HTTP Server mylo_log Logging Function HTTP GET Overflow
7334| [10637] Apache HTTP Server mod_ssl SSLCipherSuite Access Restriction Bypass
7335| [10546] Macromedia JRun4 mod_jrun Apache Module Remote Overflow
7336| [10471] Apache Xerces-C++ XML Parser DoS
7337| [10218] Apache HTTP Server Satisfy Directive Access Control Bypass
7338| [10068] Apache HTTP Server htpasswd Local Overflow
7339| [10049] mod_cplusplus For Apache HTTP Server Unspecified Overflow
7340| [9994] Apache HTTP Server apr-util IPV6 Parsing DoS
7341| [9991] Apache HTTP Server ap_resolve_env Environment Variable Local Overflow
7342| [9948] mod_dav for Apache HTTP Server LOCK Request DoS
7343| [9742] Apache HTTP Server mod_ssl char_buffer_read Function Reverse Proxy DoS
7344| [9718] Apache HTTP Server Win32 Single Dot Append Arbitrary File Access
7345| [9717] Apache HTTP Server mod_cookies Cookie Overflow
7346| [9716] Apache::Gallery Gallery.pm Inline::C Predictable Filename Code Execution
7347| [9715] Apache HTTP Server rotatelogs Control Characters Over Pipe DoS
7348| [9714] Apache Authentication Module Threaded MPM DoS
7349| [9713] Apache HTTP Server on OS2 filestat.c Device Name Request DoS
7350| [9712] Apache HTTP Server Multiple Linefeed Request Memory Consumption DoS
7351| [9711] Apache HTTP Server Access Log Terminal Escape Sequence Injection
7352| [9710] Apache HTTP Server on Windows Illegal Character Default Script Mapping Bypass
7353| [9709] Apache HTTP Server on Windows MS-DOS Device Name HTTP Post Code Execution
7354| [9708] Apache HTTP Server on Windows MS-DOS Device Name DoS
7355| [9707] Apache HTTP Server Duplicate MIME Header Saturation DoS
7356| [9706] Apache Web Server Multiple MIME Header Saturation Remote DoS
7357| [9705] Apache Tomcat Invoker/Default Servlet Source Disclosure
7358| [9702] Apache HTTP Server CGI/WebDAV HTTP POST Request Source Disclosure
7359| [9701] Apache HTTP Server for Windows Multiple Slash Forced Directory Listing
7360| [9700] Apache HTTP Server mod_autoindex Multiple Slash Request Forced Directory Listing
7361| [9699] Apache HTTP Server mod_dir Multiple Slash Request Forced Directory Listing
7362| [9698] Apache HTTP Server mod_negotiation Multiple Slash Request Forced Directory Listing
7363| [9697] Apache HTTP Server htdigest Local Symlink Arbitrary File Overwrite
7364| [9696] Apache HTTP Server htpasswd Local Symlink Arbitrary File Overwrite
7365| [9695] Apache Tomcat SnoopServlet Servlet Information Disclosure
7366| [9694] PHP3 on Apache HTTP Server Encoded Traversal Arbitrary File Access
7367| [9693] mod_auth_pgsql_sys for Apache HTTP Server User Name SQL Injection
7368| [9692] Apache HTTP Server mod_vhost_alias Mass Virtual Hosting Arbitrary File Access
7369| [9691] Apache HTTP Server mod_rewrite Mass Virtual Hosting Arbitrary File Access
7370| [9690] Apache HTTP Server mod_vhost_alias CGI Program Source Disclosure
7371| [9689] Trustix httpsd for Apache-SSL Permission Weakness Privilege Escalation
7372| [9688] Apache HTTP Server mod_proxy Malformed FTP Command DoS
7373| [9687] Apache::AuthenSmb smbval SMB Authentication Library Multiple Overflows
7374| [9686] Apache::AuthenSmb smbvalid SMB Authentication Library Multiple Overflows
7375| [9523] Apache HTTP Server mod_ssl Aborted Connection DoS
7376| [9459] Oracle PL/SQL (mod_plsql) Apache Module Help Page Request Remote Overflow
7377| [9208] Apache Tomcat .jsp Encoded Newline XSS
7378| [9204] Apache Tomcat ROOT Application XSS
7379| [9203] Apache Tomcat examples Application XSS
7380| [9068] Apache HTTP Server mod_userdir User Account Information Disclosure
7381| [8773] Apache Tomcat Catalina org.apache.catalina.servlets.DefaultServlet Source Code Disclosure
7382| [8772] Apache Tomcat Catalina org.apache.catalina.connector.http DoS
7383| [7943] Apache HTTP Server mod_ssl sslkeys File Disclosure
7384| [7942] Apache HTTP Server mod_ssl Default Pass Phrase
7385| [7941] Apache HTTP Server mod_ssl Encrypted Private Key File Descriptor Leak
7386| [7935] Apache HTTP Server mod_ssl ssl_gcache Race Conditions
7387| [7934] Apache HTTP Server mod_ssl SSLSessionCache File Content Disclosure
7388| [7933] Apache HTTP Server mod_ssl SSLMutex File Content Disclosure
7389| [7932] Apache HTTP Server mod_ssl mkcert.sh File Creation Permission Weakness
7390| [7931] Apache HTTP Server mod_ssl X.509 Client Certificate Authentication Bypass
7391| [7930] Apache HTTP Server mod_ssl ssl_expr_eval_func_file() Overflow
7392| [7929] Apache HTTP Server mod_ssl ssl_engine_log.c mod_proxy Hook Function Remote Format String
7393| [7611] Apache HTTP Server mod_alias Local Overflow
7394| [7394] Apache Tomcat mod_jk Invalid Transfer-Encoding Chunked Field DoS
7395| [7203] Apache Tomcat source.jsp Traversal Arbitrary File Access
7396| [7039] Apache HTTP Server on Mac OS X HFS+ File System Access Bypass
7397| [6882] Apache mod_python Malformed Query String Variant DoS
7398| [6839] Apache HTTP Server mod_proxy Content-Length Overflow
7399| [6630] Apache Tomcat Java Server Pages (JSP) Engine WPrinterJob() DoS
7400| [6472] Apache HTTP Server mod_ssl ssl_util_uuencode_binary Remote Overflow
7401| [5821] Apache HTTP Server Multiple / GET Remote Overflow DoS
7402| [5580] Apache Tomcat Servlet Malformed URL JSP Source Disclosure
7403| [5552] Apache HTTP Server split-logfile Arbitrary .log File Overwrite
7404| [5526] Apache Tomcat Long .JSP URI Path Disclosure
7405| [5278] Apache Tomcat web.xml Restriction Bypass
7406| [5051] Apache Tomcat Null Character DoS
7407| [4973] Apache Tomcat servlet Mapping XSS
7408| [4650] mod_gzip for Apache HTTP Server Debug Mode Printf Stack Overflow
7409| [4649] mod_gzip for Apache HTTP Server Debug Mode Format String Overflow
7410| [4648] mod_gzip for Apache HTTP Server Debug Mode Race Condition
7411| [4568] mod_survey For Apache ENV Tags SQL Injection
7412| [4553] Apache HTTP Server ApacheBench Overflow DoS
7413| [4552] Apache HTTP Server Shared Memory Scoreboard DoS
7414| [4446] Apache HTTP Server mod_disk_cache Stores Credentials
7415| [4383] Apache HTTP Server Socket Race Condition DoS
7416| [4382] Apache HTTP Server Log Entry Terminal Escape Sequence Injection
7417| [4340] Apache Portable Runtime (APR) apr_psprintf DoS
7418| [4232] Apache Cocoon DatabaseAuthenticatorAction SQL Injection
7419| [4231] Apache Cocoon Error Page Server Path Disclosure
7420| [4182] Apache HTTP Server mod_ssl Plain HTTP Request DoS
7421| [4181] Apache HTTP Server mod_access IP Address Netmask Rule Bypass
7422| [4075] Apache HTTP Sever on Windows .var File Request Path Disclosure
7423| [4037] Apache HTTP Server on Cygwin Encoded GET Request Arbitrary File Access
7424| [3877] Apache-SSL SSLVerifyClient SSLFakeBasicAuth Client Certificate Forgery
7425| [3819] Apache HTTP Server mod_digest Cross Realm Credential Replay
7426| [3322] mod_php for Apache HTTP Server Process Hijack
7427| [3215] mod_php for Apache HTTP Server File Descriptor Leakage
7428| [2885] Apache mod_python Malformed Query String DoS
7429| [2749] Apache Cocoon view-source Sample File Traversal Arbitrary File Access
7430| [2733] Apache HTTP Server mod_rewrite Local Overflow
7431| [2672] Apache HTTP Server mod_ssl SSLCipherSuite Ciphersuite Downgrade Weakness
7432| [2613] Apache HTTP Server mod_cgi stderr Output Handling Local DoS
7433| [2149] Apache::Gallery Privilege Escalation
7434| [2107] Apache HTTP Server mod_ssl Host: Header XSS
7435| [1926] Apache HTTP Server mod_rewrite Crafted URI Rule Bypass
7436| [1833] Apache HTTP Server Multiple Slash GET Request DoS
7437| [1577] Apache HTTP Server mod_rewrite RewriteRule Expansion Arbitrary File Access
7438| [872] Apache Tomcat Multiple Default Accounts
7439| [862] Apache HTTP Server SSI Error Page XSS
7440| [859] Apache HTTP Server Win32 Crafted Traversal Arbitrary File Access
7441| [849] Apache Tomcat TroubleShooter Servlet Information Disclosure
7442| [845] Apache Tomcat MSDOS Device XSS
7443| [844] Apache Tomcat Java Servlet Error Page XSS
7444| [842] Apache HTTP Server mod_ssl ssl_compat_directive Function Overflow
7445| [838] Apache HTTP Server Chunked Encoding Remote Overflow
7446| [827] PHP4 for Apache on Windows php.exe Malformed Request Path Disclosure
7447| [775] Apache mod_python Module Importing Privilege Function Execution
7448| [769] Apache HTTP Server Win32 DOS Batch File Arbitrary Command Execution
7449| [756] Apache HTTP Server mod_ssl i2d_SSL_SESSION Function SSL Client Certificate Overflow
7450| [701] Apache HTTP Server Win32 ScriptAlias php.exe Arbitrary File Access
7451| [674] Apache Tomcat Nonexistent File Error Message Path Disclosure
7452| [637] Apache HTTP Server UserDir Directive Username Enumeration
7453| [623] mod_auth_pgsql for Apache HTTP Server User Name SQL Injection
7454| [582] Apache HTTP Server Multiviews Feature Arbitrary Directory Listing
7455| [562] Apache HTTP Server mod_info /server-info Information Disclosure
7456| [561] Apache Web Servers mod_status /server-status Information Disclosure
7457| [417] Apache HTTP Server on SuSE Linux /doc/packages Remote Information Disclosure
7458| [410] mod_perl for Apache HTTP Server /perl/ Directory Listing
7459| [404] Apache HTTP Server on SuSE Linux WebDAV PROPFIND Arbitrary Directory Listing
7460| [402] Apache HTTP Server on SuSE Linux cgi-bin-sdb Request Script Source Disclosure
7461| [379] Apache ASP module Apache::ASP source.asp Example File Arbitrary File Creation
7462| [377] Apache Tomcat Snoop Servlet Remote Information Disclosure
7463| [376] Apache Tomcat contextAdmin Arbitrary File Access
7464| [342] Apache HTTP Server for Windows Multiple Forward Slash Directory Listing
7465| [222] Apache HTTP Server test-cgi Arbitrary File Access
7466| [143] Apache HTTP Server printenv.pl Multiple Method CGI XSS
7467| [48] Apache HTTP Server on Debian /usr/doc Directory Information Disclosure
7468|_
7469Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
7470Aggressive OS guesses: Linux 2.6.32 (95%), Linux 2.6.32 - 3.1 (95%), Linux 3.11 (95%), Linux 3.5 (95%), Linux 3.8 (95%), Linux 2.6.32 - 3.10 (95%), Linux 2.6.32 - 3.13 (95%), Linux 2.6.32 - 3.9 (95%), Linux 3.2 (95%), Linux 3.1 (94%)
7471No exact OS matches for host (test conditions non-ideal).
7472Uptime guess: 42.531 days (since Thu Dec 5 01:00:39 2019)
7473Network Distance: 18 hops
7474TCP Sequence Prediction: Difficulty=258 (Good luck!)
7475IP ID Sequence Generation: All zeros
7476
7477TRACEROUTE (using port 443/tcp)
7478HOP RTT ADDRESS
74791 38.65 ms 10.252.204.1
74802 68.54 ms 104.245.145.177
74813 68.59 ms te0-1-1-9.219.ccr32.yyz02.atlas.cogentco.com (38.104.158.113)
74824 68.64 ms be3435.ccr31.yyz02.atlas.cogentco.com (154.54.85.57)
74835 68.64 ms te0-9-0-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.141)
74846 68.64 ms ix-ae-16-0.tcore1.tnk-toronto.as6453.net (64.86.33.98)
74857 200.52 ms if-ae-2-2.tcore2.tnk-toronto.as6453.net (64.86.33.90)
74868 210.75 ms if-ae-8-2.tcore1.ct8-chicago.as6453.net (66.110.48.2)
74879 207.45 ms if-ae-32-3.tcore2.ldn-london.as6453.net (80.231.20.106)
748810 207.56 ms if-ae-2-39.tcore2.l78-london.as6453.net (80.231.131.17)
748911 207.53 ms if-ae-2-2.tcore1.av2-amsterdam.as6453.net (195.219.194.5)
749012 207.52 ms if-ae-14-2.tcore2.av2-amsterdam.as6453.net (80.231.131.161)
749113 207.60 ms if-ae-6-2.tcore1.fnm-frankfurt.as6453.net (195.219.194.150)
749214 207.57 ms if-ae-8-2.tcore1.it5-istanbul.as6453.net (195.219.156.22)
749315 192.54 ms 5.23.0.38
749416 207.65 ms 5.23.0.38
749517 221.26 ms 93-89-18-233.static.internetadresi.com (93.89.18.233)
749618 221.35 ms 93-89-20-20.static.internetadresi.com (93.89.20.20)
7497
7498NSE: Script Post-scanning.
7499Initiating NSE at 13:44
7500Completed NSE at 13:44, 0.00s elapsed
7501Initiating NSE at 13:44
7502Completed NSE at 13:44, 0.00s elapsed
7503#####################################################################################################################################
7504Version: 1.11.13-static
7505OpenSSL 1.0.2-chacha (1.0.2g-dev)
7506
7507Connected to 93.89.20.20
7508
7509Testing SSL server 93.89.20.20 on port 443 using SNI name 93.89.20.20
7510
7511 TLS Fallback SCSV:
7512Server supports TLS Fallback SCSV
7513
7514 TLS renegotiation:
7515Secure session renegotiation supported
7516
7517 TLS Compression:
7518Compression disabled
7519
7520 Heartbleed:
7521TLS 1.2 not vulnerable to heartbleed
7522TLS 1.1 not vulnerable to heartbleed
7523TLS 1.0 not vulnerable to heartbleed
7524
7525 Supported Server Cipher(s):
7526Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
7527Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
7528Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
7529Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
7530Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
7531Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
7532Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
7533Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
7534Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
7535Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
7536Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
7537Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
7538Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
7539Accepted TLSv1.2 128 bits AES128-GCM-SHA256
7540Accepted TLSv1.2 256 bits AES256-GCM-SHA384
7541Accepted TLSv1.2 128 bits AES128-SHA256
7542Accepted TLSv1.2 256 bits AES256-SHA256
7543Accepted TLSv1.2 128 bits AES128-SHA
7544Accepted TLSv1.2 256 bits AES256-SHA
7545Accepted TLSv1.2 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
7546Accepted TLSv1.2 256 bits CAMELLIA256-SHA
7547Accepted TLSv1.2 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
7548Accepted TLSv1.2 128 bits CAMELLIA128-SHA
7549Accepted TLSv1.2 112 bits DES-CBC3-SHA
7550Preferred TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
7551Accepted TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
7552Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
7553Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
7554Accepted TLSv1.1 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
7555Accepted TLSv1.1 128 bits AES128-SHA
7556Accepted TLSv1.1 256 bits AES256-SHA
7557Accepted TLSv1.1 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
7558Accepted TLSv1.1 256 bits CAMELLIA256-SHA
7559Accepted TLSv1.1 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
7560Accepted TLSv1.1 128 bits CAMELLIA128-SHA
7561Accepted TLSv1.1 112 bits DES-CBC3-SHA
7562Preferred TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
7563Accepted TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
7564Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
7565Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
7566Accepted TLSv1.0 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
7567Accepted TLSv1.0 128 bits AES128-SHA
7568Accepted TLSv1.0 256 bits AES256-SHA
7569Accepted TLSv1.0 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
7570Accepted TLSv1.0 256 bits CAMELLIA256-SHA
7571Accepted TLSv1.0 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
7572Accepted TLSv1.0 128 bits CAMELLIA128-SHA
7573Accepted TLSv1.0 112 bits DES-CBC3-SHA
7574
7575 SSL Certificate:
7576Signature Algorithm: sha1WithRSAEncryption
7577RSA Key Strength: 2048
7578
7579Subject: localhost
7580Issuer: localhost
7581
7582Not valid before: Jun 15 12:50:24 2017 GMT
7583Not valid after: Oct 30 12:50:24 2044 GMT
7584#####################################################################################################################################
7585Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-16 13:45 EST
7586NSE: Loaded 58 scripts for scanning.
7587NSE: Script Pre-scanning.
7588Initiating NSE at 13:45
7589Completed NSE at 13:45, 0.00s elapsed
7590Initiating NSE at 13:45
7591Completed NSE at 13:45, 0.00s elapsed
7592Initiating Parallel DNS resolution of 1 host. at 13:45
7593Completed Parallel DNS resolution of 1 host. at 13:45, 0.02s elapsed
7594Initiating SYN Stealth Scan at 13:45
7595Scanning 93-89-20-20.static.internetadresi.com (93.89.20.20) [1 port]
7596Discovered open port 3306/tcp on 93.89.20.20
7597Completed SYN Stealth Scan at 13:45, 0.23s elapsed (1 total ports)
7598Initiating Service scan at 13:45
7599Scanning 1 service on 93-89-20-20.static.internetadresi.com (93.89.20.20)
7600Completed Service scan at 13:45, 0.55s elapsed (1 service on 1 host)
7601Initiating OS detection (try #1) against 93-89-20-20.static.internetadresi.com (93.89.20.20)
7602Retrying OS detection (try #2) against 93-89-20-20.static.internetadresi.com (93.89.20.20)
7603Initiating Traceroute at 13:45
7604Completed Traceroute at 13:45, 0.52s elapsed
7605Initiating Parallel DNS resolution of 17 hosts. at 13:45
7606Completed Parallel DNS resolution of 17 hosts. at 13:45, 0.26s elapsed
7607NSE: Script scanning 93.89.20.20.
7608Initiating NSE at 13:45
7609Completed NSE at 13:47, 90.96s elapsed
7610Initiating NSE at 13:47
7611Completed NSE at 13:47, 0.05s elapsed
7612Nmap scan report for 93-89-20-20.static.internetadresi.com (93.89.20.20)
7613Host is up (0.22s latency).
7614
7615PORT STATE SERVICE VERSION
76163306/tcp open mysql MySQL 5.5.5-10.0.34-MariaDB
7617| mysql-enum:
7618| Valid usernames:
7619| root:<empty> - Valid credentials
7620| netadmin:<empty> - Valid credentials
7621| guest:<empty> - Valid credentials
7622| test:<empty> - Valid credentials
7623| web:<empty> - Valid credentials
7624| webadmin:<empty> - Valid credentials
7625| administrator:<empty> - Valid credentials
7626| sysadmin:<empty> - Valid credentials
7627| admin:<empty> - Valid credentials
7628| user:<empty> - Valid credentials
7629|_ Statistics: Performed 10 guesses in 3 seconds, average tps: 3.3
7630| mysql-info:
7631| Protocol: 10
7632| Version: 5.5.5-10.0.34-MariaDB
7633| Thread ID: 1149064
7634| Capabilities flags: 63487
7635| Some Capabilities: Speaks41ProtocolNew, LongColumnFlag, LongPassword, Speaks41ProtocolOld, SupportsTransactions, IgnoreSigpipes, ConnectWithDatabase, InteractiveClient, Support41Auth, DontAllowDatabaseTableColumn, SupportsLoadDataLocal, SupportsCompression, FoundRows, ODBCClient, IgnoreSpaceBeforeParenthesis, SupportsMultipleResults, SupportsAuthPlugins, SupportsMultipleStatments
7636| Status: Autocommit
7637| Salt: $^2y.t"F}cVewIDXnCA^
7638|_ Auth Plugin Name: mysql_native_password
7639| vulners:
7640| MySQL 5.5.5-10.0.34-MariaDB:
7641|_ NODEJS:602 0.0 https://vulners.com/nodejs/NODEJS:602
7642| vulscan: VulDB - https://vuldb.com:
7643| [92900] Oracle MySQL Server up to 5.5.51/5.6.32/5.7.14 Optimizer denial of service
7644| [92898] Oracle MySQL Server up to 5.5.51/5.6.32/5.7.14 GIS denial of service
7645| [92897] Oracle MySQL Server up to 5.5.51 DML denial of service
7646| [92827] Oracle MySQL Server up to 5.5.51/5.6.32/5.7.14 Federated denial of service
7647| [92817] Oracle MySQL Server up to 5.5.51/5.6.32/5.7.14 Types denial of service
7648| [116762] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 DDL information disclosure
7649| [116761] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 Locking denial of service
7650| [116755] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 Optimizer denial of service
7651| [116751] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 Privileges denial of service
7652| [116742] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 Client programs denial of service
7653| [116738] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 DDL denial of service
7654| [116736] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 InnoDB denial of service
7655| [112099] Oracle MySQL Server up to 5.5.58/5.6.38/5.7.20 Optimizer denial of service
7656| [112098] Oracle MySQL Server up to 5.5.58/5.6.38/5.7.20 Optimizer denial of service
7657| [112097] Oracle MySQL Server up to 5.5.58/5.6.38/5.7.20 Optimizer denial of service
7658| [112095] Oracle MySQL Server up to 5.5.58/5.6.38/5.7.20 DDL denial of service
7659| [112091] Oracle MySQL Server up to 5.5.58/5.6.38/5.7.19 Partition denial of service
7660| [108176] Oracle MySQL Server up to 5.5.57/5.6.37/5.7.11 Optimizer denial of service
7661| [108173] Oracle MySQL Server up to 5.5.57/5.6.37/5.7.19 DDL denial of service
7662| [108172] Oracle MySQL Server up to 5.5.57/5.6.37/5.7.19 Client programs information disclosure
7663| [104089] Oracle MySQL Server up to 5.5.56/5.6.36/5.7.18 DDL unknown vulnerability
7664| [104087] Oracle MySQL Server up to 5.5.56/5.6.36/5.7.18 DDL unknown vulnerability
7665| [104086] Oracle MySQL Server up to 5.5.56/5.6.36/5.7.18 Client mysqldump unknown vulnerability
7666| [104083] Oracle MySQL Server up to 5.5.56/5.6.36/5.7.18 Charsets denial of service
7667| [104075] Oracle MySQL Server up to 5.5.56/5.6.36/5.7.18 DML denial of service
7668| [104069] Oracle MySQL Server up to 5.5.56/5.6.36/5.7.18 C API denial of service
7669| [100225] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 DDL unknown vulnerability
7670| [100224] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Privileges denial of service
7671| [100223] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Privileges denial of service
7672| [100222] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Privileges denial of service
7673| [100218] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 DML denial of service
7674| [100215] Oracle MySQL Server up to 5.5.54/5.6.35 C API information disclosure
7675| [100207] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Optimizer denial of service
7676| [100204] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Client mysqldump unknown vulnerability
7677| [100203] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Thread Pooling denial of service
7678| [100200] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Optimizer denial of service
7679| [100199] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 DML denial of service
7680| [96814] MariaDB up to 5.5.54/10.0.29/10.1.21/10.2.3 libmysqlclient.so denial of service
7681| [95722] Oracle MySQL Server up to 5.5.53 Charsets denial of service
7682| [95715] Oracle MySQL Server 5.5.53/5.6.34/5.7.16 Optimizer denial of service
7683| [95713] Oracle MySQL Server 5.5.53/5.6.34/5.7.16 DML denial of service
7684| [95711] Oracle MySQL Server 5.5.53/5.6.34/5.7.16 DDL denial of service
7685| [92896] Oracle MySQL Server up to 5.5.50/5.6.31/5.7.13 DML denial of service
7686| [92818] Oracle MySQL Server up to 5.5.52/5.6.33/5.7.15 Encryption information disclosure
7687| [91505] Oracle MySQL up to 5.5.52/5.6.33/5.7.15 Logging my.cnf privilege escalation
7688| [63111] Oracle MySQL 5.5.19 Installation denial of service
7689| [7068] Oracle MySQL Server up to 5.5.19 Authentication information disclosure
7690| [7067] Oracle MySQL Server up to 5.5.19 sql/sql_acl.cc acl_get memory corruption
7691| [7066] Oracle MySQL Server up to 5.5.19 SELECT Command Crash denial of service
7692| [7065] Oracle MySQL Server up to 5.5.19 Create Table MDL_key::mdl_key_init memory corruption
7693| [5165] Oracle MySQL Server up to 5.5.19 Optimizer denial of service
7694|
7695| MITRE CVE - https://cve.mitre.org:
7696| [CVE-2012-5615] MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a, 5.3.11, 5.2.13, 5.1.66, and possibly other versions, generates different error messages with different time delays depending on whether a user name exists, which allows remote attackers to enumerate valid usernames.
7697| [CVE-2012-5613] ** DISPUTED ** MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a and possibly other versions, when configured to assign the FILE privilege to users who should not have administrative privileges, allows remote authenticated users to gain privileges by leveraging the FILE privilege to create files as the MySQL administrator. NOTE: the vendor disputes this issue, stating that this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. NOTE: it could be argued that this should not be included in CVE because it is a configuration issue.
7698| [CVE-2012-5612] Heap-based buffer overflow in Oracle MySQL 5.5.19 and other versions through 5.5.28, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code, as demonstrated using certain variations of the (1) USE, (2) SHOW TABLES, (3) DESCRIBE, (4) SHOW FIELDS FROM, (5) SHOW COLUMNS FROM, (6) SHOW INDEX FROM, (7) CREATE TABLE, (8) DROP TABLE, (9) ALTER TABLE, (10) DELETE FROM, (11) UPDATE, and (12) SET PASSWORD commands.
7699| [CVE-2012-5611] Stack-based buffer overflow in the acl_get function in Oracle MySQL 5.5.19 and other versions through 5.5.28, and 5.1.53 and other versions through 5.1.66, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command.
7700| [CVE-2012-1696] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
7701| [CVE-2012-0583] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.60 and earlier, and 5.5.19 and earlier, allows remote authenticated users to affect availability, related to MyISAM.
7702| [CVE-2010-3683] Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when a LOAD DATA INFILE request generates SQL errors, which allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a crafted request.
7703| [CVE-2010-3681] Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using the HANDLER interface and performing "alternate reads from two indexes on a table," which triggers an assertion failure.
7704| [CVE-2013-3812] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Replication.
7705| [CVE-2013-3809] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Audit Log.
7706| [CVE-2013-3808] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.
7707| [CVE-2013-3805] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Prepared Statements.
7708| [CVE-2013-3804] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
7709| [CVE-2013-3802] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Full Text Search.
7710| [CVE-2013-3801] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.
7711| [CVE-2013-3794] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Partition.
7712| [CVE-2013-3793] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.
7713| [CVE-2013-3783] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Parser.
7714| [CVE-2013-2392] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
7715| [CVE-2013-2391] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows local users to affect confidentiality and integrity via unknown vectors related to Server Install.
7716| [CVE-2013-2389] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
7717| [CVE-2013-2378] Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, 5.5.29 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Information Schema.
7718| [CVE-2013-2376] Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Stored Procedure.
7719| [CVE-2013-2375] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
7720| [CVE-2013-1861] MariaDB 5.5.x before 5.5.30, 5.3.x before 5.3.13, 5.2.x before 5.2.15, and 5.1.x before 5.1.68, and Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote attackers to cause a denial of service (crash) via a crafted geometry feature that specifies a large number of points, which is not properly handled when processing the binary representation of this feature, related to a numeric calculation error.
7721| [CVE-2013-1555] Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, and 5.5.29 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Partition.
7722| [CVE-2013-1552] Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
7723| [CVE-2013-1544] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.
7724| [CVE-2013-1532] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Information Schema.
7725| [CVE-2013-1531] Unspecified vulnerability in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Privileges.
7726| [CVE-2013-1526] Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Replication.
7727| [CVE-2013-1523] Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Optimizer.
7728| [CVE-2013-1521] Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Locking.
7729| [CVE-2013-1512] Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.
7730| [CVE-2013-1511] Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
7731| [CVE-2013-1506] Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, 5.5.29 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Locking.
7732| [CVE-2013-1502] Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.9 and earlier allows local users to affect availability via unknown vectors related to Server Partition.
7733| [CVE-2013-1492] Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.30, has unspecified impact and attack vectors, a different vulnerability than CVE-2012-0553.
7734| [CVE-2013-0389] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
7735| [CVE-2013-0386] Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Stored Procedure.
7736| [CVE-2013-0385] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows local users to affect confidentiality and integrity via unknown vectors related to Server Replication.
7737| [CVE-2013-0384] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Information Schema.
7738| [CVE-2013-0383] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote attackers to affect availability via unknown vectors related to Server Locking.
7739| [CVE-2013-0371] Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability, related to MyISAM.
7740| [CVE-2013-0368] Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
7741| [CVE-2013-0367] Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Partition.
7742| [CVE-2012-5614] Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (mysqld crash) via a SELECT command with an UpdateXML command containing XML with a large number of unique, nested elements.
7743| [CVE-2012-5383] ** DISPUTED ** Untrusted search path vulnerability in the installation functionality in Oracle MySQL 5.5.28, when installed in the top-level C:\ directory, might allow local users to gain privileges via a Trojan horse DLL in the "C:\MySQL\MySQL Server 5.5\bin" directory, which may be added to the PATH system environment variable by an administrator, as demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview. NOTE: CVE disputes this issue because the unsafe PATH is established only by a separate administrative action that is not a default part of the MySQL installation.
7744| [CVE-2012-5096] Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users with Server Privileges to affect availability via unknown vectors.
7745| [CVE-2012-5060] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.65 and earlier and 5.5.27 and earlier allows remote authenticated users to affect availability, related to GIS Extension.
7746| [CVE-2012-4414] Multiple SQL injection vulnerabilities in the replication code in Oracle MySQL possibly before 5.5.29, and MariaDB 5.1.x through 5.1.62, 5.2.x through 5.2.12, 5.3.x through 5.3.7, and 5.5.x through 5.5.25, allow remote authenticated users to execute arbitrary SQL commands via vectors related to the binary log. NOTE: as of 20130116, Oracle has not commented on claims from a downstream vendor that the fix in MySQL 5.5.29 is incomplete.
7747| [CVE-2012-3197] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Replication.
7748| [CVE-2012-3180] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
7749| [CVE-2012-3177] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server.
7750| [CVE-2012-3173] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to InnoDB Plugin.
7751| [CVE-2012-3167] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Full Text Search.
7752| [CVE-2012-3166] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
7753| [CVE-2012-3163] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Information Schema.
7754| [CVE-2012-3160] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows local users to affect confidentiality via unknown vectors related to Server Installation.
7755| [CVE-2012-3158] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Protocol.
7756| [CVE-2012-3156] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server.
7757| [CVE-2012-3150] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
7758| [CVE-2012-3149] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.26 and earlier allows remote authenticated users to affect confidentiality, related to MySQL Client.
7759| [CVE-2012-3147] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.26 and earlier allows remote attackers to affect integrity and availability, related to MySQL Client.
7760| [CVE-2012-3144] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server.
7761| [CVE-2012-2750] Unspecified vulnerability in MySQL 5.5.x before 5.5.23 has unknown impact and attack vectors related to a "Security Fix", aka Bug #59533. NOTE: this might be a duplicate of CVE-2012-1689, but as of 20120816, Oracle has not commented on this possibility.
7762| [CVE-2012-2749] MySQL 5.1.x before 5.1.63 and 5.5.x before 5.5.24 allows remote authenticated users to cause a denial of service (mysqld crash) via vectors related to incorrect calculation and a sort order index.
7763| [CVE-2012-2122] sql/password.c in Oracle MySQL 5.1.x before 5.1.63, 5.5.x before 5.5.24, and 5.6.x before 5.6.6, and MariaDB 5.1.x before 5.1.62, 5.2.x before 5.2.12, 5.3.x before 5.3.6, and 5.5.x before 5.5.23, when running in certain environments with certain implementations of the memcmp function, allows remote attackers to bypass authentication by repeatedly authenticating with the same incorrect password, which eventually causes a token comparison to succeed due to an improperly-checked return value.
7764| [CVE-2012-2102] MySQL 5.1.x before 5.1.62 and 5.5.x before 5.5.22 allows remote authenticated users to cause a denial of service (assertion failure and mysqld abort) by deleting a record and using HANDLER READ NEXT.
7765| [CVE-2012-1757] Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
7766| [CVE-2012-1756] Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors.
7767| [CVE-2012-1735] Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
7768| [CVE-2012-1734] Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier, and 5.5.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
7769| [CVE-2012-1705] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
7770| [CVE-2012-1703] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
7771| [CVE-2012-1702] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote attackers to affect availability via unknown vectors.
7772| [CVE-2012-1697] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.21 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.
7773| [CVE-2012-1690] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
7774| [CVE-2012-1689] Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier, and 5.5.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
7775| [CVE-2012-1688] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability, related to Server DML.
7776| [CVE-2012-0882] Buffer overflow in yaSSL, as used in MySQL 5.5.20 and possibly other versions including 5.5.x before 5.5.22 and 5.1.x before 5.1.62, allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VulnDisco Pack Professional 9.17. NOTE: as of 20120224, this disclosure has no actionable information. However, because the module author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. NOTE: due to lack of details, it is not clear whether this issue is a duplicate of CVE-2012-0492 or another CVE.
7777| [CVE-2012-0578] Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
7778| [CVE-2012-0574] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors.
7779| [CVE-2012-0572] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
7780| [CVE-2012-0553] Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.28, has unspecified impact and attack vectors, a different vulnerability than CVE-2013-1492.
7781| [CVE-2012-0540] Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier and 5.5.23 and earlier allows remote authenticated users to affect availability, related to GIS Extension.
7782| [CVE-2012-0496] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
7783| [CVE-2012-0495] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0486, CVE-2012-0487, CVE-2012-0488, CVE-2012-0489, CVE-2012-0491, and CVE-2012-0493.
7784| [CVE-2012-0494] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows local users to affect availability via unknown vectors.
7785| [CVE-2012-0493] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0486, CVE-2012-0487, CVE-2012-0488, CVE-2012-0489, CVE-2012-0491, and CVE-2012-0495.
7786| [CVE-2012-0492] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0485.
7787| [CVE-2012-0491] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0486, CVE-2012-0487, CVE-2012-0488, CVE-2012-0489, CVE-2012-0493, and CVE-2012-0495.
7788| [CVE-2012-0490] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect availability via unknown vectors.
7789| [CVE-2012-0489] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0486, CVE-2012-0487, CVE-2012-0488, CVE-2012-0491, CVE-2012-0493, and CVE-2012-0495.
7790| [CVE-2012-0488] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0486, CVE-2012-0487, CVE-2012-0489, CVE-2012-0491, CVE-2012-0493, and CVE-2012-0495.
7791| [CVE-2012-0487] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0486, CVE-2012-0488, CVE-2012-0489, CVE-2012-0491, CVE-2012-0493, and CVE-2012-0495.
7792| [CVE-2012-0486] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0487, CVE-2012-0488, CVE-2012-0489, CVE-2012-0491, CVE-2012-0493, and CVE-2012-0495.
7793| [CVE-2012-0485] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0492.
7794| [CVE-2012-0484] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect confidentiality via unknown vectors.
7795| [CVE-2012-0120] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0485, and CVE-2012-0492.
7796| [CVE-2012-0119] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492.
7797| [CVE-2012-0118] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0113.
7798| [CVE-2012-0117] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0486, CVE-2012-0487, CVE-2012-0488, CVE-2012-0489, CVE-2012-0491, CVE-2012-0493, and CVE-2012-0495.
7799| [CVE-2012-0116] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
7800| [CVE-2012-0115] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492.
7801| [CVE-2012-0114] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows local users to affect confidentiality and integrity via unknown vectors.
7802| [CVE-2012-0113] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0118.
7803| [CVE-2012-0112] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492.
7804| [CVE-2012-0075] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect integrity via unknown vectors.
7805| [CVE-2011-5049] MySQL 5.5.8, when running on Windows, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted packet to TCP port 3306.
7806| [CVE-2011-2262] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote attackers to affect availability via unknown vectors.
7807| [CVE-2010-3839] MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (infinite loop) via multiple invocations of a (1) prepared statement or (2) stored procedure that creates a query with nested JOIN statements.
7808| [CVE-2010-3838] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a query that uses the (1) GREATEST or (2) LEAST function with a mixed list of numeric and LONGBLOB arguments, which is not properly handled when the function's result is "processed using an intermediate temporary table."
7809| [CVE-2010-3837] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object.
7810| [CVE-2010-3836] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (assertion failure and server crash) via vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers.
7811| [CVE-2010-3835] MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (mysqld server crash) by performing a user-variable assignment in a logical expression that is calculated and stored in a temporary table for GROUP BY, then causing the expression value to be used after the table is created, which causes the expression to be re-evaluated instead of accessing its value from the table.
7812| [CVE-2010-3834] Unspecified vulnerability in MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via vectors related to "materializing a derived table that required a temporary table for grouping" and "user variable assignments."
7813| [CVE-2010-3833] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 does not properly propagate type errors, which allows remote attackers to cause a denial of service (server crash) via crafted arguments to extreme-value functions such as (1) LEAST and (2) GREATEST, related to KILL_BAD_DATA and a "CREATE TABLE ... SELECT."
7814| [CVE-2009-4484] Multiple stack-based buffer overflows in the CertDecoder::GetName function in src/asn.cpp in TaoCrypt in yaSSL before 1.9.9, as used in mysqld in MySQL 5.0.x before 5.0.90, MySQL 5.1.x before 5.1.43, MySQL 5.5.x through 5.5.0-m2, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and daemon crash) by establishing an SSL connection and sending an X.509 client certificate with a crafted name field, as demonstrated by mysql_overflow1.py and the vd_mysql5 module in VulnDisco Pack Professional 8.11. NOTE: this was originally reported for MySQL 5.0.51a.
7815| [CVE-2006-4835] Bluview Blue Magic Board (BMB) (aka BMForum) 5.5 allows remote attackers to obtain sensitive information via a direct request to (1) footer.php, (2) header.php, (3) db_mysql_error.php, (4) langlist.php, (5) sendmail.php, or (6) style.php, which reveals the path in various error messages.
7816|
7817| SecurityFocus - https://www.securityfocus.com/bid/:
7818| [52154] RETIRED: MySQL 5.5.20 Unspecified Remote Code Execution Vulnerability
7819|
7820| IBM X-Force - https://exchange.xforce.ibmcloud.com:
7821| [85724] Oracle MySQL Server XA Transactions denial of service
7822| [85723] Oracle MySQL Server Server Replication denial of service
7823| [85722] Oracle MySQL Server InnoDB denial of service
7824| [85721] Oracle MySQL Server Server Privileges unspecified
7825| [85720] Oracle MySQL Server Server Partition denial of service
7826| [85719] Oracle MySQL Server Server Parser denial of service
7827| [85718] Oracle MySQL Server Server Options denial of service
7828| [85717] Oracle MySQL Server Server Options denial of service
7829| [85716] Oracle MySQL Server Server Optimizer denial of service
7830| [85715] Oracle MySQL Server Server Optimizer denial of service
7831| [85714] Oracle MySQL Server Prepared Statements denial of service
7832| [85713] Oracle MySQL Server InnoDB denial of service
7833| [85712] Oracle MySQL Server Full Text Search denial of service
7834| [85711] Oracle MySQL Server Data Manipulation Language denial of service
7835| [85710] Oracle MySQL Server Data Manipulation Language denial of service
7836| [85709] Oracle MySQL Server Audit Log unspecified
7837| [85708] Oracle MySQL Server MemCached unspecified
7838| [84846] Debian mysql-server package information disclosure
7839| [84375] Wireshark MySQL dissector denial of service
7840| [83554] Oracle MySQL Server Server Partition denial of service
7841| [83553] Oracle MySQL Server Server Locking denial of service
7842| [83552] Oracle MySQL Server Server Install unspecified
7843| [83551] Oracle MySQL Server Server Types denial of service
7844| [83550] Oracle MySQL Server Server Privileges unspecified
7845| [83549] Oracle MySQL Server InnoDB denial of service
7846| [83548] Oracle MySQL Server InnoDB denial of service
7847| [83547] Oracle MySQL Server Data Manipulation Language denial of service
7848| [83546] Oracle MySQL Server Stored Procedure denial of service
7849| [83545] Oracle MySQL Server Server Replication denial of service
7850| [83544] Oracle MySQL Server Server Partition denial of service
7851| [83543] Oracle MySQL Server Server Optimizer denial of service
7852| [83542] Oracle MySQL Server InnoDB denial of service
7853| [83541] Oracle MySQL Server Information Schema denial of service
7854| [83540] Oracle MySQL Server Data Manipulation Language denial of service
7855| [83539] Oracle MySQL Server Data Manipulation Language denial of service
7856| [83538] Oracle MySQL Server Server Optimizer unspecified
7857| [83537] Oracle MySQL Server MemCached denial of service
7858| [83536] Oracle MySQL Server Server Privileges unspecified
7859| [83535] Oracle MySQL Server Server Privileges unspecified
7860| [83534] Oracle MySQL Server Server unspecified
7861| [83533] Oracle MySQL Server Information Schema unspecified
7862| [83532] Oracle MySQL Server Server Locking unspecified
7863| [83531] Oracle MySQL Server Data Manipulation Language denial of service
7864| [83388] MySQL administrative login attempt detected
7865| [82963] Mambo MySQL database information disclosure
7866| [82946] Oracle MySQL buffer overflow
7867| [82945] Oracle MySQL buffer overflow
7868| [82895] Oracle MySQL and MariaDB geometry queries denial of service
7869| [81577] MySQL2JSON extension for TYPO3 unspecified SQL injection
7870| [81325] Oracle MySQL Server Server Privileges denial of service
7871| [81324] Oracle MySQL Server Server Partition denial of service
7872| [81323] Oracle MySQL Server Server Optimizer denial of service
7873| [81322] Oracle MySQL Server Server Optimizer denial of service
7874| [81321] Oracle MySQL Server Server denial of service
7875| [81320] Oracle MySQL Server MyISAM denial of service
7876| [81319] Oracle MySQL Server InnoDB denial of service
7877| [81318] Oracle MySQL Server InnoDB denial of service
7878| [81317] Oracle MySQL Server Server Locking denial of service
7879| [81316] Oracle MySQL Server Server denial of service
7880| [81315] Oracle MySQL Server Server Replication unspecified
7881| [81314] Oracle MySQL Server Server Replication unspecified
7882| [81313] Oracle MySQL Server Stored Procedure denial of service
7883| [81312] Oracle MySQL Server Server Optimizer denial of service
7884| [81311] Oracle MySQL Server Information Schema denial of service
7885| [81310] Oracle MySQL Server GIS Extension denial of service
7886| [80790] Oracle MySQL yaSSL buffer overflow
7887| [80553] Oracle MySQL and MariaDB salt security bypass
7888| [80443] Oracle MySQL Server unspecified code execution
7889| [80442] Oracle MySQL Server acl_get() buffer overflow
7890| [80440] Oracle MySQL Server table buffer overflow
7891| [80435] Oracle MySQL Server database privilege escalation
7892| [80434] Oracle MySQL Server COM_BINLOG_DUMP denial of service
7893| [80433] Oracle MySQL Server Stuxnet privilege escalation
7894| [80432] Oracle MySQL Server authentication information disclosure
7895| [79394] Oracle MySQL Server Server Installation information disclosure
7896| [79393] Oracle MySQL Server Server Replication denial of service
7897| [79392] Oracle MySQL Server Server Full Text Search denial of service
7898| [79391] Oracle MySQL Server Server denial of service
7899| [79390] Oracle MySQL Server Client information disclosure
7900| [79389] Oracle MySQL Server Server Optimizer denial of service
7901| [79388] Oracle MySQL Server Server Optimizer denial of service
7902| [79387] Oracle MySQL Server Server denial of service
7903| [79386] Oracle MySQL Server InnoDB Plugin denial of service
7904| [79385] Oracle MySQL Server InnoDB denial of service
7905| [79384] Oracle MySQL Server Client unspecified
7906| [79383] Oracle MySQL Server Server denial of service
7907| [79382] Oracle MySQL Server Protocol unspecified
7908| [79381] Oracle MySQL Server Information Schema unspecified
7909| [78954] SilverStripe MySQLDatabase.php information disclosure
7910| [78948] MySQL MyISAM table symlink
7911| [77865] MySQL unknown vuln
7912| [77864] MySQL sort order denial of service
7913| [77768] MySQLDumper refresh_dblist.php information disclosure
7914| [77177] MySQL Squid Access Report unspecified cross-site scripting
7915| [77065] Oracle MySQL Server Optimizer denial of service
7916| [77064] Oracle MySQL Server Optimizer denial of service
7917| [77063] Oracle MySQL Server denial of service
7918| [77062] Oracle MySQL InnoDB denial of service
7919| [77061] Oracle MySQL GIS Extension denial of service
7920| [77060] Oracle MySQL Server Optimizer denial of service
7921| [76189] MySQL unspecified error
7922| [76188] MySQL attempts security bypass
7923| [75287] MySQLDumper restore.php information disclosure
7924| [75286] MySQLDumper filemanagement.php directory traversal
7925| [75285] MySQLDumper main.php cross-site request forgery
7926| [75284] MySQLDumper install.php cross-site scripting
7927| [75283] MySQLDumper install.php file include
7928| [75282] MySQLDumper menu.php code execution
7929| [75022] Oracle MySQL Server Server Optimizer denial of service
7930| [75021] Oracle MySQL Server Server Optimizer denial of service
7931| [75020] Oracle MySQL Server Server DML denial of service
7932| [75019] Oracle MySQL Server Partition denial of service
7933| [75018] Oracle MySQL Server MyISAM denial of service
7934| [75017] Oracle MySQL Server Server Optimizer denial of service
7935| [74672] Oracle MySQL Server multiple unspecified
7936| [73092] MySQL unspecified code execution
7937| [72540] Oracle MySQL Server denial of service
7938| [72539] Oracle MySQL Server unspecified
7939| [72538] Oracle MySQL Server denial of service
7940| [72537] Oracle MySQL Server denial of service
7941| [72536] Oracle MySQL Server unspecified
7942| [72535] Oracle MySQL Server denial of service
7943| [72534] Oracle MySQL Server denial of service
7944| [72533] Oracle MySQL Server denial of service
7945| [72532] Oracle MySQL Server denial of service
7946| [72531] Oracle MySQL Server denial of service
7947| [72530] Oracle MySQL Server denial of service
7948| [72529] Oracle MySQL Server denial of service
7949| [72528] Oracle MySQL Server denial of service
7950| [72527] Oracle MySQL Server denial of service
7951| [72526] Oracle MySQL Server denial of service
7952| [72525] Oracle MySQL Server information disclosure
7953| [72524] Oracle MySQL Server denial of service
7954| [72523] Oracle MySQL Server denial of service
7955| [72522] Oracle MySQL Server denial of service
7956| [72521] Oracle MySQL Server denial of service
7957| [72520] Oracle MySQL Server denial of service
7958| [72519] Oracle MySQL Server denial of service
7959| [72518] Oracle MySQL Server unspecified
7960| [72517] Oracle MySQL Server unspecified
7961| [72516] Oracle MySQL Server unspecified
7962| [72515] Oracle MySQL Server denial of service
7963| [72514] Oracle MySQL Server unspecified
7964| [71965] MySQL port denial of service
7965| [70680] DBD::mysqlPP unspecified SQL injection
7966| [70370] TaskFreak! multi-mysql unspecified path disclosure
7967| [68799] mod_authnz_external module for Apache mysql-auth.pl SQL injection
7968| [68294] MySQLDriverCS statement.cs sql injection
7969| [68175] Prosody MySQL denial of service
7970| [67539] Zend Framework MySQL PDO security bypass
7971| [67254] DirectAdmin MySQL information disclosure
7972| [66567] Xoops mysql.sql information disclosure
7973| [65871] PyWebDAV MySQLAuthHandler class SQL injection
7974| [65543] MySQL Select Arbitrary data into a File
7975| [65529] MySQL Eventum full_name field cross-site scripting
7976| [65380] Oracle MySQL Eventum forgot_password.php cross-site scripting
7977| [65379] Oracle MySQL Eventum list.php cross-site scripting
7978| [65266] Accellion File Transfer Appliance MySQL default password
7979| [64878] MySQL Geometry denial of service
7980| [64877] MySQL EXPLAIN EXTENDED denial of service
7981| [64876] MySQL prepared statement denial of service
7982| [64845] MySQL extreme-value denial of service
7983| [64844] MySQL Gis_line_string::init_from_wkb denial of service
7984| [64843] MySQL user-variable denial of service
7985| [64842] MySQL view preparation denial of service
7986| [64841] MySQL prepared statement denial of service
7987| [64840] MySQL LONGBLOB denial of service
7988| [64839] MySQL invocations denial of service
7989| [64838] MySQL Gis_line_string::init_from_wkb denial of service
7990| [64689] MySQL dict0crea.c denial of service
7991| [64688] MySQL SET column denial of service
7992| [64687] MySQL BINLOG command denial of service
7993| [64686] MySQL InnoDB denial of service
7994| [64685] MySQL HANDLER interface denial of service
7995| [64684] MySQL Item_singlerow_subselect::store denial of service
7996| [64683] MySQL OK packet denial of service
7997| [63518] MySQL Query Browser GUI Tools information disclosure
7998| [63517] MySQL Administrator GUI Tools information disclosure
7999| [62272] MySQL PolyFromWKB() denial of service
8000| [62269] MySQL LIKE predicates denial of service
8001| [62268] MySQL joins denial of service
8002| [62267] MySQL GREATEST() or LEAST() denial of service
8003| [62266] MySQL GROUP_CONCAT() denial of service
8004| [62265] MySQL expression values denial of service
8005| [62264] MySQL temporary table denial of service
8006| [62263] MySQL LEAST() or GREATEST() denial of service
8007| [62262] MySQL replication privilege escalation
8008| [61739] MySQL WITH ROLLUP denial of service
8009| [61343] MySQL LOAD DATA INFILE denial of service
8010| [61342] MySQL EXPLAIN denial of service
8011| [61341] MySQL HANDLER denial of service
8012| [61340] MySQL BINLOG denial of service
8013| [61339] MySQL IN() or CASE denial of service
8014| [61338] MySQL SET denial of service
8015| [61337] MySQL DDL denial of service
8016| [61318] PHP mysqlnd_wireprotocol.c buffer overflow
8017| [61317] PHP php_mysqlnd_read_error_from_line buffer overflow
8018| [61316] PHP php_mysqlnd_auth_write buffer overflow
8019| [61274] MySQL TEMPORARY InnoDB denial of service
8020| [59905] MySQL ALTER DATABASE denial of service
8021| [59841] CMySQLite updateUser.php cross-site request forgery
8022| [59112] MySQL Enterprise Monitor unspecified cross-site request forgery
8023| [59075] PHP php_mysqlnd_auth_write() buffer overflow
8024| [59074] PHP php_mysqlnd_read_error_from_line() buffer overflow
8025| [59073] PHP php_mysqlnd_rset_header_read() buffer overflow
8026| [59072] PHP php_mysqlnd_ok_read() information disclosure
8027| [58842] MySQL DROP TABLE file deletion
8028| [58676] Template Shares MySQL information disclosure
8029| [58531] MySQL COM_FIELD_LIST buffer overflow
8030| [58530] MySQL packet denial of service
8031| [58529] MySQL COM_FIELD_LIST security bypass
8032| [58311] ClanSphere the captcha generator and MySQL driver SQL injection
8033| [57925] MySQL UNINSTALL PLUGIN security bypass
8034| [57006] Quicksilver Forums mysqldump information disclosure
8035| [56800] Employee Timeclock Software mysqldump information disclosure
8036| [56200] Flex MySQL Connector ActionScript SQL injection
8037| [55877] MySQL yaSSL buffer overflow
8038| [55622] kiddog_mysqldumper extension for TYPO3 information disclosure
8039| [55416] MySQL unspecified buffer overflow
8040| [55382] Ublog UblogMySQL.sql information disclosure
8041| [55251] PHP-MySQL-Quiz editquiz.php SQL injection
8042| [54597] MySQL sql_table.cc security bypass
8043| [54596] MySQL mysqld denial of service
8044| [54365] MySQL OpenSSL security bypass
8045| [54364] MySQL MyISAM table symlink
8046| [53950] The mysql-ocaml mysql_real_escape_string weak security
8047| [52978] Zmanda Recovery Manager for MySQL mysqlhotcopy privilege escalation
8048| [52977] Zmanda Recovery Manager for MySQL socket-server.pl command execution
8049| [52660] iScouter PHP Web Portal MySQL Password Retrieval
8050| [52220] aa33code mysql.inc information disclosure
8051| [52122] MySQL Connector/J unicode SQL injection
8052| [51614] MySQL dispatch_command() denial of service
8053| [51406] MySQL Connector/NET SSL spoofing
8054| [49202] MySQL UDF command execution
8055| [49050] MySQL XPath denial of service
8056| [48919] Cisco Application Networking Manager MySQL default account password
8057| [48163] libapache2-mod-auth-mysql module for Debian multibyte encoding SQL injection
8058| [47544] MySQL Calendar index.php SQL injection
8059| [47476] MySQL Calendar index.php nodstrumCalendarV2 security bypass
8060| [45649] MySQL MyISAM symlink security bypass
8061| [45648] MySQL MyISAM symlinks security bypass
8062| [45607] MySQL Quick Admin actions.php file include
8063| [45606] MySQL Quick Admin index.php file include
8064| [45590] MySQL command-line client cross-site scripting
8065| [45436] PromoteWeb MySQL go.php SQL injection
8066| [45042] MySQL empty bit-string literal denial of service
8067| [44662] mysql-lists unspecified cross-site scripting
8068| [42267] MySQL MyISAM security bypass
8069| [42211] GEDCOM_to_MySQL2 index.php, info.php and prenom.php cross-site scripting
8070| [42014] miniBB setup_mysql.php and setup_options.php SQL injection
8071| [40920] MySQL sql_select.cc denial of service
8072| [40734] MySQL Server BINLOG privilege escalation
8073| [40350] MySQL password information disclosure
8074| [39415] Debian GNU/Linux libdspam7-drv-mysql cron job password disclosure
8075| [39402] PHP LOCAL INFILE and MySQL extension security bypass
8076| [38999] aurora framework db_mysql.lib SQL injection
8077| [38990] MySQL federated engine denial of service
8078| [38989] MySQL DEFINER value privilege escalation
8079| [38988] MySQL DATA DIRECTORY and INDEX DIRECTORY privilege escalation
8080| [38964] MySQL RENAME TABLE symlink
8081| [38733] ManageEngine EventLog Analyzer MySQL default password
8082| [38284] MySQL ha_innodb.cc convert_search_mode_to_innobase() denial of service
8083| [38189] MySQL default root password
8084| [37235] Asterisk-Addons cdr_addon_mysql module SQL injection
8085| [37099] RHSA update for MySQL case sensistive database name privilege escalation not installed
8086| [36555] PHP MySQL extension multiple functions security bypass
8087| [35960] MySQL view privilege escalation
8088| [35959] MySQL CREATE TABLE LIKE information disclosure
8089| [35958] MySQL connection protocol denial of service
8090| [35291] MySQLDumper main.php security bypass
8091| [34811] MySQL udf_init and mysql_create_function command execution
8092| [34809] MySQL mysql_update privilege escalation
8093| [34349] MySQL ALTER information disclosure
8094| [34348] MySQL mysql_change_db privilege escalation
8095| [34347] MySQL RENAME TABLE weak security
8096| [34232] MySQL IF clause denial of service
8097| [33388] Advanced Website Creator (AWC) mysql_escape_string SQL injection
8098| [33285] Eve-Nuke mysql.php file include
8099| [32957] MySQL Commander dbopen.php file include
8100| [32933] cPanel load_language.php and mysqlconfig.php file include
8101| [32911] MySQL filesort function denial of service
8102| [32462] cPanel passwdmysql cross-site scripting
8103| [32288] RHSA-2006:0544 updates for mysql not installed
8104| [32266] MySQLNewsEngine affichearticles.php3 file include
8105| [31244] The Address Book MySQL export.php password information disclosure
8106| [31037] Php/Mysql Site Builder (PHPBuilder) htm2php.php directory traversal
8107| [30760] BTSaveMySql URL file disclosure
8108| [30191] StoryStream mysql.php and mysqli.php file include
8109| [30085] MySQL MS-DOS device name denial of service
8110| [30031] Agora MysqlfinderAdmin.php file include
8111| [29438] MySQLDumper mysqldumper_path/sql.php cross-site scripting
8112| [29179] paBugs class.mysql.php file include
8113| [29120] ZoomStats MySQL file include
8114| [28448] MySQL case sensitive database name privilege escalation
8115| [28442] MySQL GRANT EXECUTE privilege escalation
8116| [28387] FunkBoard admin/mysql_install.php and admin/pg_install.php unauthorized access
8117| [28202] MySQL multiupdate subselect query denial of service
8118| [28180] MySQL MERGE table security bypass
8119| [28176] PHP MySQL Banner Exchange lib.inc information disclosure
8120| [27995] Opsware Network Automation System MySQL plaintext password
8121| [27904] MySQL date_format() format string
8122| [27635] MySQL Instance Manager denial of service
8123| [27212] MySQL SELECT str_to_date denial of service
8124| [26875] MySQL ASCII escaping SQL injection
8125| [26420] Apple Mac OS X MySQL Manager blank password
8126| [26236] MySQL login packet information disclosure
8127| [26232] MySQL COM_TABLE_DUMP buffer overflow
8128| [26228] MySQL sql_parce.cc information disclosure
8129| [26042] MySQL running
8130| [25313] WoltLab Burning Board class_db_mysql.php cross-site scripting
8131| [24966] MySQL mysql_real_query logging bypass
8132| [24653] PAM-MySQL logging function denial of service
8133| [24652] PAM-MySQL authentication double free code execution
8134| [24567] PHP/MYSQL Timesheet index.php and changehrs.php SQL injection
8135| [24095] PHP ext/mysqli exception handling format string
8136| [23990] PHP mysql_connect() buffer overflow
8137| [23596] MySQL Auction search module could allow cross-site scripting
8138| [22642] RHSA-2005:334 updates for mysql not installed
8139| [21757] MySQL UDF library functions command execution
8140| [21756] MySQL LoadLibraryEx function denial of service
8141| [21738] MySQL UDF mysql_create_function function directory traversal
8142| [21737] MySQL user defined function buffer overflow
8143| [21640] MySQL Eventum multiple class SQL injection
8144| [21638] MySQL Eventum multiple scripts cross-site scripting
8145| [20984] xmysqladmin temporary file symlink
8146| [20656] MySQL mysql_install_db script symlink
8147| [20333] Plans MySQL password information disclosure
8148| [19659] MySQL CREATE TEMPORARY TABLE command creates insecure files
8149| [19658] MySQL udf_init function gain access
8150| [19576] auraCMS mysql_fetch_row function path disclosure
8151| [18922] MySQL mysqlaccess script symlink attack
8152| [18824] MySQL UDF root privileges
8153| [18464] mysql_auth unspecified vulnerability
8154| [18449] Sugar Sales plaintext MySQL password
8155| [17783] MySQL underscore allows elevated privileges
8156| [17768] MySQL MATCH ... AGAINST SQL statement denial of service
8157| [17667] MySQL UNION change denial of service
8158| [17666] MySQL ALTER TABLE RENAME bypass restriction
8159| [17493] MySQL libmysqlclient bulk inserts buffer overflow
8160| [17462] MySQLGuest AWSguest.php script cross-site scripting
8161| [17047] MySQL mysql_real_connect buffer overflow
8162| [17030] MySQL mysqlhotcopy insecure temporary file
8163| [16612] MySQL my_rnd buffer overflow
8164| [16604] MySQL check_scramble_323 function allows unauthorized access
8165| [15883] MySQL mysqld_multi script symlink attack
8166| [15617] MySQL mysqlbug script symlink attack
8167| [15417] Confixx db_mysql_loeschen2.php SQL injection
8168| [15280] Proofpoint Protection Server MySQL allows unauthorized access
8169| [13404] HP Servicecontrol Manager multiple vulnerabilities in MySQL could allow execution of code
8170| [13153] MySQL long password buffer overflow
8171| [12689] MySQL AB ODBC Driver stores ODBC passwords and usernames in plain text
8172| [12540] Teapop PostSQL and MySQL modules SQL injection
8173| [12337] MySQL mysql_real_connect function buffer overflow
8174| [11510] MySQL datadir/my.cnf modification could allow root privileges
8175| [11493] mysqlcc configuration and connection files are world writable
8176| [11340] SuckBot mod_mysql_logger denial of service
8177| [11199] MySQL mysql_change_user() double-free memory pointer denial of service
8178| [10850] MySQL libmysql client read_one_row buffer overflow
8179| [10849] MySQL libmysql client read_rows buffer overflow
8180| [10848] MySQL COM_CHANGE_USER password buffer overflow
8181| [10847] MySQL COM_CHANGE_USER command password authentication bypass
8182| [10846] MySQL COM_TABLE_DUMP unsigned integer denial of service
8183| [10483] Bugzilla stores passwords in plain text in the MySQL database
8184| [10455] gBook MySQL could allow administrative access
8185| [10243] MySQL my.ini "
8186| [9996] MySQL SHOW GRANTS command discloses adminstrator`s encrypted password
8187| [9909] MySQL logging disabled by default on Windows
8188| [9908] MySQL binding to the loopback adapter is disabled
8189| [9902] MySQL default root password could allow unauthorized access
8190| [8748] Cyrus SASL LDAP+MySQL patch allows user unauthorized POP access
8191| [8105] PHP MySQL client library allows an attacker to bypass safe_mode restrictions
8192| [7923] Conectiva Linux MySQL /var/log/mysql file has insecure permissions
8193| [7206] WinMySQLadmin stores MySQL password in plain text
8194| [6617] MySQL "
8195| [6419] MySQL drop database command buffer overflow
8196| [6418] MySQL libmysqlclient.so buffer overflow
8197| [5969] MySQL select buffer overflow
8198| [5447] pam_mysql authentication input
8199| [5409] MySQL authentication algorithm obtain password hash
8200| [5057] PCCS MySQL Database Admin Tool could reveal username and password
8201| [4228] MySQL unauthenticated remote access
8202| [3849] MySQL default test account could allow any user to connect to the database
8203| [1568] MySQL creates readable log files
8204|
8205| Exploit-DB - https://www.exploit-db.com:
8206| [18269] MySQL 5.5.8 - Remote Denial of Service (DOS)
8207|
8208| OpenVAS (Nessus) - http://www.openvas.org:
8209| [53251] Debian Security Advisory DSA 562-1 (mysql)
8210| [53230] Debian Security Advisory DSA 540-1 (mysql)
8211|
8212| SecurityTracker - https://www.securitytracker.com:
8213| [1028790] MySQL Multiple Bugs Let Remote Users Deny Service and Partially Access and Modify Data
8214| [1028449] MySQL Multiple Bugs Let Remote Authenticated Users Deny Service and Partially Access and Modify Data
8215| [1028004] MySQL Multiple Bugs Let Remote Authenticated Users Take Full Control or Deny Service and Let Local Users Access and Modify Data
8216| [1027829] MySQL Bug in UpdateXML() Lets Remote Authenticated Users Deny Service
8217| [1027828] MySQL Heap Overflow May Let Remote Authenticated Users Execute Arbitrary Code
8218| [1027827] MySQL Stack Overflow May Let Remote Authenticated Users Execute Arbitrary Code
8219| [1027665] MySQL Multiple Bugs Let Remote Authenticated Users Access and Modify Data and Deny Service and Local Users Access Data
8220| [1027263] MySQL Multiple Bugs Let Remote Authenticated Users Deny Service
8221| [1027143] MySQL memcmp() Comparison Error Lets Remote Users Bypass Authentication
8222| [1026934] MySQL Multiple Bugs Let Remote Users Deny Service
8223| [1026896] MySQL Unspecified Flaws Have Unspecified Impact
8224| [1026659] MySQL Unspecified Flaw Lets Remote Users Execute Arbitrary Code
8225| [1026530] MySQL Multiple Bugs Let Local and Remote Users Partially Access and Modifiy Data and Partially Deny Service
8226| [1024508] MySQL Replication Flaw Lets Remote Authenticated Users Gain Elevated Privileges
8227| [1024507] MySQL Multiple Flaws Let Remote Authenticated Users Deny Service
8228| [1024360] MySQL Multiple Flaws Let Remote Authenticated Users Deny Service
8229| [1024160] MySQL ALTER DATABASE Processing Error Lets Remote Authenticated Users Deny Service
8230| [1024033] MySQL COM_FIELD_LIST Packet Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
8231| [1024032] MySQL Large Packet Processing Flaw in my_net_skip_rest() Lets Remote Users Deny Service
8232| [1024031] MySQL COM_FIELD_LIST Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges
8233| [1024004] MySQL mi_delete_table() Symlink Flaw Lets Remote Authenticated Users Delete Data and Index Files
8234| [1023402] MySQL Unspecified Flaw Lets Remote Users Execute Arbitrary Code
8235| [1023220] MySQL Client Fails to Check Server Certificates in Certain Cases
8236| [1022812] MySQL Unspecified Buffer Overflow Lets Remote Users Execute Arbitrary Code
8237| [1022533] MySQL Format String Bug in dispatch_command() Lets Remote Users Deny Service
8238| [1022482] MySQL Connector/Net is Missing SSL Certificate Validation
8239| [1021786] MySQL Bug in ExtractValue()/UpdateXML() in Processing XPath Expressions Lets Remote Authenticated Users Deny Service
8240| [1021714] (Red Hat Issues Fix) mod_auth_mysql Input Validation Flaw Lets Remote Users Inject SQL Commands
8241| [1020858] MySQL Item_bin_string::Item_bin_string() Binary Value Processing Bug Lets Remote Authenticated Users Deny Service
8242| [1019995] MySQL MyISAM Options Let Local Users Overwrite Table Files
8243| [1019085] MySQL Bugs Let Remote Authenticated Users Gain Elevated Privileges and Deny Service
8244| [1019084] MySQL DATA DIRECTORY and INDEX DIRECTORY Options May Let Remote Authenticated Users Gain Elevated Privileges
8245| [1019083] MySQL BINLOG Filename Path Bug May Let Remote Authenticated Users Gain Elevated Privileges
8246| [1019060] MySQL Rename Table Bug Lets Remote Authenticated Users Modify System Table Information
8247| [1018978] MySQL convert_search_mode_to_innobase() Bug Lets Remote Authenticated Users Deny Service
8248| [1018824] Asterisk-Addons Input Validation Flaw in cdr_addon_mysql Lets Remote Users Inject SQL Commands
8249| [1018663] MySQL Table View Access Bug Lets Remote Authenticated Users Gain Elevated Privileges
8250| [1018629] MySQL Authentication Protocol Bug Lets Remote Users Deny Service
8251| [1018071] MySQL ALTER TABLE Function Lets Remote Authenticated Users Obtain Potentially Sensitive Information
8252| [1018070] MySQL SQL SECURITY INVOKER Routines Let Remote Authenticated Users Gain Elevated Privileges
8253| [1018069] MySQL Lets Remote Authenticated Users Issue the RENAME TABLE Command
8254| [1017746] MySQL Single Row Subselect Statements Let Remote Users Deny Service
8255| [1016790] MySQL Replication Error Lets Local Users Deny Service
8256| [1016710] MySQL Case-Sensitive Database Names May Let Users Access Restricted Databases
8257| [1016709] MySQL Error in Checking suid Routine Arguments May Let Users Gain Elevated Privileges
8258| [1016617] MySQL MERGE Access Control Error May Let Users Access a Restricted Table
8259| [1016566] Opsware Network Automation System Discloses MySQL Password to Local Users
8260| [1016216] MySQL Error in Parsing Multibyte Encoded Data in mysql_real_escape() Lets Remote Users Inject SQL Commands
8261| [1016077] Apple MySQL Manager Database Initialization Bug May Let Local Users Access the Database
8262| [1016017] MySQL Anonymous Login Processing May Disclose Some Memory Contents to Remote Users
8263| [1016016] MySQL COM_TABLE_DUMP Processing Lets Remote Authenticated Users Execute Arbitrary Code or Obtain Information
8264| [1015789] Woltlab Burning Board Input Validation Hole in 'class_db_mysql.php' Permits Cross-Site Scripting Attacks
8265| [1015693] MySQL Query Bug Lets Remote Users Bypass Query Logging
8266| [1015603] PAM-MySQL pam_get_item() Double Free May Let Remote Users Execute Arbitrary Code
8267| [1015485] PHP mysqli Extension Error Mode Format String Flaw May Let Users Execute Arbitrary Code
8268| [1014603] MySQL Eventum Input Validation Hole in 'class.auth.php' Permits SQL Injection and Other Input Validation Bugs Permit Cross-Site Scripting Attacks
8269| [1014172] xMySQLadmin Lets Local Users Delete Files
8270| [1013995] MySQL 'mysql_install_db' Uses Unsafe Temporary Files and May Let Local Users Gain Elevated Privilege
8271| [1013994] MySQL Non-existent '--user' Error May Allow the Database to Run With Incorrect Privileges
8272| [1013415] MySQL CREATE FUNCTION Lets Authenticated Users Invoke libc Functions to Execute Arbitrary Code
8273| [1013414] MySQL udf_init() Path Validation Flaw Lets Authenticated Users Execute Arbitrary Libraries
8274| [1013413] MySQL CREATE TEMPORARY TABLE Uses Predictable Temporary Files That May Let Users Gain Elevated Privileges
8275| [1012914] MySQL 'mysqlaccess.sh' Unsafe Temporary Files May Let Local Users Gain Elevated Privileges
8276| [1012893] MySQL MaxDB Buffer Overflow in websql Password Parameter Lets Remote Users Execute Arbitrary Code
8277| [1012500] mysql_auth Memory Leak Has Unspecified Impact
8278| [1011741] MySQL Access Control Error in Databases With Underscore Wildcard Character May Grant Unauthorized Access
8279| [1011606] MySQL May Let Remote Authenticated Users Access Restricted Tables or Crash the System
8280| [1011408] MySQL libmysqlclient Buffer Overflow in Executing Prepared Statements Has Unspecified Impact
8281| [1011376] MySQLGuest Lack of Input Validation Lets Remote Users Conduct Cross-Site Scripting Attacks
8282| [1011008] MySQL Buffer Overflow in mysql_real_connect() May Let Remote Users Execute Arbitrary Code
8283| [1010979] MySQL 'mysqlhotcopy' Unsafe Temporary Files May Let Local Users Gain Elevated Privileges
8284| [1010645] MySQL check_scramble_323() Zero-Length Comparison Lets Remote Users Bypass Authentication
8285| [1009784] MySQL 'mysqld_multi' Temporary File Flaw Lets Local Users Overwrite Files
8286| [1009554] MySQL 'mysqlbug' Temporary File Flaw Lets Local Users Overwrite Files
8287| [1007979] MySQL mysql_change_user() Double Free Error Lets Remote Authenticated Users Crash mysqld
8288| [1007673] MySQL acl_init() Buffer Overflow Permits Remote Authenticated Administrators to Execute Arbitrary Code
8289| [1007518] DWebPro Discloses MySQL Database Password to Local Users
8290| [1007312] MySQL World-Writable Configuration File May Let Local Users Gain Root Privileges
8291| [1006976] MySQL Buffer Overflow in 'mysql_real_connect()' Client Function May Let Remote or Local Users Execute Arbitrary Code
8292| [1005800] MySQL Overflow and Authentication Bugs May Let Remote Users Execute Code or Access Database Accounts
8293| [1005345] MySQL Buffer Overflow Lets Local Users Gain System Privileges on Windows NT
8294| [1004506] vBulletin PHP-based Forum Software Has Unspecified Security Flaw in the 'db_mysql.php' Module
8295| [1004172] PHP-Survey Script Discloses Underlying MySQL Database Username and Password to Remote Users
8296| [1003955] 3rd Party Patch for Cyrus SASL ('auxprop for mysql and ldap') Lets Remote Users Access Protected POP Mail Accounts Without Authentication
8297| [1003290] Conectiva Linux MySQL Distribution May Allow Local Users to Obtain Sensitive Information
8298| [1002993] PurePostPro Script Add-on for PureFTPd and MySQL Allows Remote Users to Execute SQL Commands on the Server
8299| [1002485] WinMySQLadmin Database Administration Tool Discloses MySQL Password to Local Users
8300| [1002324] Vpopmail Mail Server Discloses Database Password to Local Users When Installed with MySQL
8301| [1001411] phpMyAdmin Administration Tool for MySQL Allows Remote Users to Execute Commands on the Server
8302| [1001118] MySQL Database Allows Authorized Users to Modify Server Files to Deny Service or Obtain Additional Access
8303|
8304| OSVDB - http://www.osvdb.org:
8305| [95337] Oracle MySQL Server XA Transactions Subcomponent Unspecified Remote DoS
8306| [95336] Oracle MySQL Server Replication Subcomponent Unspecified Remote DoS
8307| [95335] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
8308| [95334] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue
8309| [95333] Oracle MySQL Server Partition Subcomponent Unspecified Remote DoS
8310| [95332] Oracle MySQL Server Parser Subcomponent Unspecified Remote DoS
8311| [95331] Oracle MySQL Server Options Subcomponent Unspecified Remote DoS (2013-3801)
8312| [95330] Oracle MySQL Server Options Subcomponent Unspecified Remote DoS (2013-3808)
8313| [95329] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2013-3796)
8314| [95328] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2013-3804)
8315| [95327] Oracle MySQL Server Prepared Statements Subcomponent Unspecified Remote DoS
8316| [95326] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
8317| [95325] Oracle MySQL Server Full Text Search Subcomponent Unspecified Remote DoS
8318| [95324] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-3795)
8319| [95323] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-3793)
8320| [95322] Oracle MySQL Server Audit Log Subcomponent Unspecified Remote Issue
8321| [95321] Oracle MySQL Server MemCached Subcomponent Unspecified Remote Issue
8322| [95131] AutoMySQLBackup /usr/sbin/automysqlbackup Database Name Arbitrary Code Injection
8323| [94076] Debian Linux MySQL Server mysql-server-5.5.postinst Race Condition debian.cnf Plaintext Credential Local Disclosure
8324| [93505] Wireshark MySQL Dissector (packet-mysql.c) Malformed Packet Handling Infinite Loop Remote DoS
8325| [93174] MySQL Crafted Derived Table Handling DoS
8326| [92967] MySQL2JSON (mn_mysql2json) Extension for TYPO3 Unspecified SQL Injection
8327| [92950] MySQL Running START SLAVE Statement Process Listing Plaintext Local Password Disclosure
8328| [92485] Oracle MySQL Server Partition Subcomponent Unspecified Local DoS
8329| [92484] Oracle MySQL Server Locking Subcomponent Unspecified Remote DoS (2013-1506)
8330| [92483] Oracle MySQL Server Install Subcomponent Unspecified Local Issue
8331| [92482] Oracle MySQL Server Types Subcomponent Unspecified Remote DoS
8332| [92481] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue (2013-2381)
8333| [92480] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-1566)
8334| [92479] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-1511)
8335| [92478] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-1567)
8336| [92477] Oracle MySQL Server Stored Procedure Subcomponent Unspecified Remote DoS
8337| [92476] Oracle MySQL Server Replication Subcomponent Unspecified Remote DoS
8338| [92475] Oracle MySQL Server Partition Subcomponent Unspecified Remote DoS
8339| [92474] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS
8340| [92473] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-2389)
8341| [92472] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote DoS
8342| [92471] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-1512)
8343| [92470] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-1544)
8344| [92469] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote Issue
8345| [92468] Oracle MySQL Server MemCached Subcomponent Unspecified Remote DoS
8346| [92467] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue (2013-2375)
8347| [92466] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue (2013-1531)
8348| [92465] Oracle MySQL Server Server Subcomponent Unspecified Remote Issue
8349| [92464] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote Issue
8350| [92463] Oracle MySQL Server Locking Subcomponent Unspecified Remote Issue (2013-1521)
8351| [92462] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-2395)
8352| [91536] Oracle MySQL yaSSL Unspecified Overflow (2012-0553)
8353| [91534] Oracle MySQL yaSSL Unspecified Overflow (2013-1492)
8354| [91415] MySQL Raw Geometry Object String Conversion Remote DoS
8355| [91108] Juju mysql Charm Install Script mysql.passwd MySQL Password Plaintext Local Disclosure
8356| [89970] Site Go /site-go/admin/extra/mysql/index.php idm Parameter Traversal Arbitrary File Access
8357| [89265] Oracle MySQL Server Server Privileges Subcomponent Unspecified Remote DoS
8358| [89264] Oracle MySQL Server Server Partition Subcomponent Unspecified Remote DoS
8359| [89263] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-0578)
8360| [89262] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-1705)
8361| [89261] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-0574)
8362| [89260] Oracle MySQL Server MyISAM Subcomponent Unspecified Remote DoS
8363| [89259] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2012-0572)
8364| [89258] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-0368)
8365| [89257] Oracle MySQL Server Server Locking Subcomponent Unspecified Remote DoS
8366| [89256] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-1702)
8367| [89255] Oracle MySQL Server Server Replication Subcomponent Unspecified Remote Issue
8368| [89254] Oracle MySQL Server Server Replication Subcomponent Unspecified Local Issue
8369| [89253] Oracle MySQL Server Stored Procedure Subcomponent Unspecified Remote DoS
8370| [89252] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS
8371| [89251] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote DoS
8372| [89250] Oracle MySQL Server GIS Extension Subcomponent Unspecified Remote DoS
8373| [89042] ViciBox Server MySQL cron Service Default Credentials
8374| [88415] Oracle MySQL Server COM_CHANGE_USER Account Password Brute-Force Weakness
8375| [88118] Oracle MySQL Server FILE Privilege Database Privilege Escalation
8376| [88067] Oracle MySQL Server Authentication Error Message User Enumeration
8377| [88066] Oracle MySQL Server for Linux Access Rights Checking Routine Database Name Handling Stack Buffer Overflow
8378| [88065] Oracle MySQL Server COM_BINLOG_DUMP Invalid Data Handling DoS
8379| [88064] Oracle MySQL Server Multiple-Table DELETE Heap Buffer Overflow
8380| [87704] CodeIgniter MySQL / MySQLi Driver Database Client Multi-byte Character Set Unspecified SQL Injection
8381| [87507] Oracle MySQL Statement Logging Multiple Log Plaintext Local Password Disclosure
8382| [87501] Oracle MySQL optimizer_switch Malformed Value Processing Local DoS
8383| [87494] Oracle MySQL on Windows Field_new_decimal::store_value dbug_buff Variable Overflow DoS
8384| [87480] MySQL Malformed XML Comment Handling DoS
8385| [87466] MySQL SSL Certificate Revocation Weakness
8386| [87356] Oracle MySQL do_div_mod DIV Expression Handling Remote DoS
8387| [87355] Oracle MySQL handler::pushed_cond Table Cache Handling mysqld DoS
8388| [87354] Oracle MySQL Polygon Union / Intersection Spatial Operations DoS
8389| [86273] Oracle MySQL Server Server Installation Subcomponent Unspecified Local Information Disclosure
8390| [86272] Oracle MySQL Server Server Replication Subcomponent Unspecified Remote DoS
8391| [86271] Oracle MySQL Server Server Full Text Search Subcomponent Unspecified Remote DoS
8392| [86270] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-3156)
8393| [86269] Oracle MySQL Server MySQL Client Subcomponent Unspecified Remote Information Disclosure
8394| [86268] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-3180)
8395| [86267] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-3150)
8396| [86266] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-3144)
8397| [86265] Oracle MySQL Server InnoDB Plugin Subcomponent Unspecified Remote DoS
8398| [86264] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
8399| [86263] Oracle MySQL Server MySQL Client Subcomponent Unspecified Remote Issue
8400| [86262] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-3177)
8401| [86261] Oracle MySQL Server Protocol Subcomponent Unspecified Remote Issue
8402| [86260] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote Code Execution
8403| [86175] Oracle MySQL on Windows Path Subversion Arbitrary DLL Injection Code Execution
8404| [85155] Icinga module/idoutils/db/scripts/create_mysqldb.sh Icinga User Database Access Restriction Bypass
8405| [84755] Oracle MySQL Sort Order Index Calculation Remote DoS
8406| [84719] MySQLDumper index.php page Parameter XSS
8407| [84680] MySQL Squid Access Report access.log File Path XSS
8408| [83980] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2012-1689)
8409| [83979] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2012-1734)
8410| [83978] Oracle MySQL Server Subcomponent Unspecified Remote DoS
8411| [83977] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
8412| [83976] Oracle MySQL Server GIS Extension Subcomponent Unspecified Remote DoS
8413| [83975] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2012-1735)
8414| [83661] Oracle MySQL Unspecified Issue (59533)
8415| [82804] Oracle MySQL Authentication Protocol Token Comparison Casting Failure Password Bypass
8416| [82803] Oracle MySQL Unspecified Issue (59387)
8417| [82120] Oracle MySQL Version Specific Comment Handling Arbitrary SQL Command Execution
8418| [81897] Viscacha classes/database/mysql.inc.php Multiple Parameter SQL Injection
8419| [81616] MySQLDumper Multiple Script Direct Request Information Disclosure
8420| [81615] MySQLDumper filemanagement.php f Parameter Traversal Arbitrary File Access
8421| [81614] MySQLDumper File Upload PHP Code Execution
8422| [81613] MySQLDumper main.php Multiple Function CSRF
8423| [81612] MySQLDumper restore.php filename Parameter XSS
8424| [81611] MySQLDumper sql.php Multiple Parameter XSS
8425| [81610] MySQLDumper install.php Multiple Parameter XSS
8426| [81609] MySQLDumper install.php language Parameter Traversal Arbitrary File Access
8427| [81378] Oracle MySQL Server Server Optimizer Component Unspecified Remote DoS (2012-1690)
8428| [81377] Oracle MySQL Server Server Optimizer Component Unspecified Remote DoS (2012-1696)
8429| [81376] Oracle MySQL Server Server DML Component Unspecified Remote DoS
8430| [81375] Oracle MySQL Server Partition Component Unspecified Remote DoS
8431| [81374] Oracle MySQL Server MyISAM Component Unspecified Remote DoS
8432| [81373] Oracle MySQL Server Server Optimizer Component Unspecified Remote DoS (2012-1703)
8433| [81059] Oracle MySQL Server Multiple Unspecified Issues
8434| [79038] Webmin Process Listing MySQL Password Local Disclosure
8435| [78919] Oracle MySQL Unspecified Pre-authentication Remote Code Execution
8436| [78710] WordPress wp-admin/setup-config.php MySQL Query Saturation Brute-Force Proxy Weakness
8437| [78708] WordPress wp-admin/setup-config.php MySQL Database Verification Code Injection Weakness
8438| [78707] WordPress wp-admin/setup-config.php MySQL Credentials Error Message Brute-Force Weakness
8439| [78394] Oracle MySQL Server Unspecified Remote DoS (2012-0493)
8440| [78393] Oracle MySQL Server Unspecified Remote DoS (2012-0492)
8441| [78392] Oracle MySQL Server Unspecified Remote DoS (2012-0117)
8442| [78391] Oracle MySQL Server Unspecified Remote DoS (2012-0112)
8443| [78390] Oracle MySQL Server Unspecified Remote DoS (2012-0495)
8444| [78389] Oracle MySQL Server Unspecified Remote DoS (2012-0491)
8445| [78388] Oracle MySQL Server Unspecified Remote DoS (2012-0490)
8446| [78387] Oracle MySQL Server Unspecified Remote DoS (2012-0489)
8447| [78386] Oracle MySQL Server Unspecified Remote DoS (2012-0488)
8448| [78385] Oracle MySQL Server Unspecified Remote DoS (2012-0487)
8449| [78384] Oracle MySQL Server Unspecified Remote DoS (2012-0486)
8450| [78383] Oracle MySQL Server Unspecified Remote DoS (2012-0485)
8451| [78382] Oracle MySQL Server Unspecified Remote DoS (2012-0120)
8452| [78381] Oracle MySQL Server Unspecified Remote DoS (2012-0119)
8453| [78380] Oracle MySQL Server Unspecified Remote DoS (2012-0115)
8454| [78379] Oracle MySQL Server Unspecified Remote DoS (2012-0102)
8455| [78378] Oracle MySQL Server Unspecified Remote DoS (2012-0101)
8456| [78377] Oracle MySQL Server Unspecified Remote DoS (2012-0087)
8457| [78376] Oracle MySQL Server Unspecified Remote DoS (2011-2262)
8458| [78375] Oracle MySQL Server Unspecified Local DoS
8459| [78374] Oracle MySQL Server Unspecified Remote Issue (2012-0075)
8460| [78373] Oracle MySQL Server Unspecified Local Issue
8461| [78372] Oracle MySQL Server Unspecified Remote Information Disclosure
8462| [78371] Oracle MySQL Server Unspecified Remote Issue (2012-0496)
8463| [78370] Oracle MySQL Server Unspecified Remote Issue (2012-0118)
8464| [78369] Oracle MySQL Server Unspecified Remote Issue (2012-0116)
8465| [78368] Oracle MySQL Server Unspecified Remote Issue (2012-0113)
8466| [78283] Oracle MySQL NULL Pointer Dereference Packet Parsing Remote DoS
8467| [77042] e107 CMS install_.php MySQL Server Name Parsing Remote PHP Code Execution
8468| [77040] DBD::mysqlPP Unspecified SQL Injection
8469| [75888] TaskFreak! multi-mysql Multiple Script Direct Request Path Disclosure
8470| [74120] Apache HTTP Server mod_authnz_external mysql/mysql-auth.pl user Field SQL Injection
8471| [73555] Prosody MySQL Value Column Invalid Data Type Handling DoS
8472| [73387] Zend Framework PDO_MySql Character Set Security Bypass
8473| [72836] Arctic Fox CMS Multiple Script Direct Request MySQL Settings Disclosure
8474| [72660] MySQL GUI Tools Administrator / Query Browser Command Line Credentials Local Disclosure
8475| [72120] DirectAdmin mysql_backups Folder MySQL Database Backup Local Disclosure
8476| [71368] Accellion File Transfer Appliance Weak MySQL root Password
8477| [70967] MySQL Eventum Admin User Creation CSRF
8478| [70966] MySQL Eventum preferences.php full_name Parameter XSS
8479| [70961] MySQL Eventum list.php Multiple Parameter XSS
8480| [70960] MySQL Eventum forgot_password.php URI XSS
8481| [70947] PyWebDAV DAVServer/mysqlauth.py get_userinfo() Multiple Parameter SQL Injection
8482| [70610] PHP MySQLi Extension set_magic_quotes_runtime Function mysqli_fetch_assoc Function Interaction Weakness
8483| [69885] SilverStripe modules/sapphire/trunk/core/model/MySQLDatabase.php showqueries Parameter SQL Command Disclosure
8484| [69395] MySQL Derived Table Grouping DoS
8485| [69394] MySQL Temporary Table Expression Re-Evaluation DoS
8486| [69393] MySQL GROUP_CONCAT() WITH ROLLUP Modifier DoS
8487| [69392] MySQL Extreme-Value Functions Mixed Arguments DoS
8488| [69391] MySQL Stored Procedures / Prepared Statements Nested Joins DoS
8489| [69390] MySQL Extreme-Value Functions Argument Parsing Type Error DoS
8490| [69389] MySQL CONVERT_TZ() Function Empty SET Column DoS
8491| [69388] MySQL InnoDB Storage Engine Table Handling Overflow
8492| [69387] MySQL LIKE Predicates Pre-Evaluation DoS
8493| [69001] MySQL PolyFromWKB() Function WKB Data Remote DoS
8494| [69000] MySQL HANDLER Interface Unspecified READ Request DoS
8495| [68997] MySQL Prepared-Statement Mode EXPLAIN DoS
8496| [68996] MySQL EXPLAIN EXTENDED Statement DoS
8497| [68995] MySQL GeometryCollection non-Geometry Value Assignment DoS
8498| [67488] phpMyAdmin libraries/dbi/mysqli.dbi.lib.php Unspecified Parameter XSS
8499| [67487] phpMyAdmin libraries/dbi/mysql.dbi.lib.php Unspecified Parameter XSS
8500| [67421] PHP Mysqlnd Extension mysqlnd_wireprotocol.c php_mysqlnd_rset_header_read Function Overflow
8501| [67420] PHP Mysqlnd Extension mysqlnd_wireprotocol.c php_mysqlnd_ok_read Function Arbitrary Memory Content Disclosure
8502| [67419] PHP Mysqlnd Extension php_mysqlnd_read_error_from_line Function Negative Buffer Length Value Overflow
8503| [67418] PHP Mysqlnd Extension php_mysqlnd_auth_write Function Multiple Overflows
8504| [67384] MySQL LOAD DATA INFILE Statement Incorrect OK Packet DoS
8505| [67383] MySQL EXPLAIN Statement Item_singlerow_subselect::store Function NULL Dereference DoS
8506| [67381] MySQL InnoDB Temporary Table Handling DoS
8507| [67380] MySQL BINLOG Statement Unspecified Argument DoS
8508| [67379] MySQL Multiple Operation NULL Argument Handling DoS
8509| [67378] MySQL Unique SET Column Join Statement Remote DoS
8510| [67377] MySQL DDL Statement Multiple Configuration Parameter DoS
8511| [66800] PHP Multiple mysqlnd_* Function Unspecified Overflow
8512| [66799] PHP mysqlnd Error Packet Handling Multiple Overflows
8513| [66731] PHP Bundled MySQL Library Unspecified Issue
8514| [66665] PHP MySQL LOAD DATA LOCAL open_basedir Bypass
8515| [65851] MySQL ALTER DATABASE #mysql50# Prefix Handling DoS
8516| [65450] phpGraphy mysql_cleanup.php include_path Parameter Remote File Inclusion
8517| [65085] MySQL Enterprise Monitor Unspecified CSRF
8518| [64843] MySQL DROP TABLE Command Symlink MyISAM Table Local Data Deletion
8519| [64588] MySQL sql/net_serv.cc my_net_skip_rest Function Large Packet Handling Remote DoS
8520| [64587] MySQL COM_FIELD_LIST Command Packet Table Name Argument Overflow
8521| [64586] MySQL COM_FIELD_LIST Command Packet Authentication Bypass
8522| [64524] Advanced Poll misc/get_admin.php mysql_host Parameter XSS
8523| [64447] Tirzen Framework (TZN) tzn_mysql.php Username Parameter SQL Injection Authentication Bypass
8524| [64320] ClanSphere MySQL Driver s_email Parameter SQL Injection
8525| [63903] MySQL sql/sql_plugin.cc mysql_uninstall_plugin Function UNINSTALL PLUGIN Command Privilege Check Weakness
8526| [63115] Quicksilver Forums mysqldump Process List Database Password Disclosure
8527| [62830] Employee Timeclock Software mysqldump Command-line Database Password Disclosure
8528| [62640] PHP mysqli_real_escape_string() Function Error Message Path Disclosure
8529| [62216] Flex MySQL Connector ActionScript SQL Query Arbitrary Code Execution
8530| [61752] kiddog_mysqldumper Extension for TYPO3 Unspecified Information Disclosure
8531| [61497] microTopic admin/mysql.php rating Parameter SQL Injection
8532| [60665] MySQL CREATE TABLE MyISAM Table mysql_unpacked_real_data_home Local Restriction Bypass
8533| [60664] MySQL sql/sql_table.cc Data Home Directory Symlink CREATE TABLE Access Restriction Bypass
8534| [60516] RADIO istek scripti estafresgaftesantusyan.inc Direct Request MySQL Database Credentials Disclosure
8535| [60489] MySQL GeomFromWKB() Function First Argument Geometry Value Handling DoS
8536| [60488] MySQL SELECT Statement WHERE Clause Sub-query DoS
8537| [60487] MySQL vio_verify_callback() Function Crafted Certificate MiTM Weakness
8538| [60356] MySql Client Library (libmysqlclient) mysql_real_connect Function Local Overflow
8539| [59907] MySQL on Windows bind-address Remote Connection Weakness
8540| [59906] MySQL on Windows Default Configuration Logging Weakness
8541| [59616] MySQL Hashed Password Weakness
8542| [59609] Suckbot mod_mysql_logger Shared Object Unspecified Remote DoS
8543| [59495] Cyrus SASL LDAP / MySQL Authentication Patch password Field SQL Injection Authentication Bypass
8544| [59062] phpMyAdmin Extension for TYPO3 MySQL Table Name Unspecified XSS
8545| [59045] phpMyAdmin Crafted MYSQL Table Name XSS
8546| [59030] mysql-ocaml for MySQL mysql_real_escape_string() Function Character Escaping Weakness
8547| [57587] Zmanda Recovery Manager for MySQL socket-server.pl system() Function Local Privilege Escalation
8548| [57586] Zmanda Recovery Manager for MySQL socket-server.pl system() Function Remote Shell Command Execution
8549| [56741] MySQL Connector/J Unicode w/ SJIS/Windows-31J Charset SQL Injection
8550| [56134] Virtualmin MySQL Module Execute SQL Feature Arbitrary File Access
8551| [55734] MySQL sql_parse.cc dispatch_command() Function Format String DoS
8552| [55566] MySQL Connector/NET SSL Certificate Verification Weakness
8553| [53525] MyBlog /config/mysqlconnection.inc Direct Request Information Disclosure
8554| [53524] blog+ includes/window_top.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
8555| [53523] blog+ includes/block_center_down.php row_mysql_blocks_center_down[file] Parameter Traversal Local File Inclusion
8556| [53522] blog+ includes/block_center_top.php row_mysql_blocks_center_top[file] Parameter Traversal Local File Inclusion
8557| [53521] blog+ includes/block_left.php row_mysql_blocks_left[file] Parameter Traversal Local File Inclusion
8558| [53520] blog+ includes/block_right.php row_mysql_blocks_right[file] Parameter Traversal Local File Inclusion
8559| [53519] blog+ includes/window_down.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
8560| [53366] GEDCOM_TO_MYSQL php/info.php Multiple Parameter XSS
8561| [53365] GEDCOM_TO_MYSQL php/index.php nom_branche Parameter XSS
8562| [53364] GEDCOM_TO_MYSQL php/prenom.php Multiple Parameter XSS
8563| [53360] Blogplus includes/window_top.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
8564| [53359] Blogplus includes/window_down.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
8565| [53358] Blogplus includes/block_right.php row_mysql_blocks_right[file] Parameter Traversal Local File Inclusion
8566| [53357] Blogplus includes/block_left.php row_mysql_blocks_left[file] Parameter Traversal Local File Inclusion
8567| [53356] Blogplus block_center_top.php row_mysql_blocks_center_top[file] Parameter Traversal Local File Inclusion
8568| [53355] Blogplus includes/block_center_down.php row_mysql_blocks_center_down[file] Parameter Traversal Local File Inclusion
8569| [53110] XOOPS Cube Legacy ErrorHandler::show() Function MySQL Error Message XSS
8570| [52729] Asterisk-addon cdr_addon_mysql.c Call Detail Record SQL Injection
8571| [52728] Tribox cdr_addon_mysql.c Call Detail Record XSS
8572| [52727] FreePBX cdr_addon_mysql.c Call Detail Record XSS
8573| [52726] Areski cdr_addon_mysql.c Call Detail Record XSS
8574| [52464] MySQL charset Column Truncation Weakness
8575| [52453] MySQL sql/item_xmlfunc.cc ExtractValue() / UpdateXML() Functions Scalar XPath DoS
8576| [52378] Cisco ANM MySQL root Account Default Password
8577| [52264] Broadcast Machine MySQLController.php controllers/baseDir Parameter Remote File Inclusion
8578| [51923] Apache HTTP Server mod-auth-mysql Module mod_auth_mysql.c Multibyte Character Encoding SQL Injection
8579| [51171] MySQL InnoDB convert_search_mode_to_innobase Function DoS
8580| [50892] MySQL Calendar index.php username Parameter SQL Injection
8581| [50827] Nodstrum MySQL Calendar nodstrumCalendarV2 Cookie Manipulation Admin Authentication Bypass
8582| [49875] PromoteWeb MySQL go.php id Parameter SQL Injection
8583| [48710] MySQL Command Line Client HTML Output XSS
8584| [48709] MySQL Quick Admin actions.php lang Parameter Traversal Local File Inclusion
8585| [48708] MySQL Quick Admin index.php language Cookie Traversal Local File Inclusion
8586| [48021] MySQL Empty Bit-String Literal Token SQL Statement DoS
8587| [47789] mysql-lists Unspecified XSS
8588| [47394] Keld PHP-MySQL News Script login.php username Parameter SQL Injection
8589| [45073] MySQLDumper Extension for TYPO3 Unspecified Authentication Bypass
8590| [44937] MySQL MyISAM Table CREATE TABLE Privilege Check Bypass
8591| [44138] Debian GNU/Linux libdspam7-drv-mysql Cron MySQL dspam Database Password Local Disclosure
8592| [44071] Phorum /include/db/mysql.php Unspecified Search SQL Injection
8593| [43180] MySQL sql_select.cc INFORMATION_SCHEMA Table Crafted Query Remote DoS
8594| [43179] MySQL Server BINLOG Statement Rights Checking Failure
8595| [42610] MySQL DEFINER View Value Crafted Statements Remote Privilege Escalation
8596| [42609] MySQL Federated Engine SHOW TABLE STATUS Query Remote DoS
8597| [42608] MySQL RENAME TABLE Symlink System Table Overwrite
8598| [42607] MySQL Multiple table-level DIRECTORY Remote Privilege Escalation
8599| [42460] MySQLDumper HTTP POST Request Remote Authentication Bypass
8600| [42423] AdventNet EventLog Analyzer MySQL Installation Default root Account
8601| [41861] Bacula make_catalog_backup Function MySQL Director Password Cleartext Disclosure
8602| [40232] PHP MySQL Banner Exchange inc/lib.inc Direct Request Database Disclosure
8603| [40188] Password Manager Pro (PMP) mysql Unspecified Remote Command Injection
8604| [39279] PHP mysql_error() Function XSS
8605| [39145] aurora framework db_mysql.lib pack_var() value Parameter SQL Injection
8606| [38567] NetClassifieds Mysql_db.php Halt_On_Error Setting Error Message Path Disclosure
8607| [38112] Excel Parser Pro sample/xls2mysql parser_path Parameter Remote File Inclusion
8608| [37880] Asterisk-Addons source/destination Numbers cdr_addon_mysql Module SQL Injection
8609| [37784] PHP MySQL Extension Multiple Function Security Restriction Bypass
8610| [37783] MySQL Community Server CREATE TABLE LIKE Table Structure Disclosure
8611| [37782] MySQL Community Server External Table View Privilege Escalation
8612| [37781] MySQL ALTER TABLE Information Disclosure
8613| [37539] GPL PHP Board db.mysql.inc.php root_path Parameter Remote File Inclusion
8614| [37195] Eve-Nuke Module for PHP-Nuke db/mysql.php phpbb_root_path
8615| [37015] paBugs class.mysql.php path_to_bt_dir Parameter Remote File Inclusion
8616| [36868] PHP MySQLi Extension LOCAL INFILE Operation Security Restriction Bypass
8617| [36867] PHP MySQL Extension LOCAL INFILE Operation Security Restriction Bypass
8618| [36771] InterWorx-CP SiteWorx mysql.php PATH_INFO Parameter XSS
8619| [36757] InterWorx-CP NodeWorx mysql.php PATH_INFO Parameter XSS
8620| [36732] MySQL Community Server Connection Protocol Malformed Password Packet Remote DoS
8621| [36251] Associated Press (AP) Newspower Default MySQL root Password
8622| [35168] Study Planner (Studiewijzer) db/mysql/db.inc.php SPL_CFG[dirroot] Parameter Remote File Inclusion
8623| [35037] Fantastico for cPanel includes/mysqlconfig.php fantasticopath Parameter Traversal Local File Inclusion
8624| [34780] Backup Manager Command Line Cleartext MySQL Password Disclosure
8625| [34766] MySQL RENAME TABLE Statement Arbitrary Table Name Modification
8626| [34765] MySQL mysql_change_db Function THD::db_access Privilege Escalation
8627| [34734] MySQL Crafted IF Clause Divide-by-zero NULL Dereference DoS
8628| [34038] MySQL Commander ressourcen/dbopen.php home Parameter Remote File Inclusion
8629| [33974] MySQL information_schema Table Subselect Single-Row DoS
8630| [33678] MySQLNewsEngine affichearticles.php3 newsenginedir Parameter Remote File Inclusion
8631| [33447] WGS-PPC (PPC Search Engine) config/mysql_config.php INC Parameter Remote File Inclusion
8632| [33372] deV!L'z Clanportal inc/filebrowser/browser.php MySQL Data Disclosure
8633| [33147] ActiveCalendar data/mysqlevents.php css Parameter XSS
8634| [32784] Storystream mysqli.php baseDir Parameter Remote File Inclusion
8635| [32783] Storystream mysql.php baseDir Parameter Remote File Inclusion
8636| [32421] Contenido CMS conlib/db_mysqli.inc Direct Request Path Disclosure
8637| [32272] JevonCMS /phplib/db_mysql.inc Direct Request Path Disclosure
8638| [32171] Blue Magic Board db_mysql_error.php Direct Request Path Disclosure
8639| [32056] BTSaveMySql Direct Request Config File Disclosure
8640| [32044] cPanel WebHost Manager (WHM) scripts/passwdmysql password Parameter XSS
8641| [32024] TikiWiki tiki-wiki_rss.php ver MySQL Credential Disclosure
8642| [31963] Agora MysqlfinderAdmin.php _SESSION[PATH_COMPOSANT] Parameter Remote File Inclusion
8643| [31431] ZoomStats libs/dbmax/mysql.php GLOBALS[lib][db][path] Parameter Remote File Inclusion
8644| [30172] TikiWiki Multiple Script Empty sort_mode Parameter MySQL Authentication Credential Disclosure
8645| [29696] MySQLDumper sql.php db Parameter XSS
8646| [29453] ConPresso CMS db_mysql.inc.php msg Parameter XSS
8647| [29122] cPanel mysqladmin/hooksadmin Unspecified Privilege Escalation
8648| [28296] MySQL Crafted multiupdate / subselects Query Local DoS
8649| [28288] MySQL Instance_options::complete_initialization Function Overflow
8650| [28030] Tutti Nova class.novaRead.mysql.php TNLIB_DIR Parameter Remote File Inclusion
8651| [28029] Tutti Nova class.novaAdmin.mysql.php TNLIB_DIR Parameter Remote File Inclusion
8652| [28028] Tutti Nova class.novaEdit.mysql.php TNLIB_DIR Parameter Remote File Inclusion
8653| [28013] MySQL SUID Routine Miscalculation Arbitrary DML Statement Execution
8654| [28012] MySQL Case Sensitivity Unauthorized Database Creation
8655| [27919] MySQL VIEW Access information_schema.views Information Disclosure
8656| [27703] MySQL MERGE Table Privilege Persistence
8657| [27593] Drupal database.mysqli.inc Multiple Parameter SQL Injection
8658| [27549] Opsware NAS /etc/init.d/mysqll MySQL root Cleartext Password Local Disclosure
8659| [27416] MySQL Server time.cc date_format Function Format String
8660| [27054] MySQL mysqld str_to_date Function NULL Argument DoS
8661| [26923] PHP/MySQL Classifieds (PHP Classifieds) search.php rate Parameter SQL Injection
8662| [26922] PHP/MySQL Classifieds (PHP Classifieds) AddAsset1.php Multiple Field XSS
8663| [26822] Bee-hive Lite include/listall.inc.php mysqlcall Parameter Remote File Inclusion
8664| [26821] Bee-hive Lite conad/include/mysqlCall.inc.php config Parameter Remote File Inclusion
8665| [26820] Bee-hive Lite conad/logout.inc.php mysqlCall Parameter Remote File Inclusion
8666| [26819] Bee-hive Lite conad/login.inc.php mysqlCall Parameter Remote File Inclusion
8667| [26818] Bee-hive Lite conad/checkPasswd.inc.php mysqlCall Parameter Remote File Inclusion
8668| [26817] Bee-hive Lite conad/changeUserDetails.inc.php mysqlCall Parameter Remote File Inclusion
8669| [26816] Bee-hive Lite conad/changeEmail.inc.php mysqlCall Parameter Remote File Inclusion
8670| [26125] Open Searchable Image Catalogue core.php do_mysql_query Function Error Message XSS
8671| [26123] Open Searchable Image Catalogue core.php do_mysql_query Function SQL Injection
8672| [25987] MySQL Multibyte Encoding SQL Injection Filter Bypass
8673| [25908] Drupal database.mysql.inc Multiple Parameter SQL Injection
8674| [25595] Apple Mac OS X MySQL Manager Blank root Password
8675| [25228] MySQL Crafted COM_TABLE_DUMP Request Arbitrary Memory Disclosure
8676| [25227] MySQL COM_TABLE_DUMP Packet Overflow
8677| [25226] MySQL Malformed Login Packet Remote Memory Disclosure
8678| [24245] Cholod Mysql Based Message Board Unspecified XSS
8679| [24244] Cholod Mysql Based Message Board mb.cgi showmessage Action SQL Injection
8680| [23963] WoltLab Burning Board class_db_mysql.php SQL Error Message XSS
8681| [23915] Netcool/NeuSecure MySQL Database Connection Restriction Bypass
8682| [23611] Aztek Forum index.php msg Variable Forced MySQL Error Information Disclosure
8683| [23526] MySQL Query NULL Charcter Logging Bypass
8684| [23157] PHP/MYSQL Timesheet changehrs.php Multiple Parameter SQL Injection
8685| [23156] PHP/MYSQL Timesheet index.php Multiple Parameter SQL Injection
8686| [22995] PAM-MySQL Authentication pam_get_item() Function Unspecified Privilege Escalation
8687| [22994] PAM-MySQL SQL Logging Facility Segfault DoS
8688| [22485] Recruitment Software admin/site.xml MySQL Authentication Credential Disclosure
8689| [22479] PHP mysqli Extension Error Message Format String
8690| [22232] PHP Pipe Variable mysql_connect() Function Overflow
8691| [21685] MySQL Auction Search Module keyword XSS
8692| [20698] Campsite notifyendsubs Cron MySQL Password Cleartext Remote Disclosure
8693| [20145] Proofpoint Protection Server Embedded MySQL Server Unpassworded root Account
8694| [19457] aMember Pro mysql.inc.php Remote File Inclusion
8695| [19377] MAXdev MD-Pro /MySQL_Tools/admin.php Path Disclosure
8696| [18899] MySQL UDF Library Arbitrary Function Load Privilege Escalation
8697| [18898] MySQL UDF LoadLibraryEx Function Nonexistent Library Load DoS
8698| [18897] MySQL on Windows UDF Create Function Traversal Privilege Escalation
8699| [18896] MySQL User-Defined Function init_syms() Function Overflow
8700| [18895] MySQL libmysqlclient.so host Parameter Remote Overflow
8701| [18894] MySQL drop database Request Remote Overflow
8702| [18622] FunkBoard mysql_install.php Email Field Arbitrary PHP Code Injection
8703| [18620] FunkBoard mysql_install.php Admin/Database Password Manipulation
8704| [18406] MySQL Eventum releases.php SQL Injection
8705| [18405] MySQL Eventum custom_fields_graph.php SQL Injection
8706| [18404] MySQL Eventum custom_fields.php SQL Injection
8707| [18403] MySQL Eventum login.php email Parameter SQL Injection Authentication Bypass
8708| [18402] MySQL Eventum get_jsrs_data.php F Parameter XSS
8709| [18401] MySQL Eventum list.php release Parameter XSS
8710| [18400] MySQL Eventum view.php id Parameter XSS
8711| [18173] MySQL on Windows USE Command MS-DOS Device Name DoS
8712| [17801] Bugzilla MySQL Replication Race Condition Information Disclosure
8713| [17223] xMySQLadmin Symlink Arbitrary File Deletion
8714| [16727] MySQL Nonexistent '--user' Error Incorrect Privilege Database Invocation
8715| [16689] MySQL mysql_install_db Symlink Arbitrary File Overwrite
8716| [16056] Plans Unspecified mySQL Remote Password Disclosure
8717| [15993] MySQL MaxDB Webtool Remote getIfHeader() WebDAV Function Remote Overflow
8718| [15817] MySQL MaxDB Web Tool getLockTokenHeader() Function Remote Overflow
8719| [15816] MySQL MaxDB Web Administration Service Malformed GET Request Overflow
8720| [15451] paNews auth.php mysql_prefix Parameter SQL Injection
8721| [14748] MySQL MS-DOS Device Names Request DoS
8722| [14678] MySQL CREATE FUNCTION Arbitrary libc Code Execution
8723| [14677] MySQL CREATE FUNCTION mysql.func Table Arbitrary Library Injection
8724| [14676] MySQL CREATE TEMPORARY TABLE Symlink Privilege Escalation
8725| [14386] phpMyAdmin mysqli.dbi.lib.php Path Disclosure
8726| [14052] Symantec Brightmail AntiSpam Multiple Default MySQL Accounts
8727| [13086] MySQL MaxDB Web Agent Malformed HTTP Header DoS
8728| [13085] MySQL MaxDB Web Agent WebDAV sapdbwa_GetUserData() Function Remote DoS
8729| [13013] MySQL mysqlaccess.sh Symlink Arbitrary File Manipulation
8730| [12919] MySQL MaxDB WebAgent websql Remote Overflow
8731| [12779] MySQL User Defined Function Privilege Escalation
8732| [12609] MySQL Eventum projects.php Multiple Parameter XSS
8733| [12608] MySQL Eventum preferences.php Multiple Parameter XSS
8734| [12607] MySQL Eventum forgot_password.php email Parameter XSS
8735| [12606] MySQL Eventum index.php email Parameter XSS
8736| [12605] MySQL Eventum Default Vendor Account
8737| [12275] MySQL MaxDB Web Tools wahttp Nonexistent File Request DoS
8738| [12274] MySQL MaxDB Web Tools WebDAV Handler Remote Overflow
8739| [11689] Roxen Web Server MySQL Socket Permission Weakness
8740| [10985] MySQL MATCH..AGAINST Query DoS
8741| [10959] MySQL GRANT ALL ON Privilege Escalation
8742| [10660] MySQL ALTER TABLE/RENAME Forces Old Permission Checks
8743| [10659] MySQL ALTER MERGE Tables to Change the UNION DoS
8744| [10658] MySQL mysql_real_connect() Function Remote Overflow
8745| [10532] MySQL MaxDB webdbm Server Field DoS
8746| [10491] AWS MySQLguest AWSguest.php Script Insertion
8747| [10244] MySQL libmysqlclient Prepared Statements API Overflow
8748| [10226] MySQLGuest AWSguest.php Multiple Field XSS
8749| [9912] PHP safe_mode MySQL Database Access Restriction Bypass
8750| [9911] Inter7 vpopmail MySQL Module Authentication Credential Disclosure
8751| [9910] MySQL mysql_change_user() Double-free Memory Pointer DoS
8752| [9909] MySQL datadir/my.cnf Modification Privilege Escalation
8753| [9908] MySQL my.ini Initialization File datadir Parameter Overflow
8754| [9907] MySQL SELECT Statement String Handling Overflow
8755| [9906] MySQL GRANT Privilege Arbitrary Password Modification
8756| [9509] teapop MySQL Authentication Module SQL Injection
8757| [9018] MySQL Backup Pro getbackup() Method Unspecified Issue
8758| [9015] MySQL mysqlhotcopy Insecure Temporary File Creation
8759| [8997] Cacti config.php MySQL Authentication Credential Cleartext Disclosure
8760| [8979] MySQL SHOW GRANTS Encrypted Password Disclosure
8761| [8889] MySQL COM_TABLE_DUMP Package Negative Integer DoS
8762| [8888] MySQL COM_CHANGE_USER Command Long Repsonse Overflow
8763| [8887] MySQL COM_CHANGE_USER Command One Character Password Brute Force
8764| [8886] MySQL libmysqlclient Library read_one_row Overflow
8765| [8885] MySQL libmysqlclient Library read_rows Overflow
8766| [7476] MySQL Protocol 4.1 Authentication Scramble String Overflow
8767| [7475] MySQL Zero-length Scrambled String Crafted Packet Authentication Bypass
8768| [7245] MySQL Pluggable Authentication Module (pam_mysql) Password Disclosure
8769| [7128] MySQL show database Database Name Exposure
8770| [6716] MySQL Database Engine Weak Authentication Information Disclosure
8771| [6605] MySQL mysqld Readable Log File Information Disclosure
8772| [6443] PowerPhlogger db_dump.php View Arbitrary mySQL Dump
8773| [6421] MySQL mysqld_multi Symlink Arbitrary File Overwrite
8774| [6420] MySQL mysqlbug Symlink Arbitrary File Overwrite
8775| [2537] MySQL sql_acl.cc get_salt_from_password Function Password Handling Remote Overflow
8776| [2144] WinMySQLadmin my.ini Cleartext Password Disclosure
8777| [653] PCCS-Linux MySQL Database Admin Tool Authentication Credential Disclosure
8778| [520] MySQL Database Name Traversal Arbitrary File Modification
8779| [380] MySQL Server on Windows Default Null Root Password
8780| [261] MySQL Short Check String Authentication Bypass
8781|_
8782Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
8783Aggressive OS guesses: Linux 3.8 (95%), Linux 2.6.32 (95%), Linux 2.6.32 - 3.10 (95%), Linux 2.6.32 - 3.13 (95%), Linux 2.6.32 - 3.9 (95%), Linux 3.2 (95%), Linux 2.6.32 - 3.1 (94%), Linux 3.5 (94%), Linux 3.1 (94%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%)
8784No exact OS matches for host (test conditions non-ideal).
8785Uptime guess: 42.532 days (since Thu Dec 5 01:00:40 2019)
8786Network Distance: 18 hops
8787TCP Sequence Prediction: Difficulty=265 (Good luck!)
8788IP ID Sequence Generation: All zeros
8789
8790TRACEROUTE (using port 3306/tcp)
8791HOP RTT ADDRESS
87921 71.34 ms 10.252.204.1
87932 102.03 ms 104.245.145.177
87943 102.08 ms te0-1-1-9.219.ccr32.yyz02.atlas.cogentco.com (38.104.158.113)
87954 102.12 ms be3435.ccr31.yyz02.atlas.cogentco.com (154.54.85.57)
87965 102.12 ms te0-9-0-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.141)
87976 102.18 ms ix-ae-16-0.tcore1.tnk-toronto.as6453.net (64.86.33.98)
87987 214.87 ms if-ae-2-2.tcore2.tnk-toronto.as6453.net (64.86.33.90)
87998 259.89 ms if-ae-26-2.tcore2.nto-new-york.as6453.net (216.6.81.28)
88009 259.84 ms if-ae-2-39.tcore2.l78-london.as6453.net (80.231.131.17)
880110 259.83 ms if-ae-15-2.tcore2.l78-london.as6453.net (80.231.131.117)
880211 259.90 ms if-ae-14-2.tcore2.av2-amsterdam.as6453.net (80.231.131.161)
880312 229.29 ms if-ae-2-2.tcore1.av2-amsterdam.as6453.net (195.219.194.5)
880413 259.89 ms if-ae-6-2.tcore1.fnm-frankfurt.as6453.net (195.219.194.150)
880514 259.91 ms if-ae-8-2.tcore1.it5-istanbul.as6453.net (195.219.156.22)
880615 259.97 ms sol-gw-brs01.internetadresi.com (92.45.78.54)
880716 259.94 ms 93-89-18-233.static.internetadresi.com (93.89.18.233)
880817 260.08 ms sol-gw-brs01.internetadresi.com (92.45.78.54)
880918 252.35 ms 93-89-20-20.static.internetadresi.com (93.89.20.20)
8810
8811NSE: Script Post-scanning.
8812Initiating NSE at 13:47
8813Completed NSE at 13:47, 0.05s elapsed
8814Initiating NSE at 13:47
8815Completed NSE at 13:47, 0.05s elapsed
8816######################################################################################################################################
8817--------------------------------------------------------
8818<<<Yasuo discovered following vulnerable applications>>>
8819--------------------------------------------------------
8820+------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
8821| App Name | URL to Application | Potential Exploit | Username | Password |
8822+------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
8823| phpMyAdmin | https://93.89.20.20:443/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | Not Found | Not Found |
8824+------------+-------------------------------------+--------------------------------------------------+-----------+-----------+
8825####################################################################################################################################
8826Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-16 13:50 EST
8827NSE: Loaded 47 scripts for scanning.
8828NSE: Script Pre-scanning.
8829Initiating NSE at 13:50
8830Completed NSE at 13:50, 0.00s elapsed
8831Initiating NSE at 13:50
8832Completed NSE at 13:50, 0.00s elapsed
8833Initiating Parallel DNS resolution of 1 host. at 13:50
8834Completed Parallel DNS resolution of 1 host. at 13:50, 0.02s elapsed
8835Initiating SYN Stealth Scan at 13:50
8836Scanning 93-89-20-20.static.internetadresi.com (93.89.20.20) [65535 ports]
8837Discovered open port 21/tcp on 93.89.20.20
8838Discovered open port 443/tcp on 93.89.20.20
8839Discovered open port 80/tcp on 93.89.20.20
8840Discovered open port 143/tcp on 93.89.20.20
8841Discovered open port 995/tcp on 93.89.20.20
8842Discovered open port 111/tcp on 93.89.20.20
8843Discovered open port 53/tcp on 93.89.20.20
8844Discovered open port 3306/tcp on 93.89.20.20
8845Discovered open port 993/tcp on 93.89.20.20
8846Discovered open port 587/tcp on 93.89.20.20
8847Discovered open port 110/tcp on 93.89.20.20
8848SYN Stealth Scan Timing: About 2.21% done; ETC: 14:14 (0:22:53 remaining)
8849SYN Stealth Scan Timing: About 7.92% done; ETC: 14:14 (0:21:42 remaining)
8850SYN Stealth Scan Timing: About 10.82% done; ETC: 14:12 (0:19:30 remaining)
8851SYN Stealth Scan Timing: About 20.61% done; ETC: 14:14 (0:18:21 remaining)
8852SYN Stealth Scan Timing: About 26.89% done; ETC: 14:14 (0:17:11 remaining)
8853SYN Stealth Scan Timing: About 33.37% done; ETC: 14:14 (0:16:00 remaining)
8854SYN Stealth Scan Timing: About 39.47% done; ETC: 14:15 (0:14:45 remaining)
8855SYN Stealth Scan Timing: About 45.01% done; ETC: 14:15 (0:13:31 remaining)
8856SYN Stealth Scan Timing: About 50.88% done; ETC: 14:15 (0:12:17 remaining)
8857SYN Stealth Scan Timing: About 56.55% done; ETC: 14:16 (0:10:58 remaining)
8858SYN Stealth Scan Timing: About 61.62% done; ETC: 14:16 (0:09:42 remaining)
8859SYN Stealth Scan Timing: About 66.53% done; ETC: 14:16 (0:08:26 remaining)
8860SYN Stealth Scan Timing: About 71.69% done; ETC: 14:16 (0:07:09 remaining)
8861Discovered open port 2222/tcp on 93.89.20.20
8862SYN Stealth Scan Timing: About 76.84% done; ETC: 14:16 (0:05:51 remaining)
8863Discovered open port 465/tcp on 93.89.20.20
8864SYN Stealth Scan Timing: About 81.89% done; ETC: 14:16 (0:04:34 remaining)
8865SYN Stealth Scan Timing: About 87.08% done; ETC: 14:16 (0:03:17 remaining)
8866SYN Stealth Scan Timing: About 92.06% done; ETC: 14:16 (0:02:01 remaining)
8867SYN Stealth Scan Timing: About 97.18% done; ETC: 14:16 (0:00:43 remaining)
8868Completed SYN Stealth Scan at 14:16, 1536.79s elapsed (65535 total ports)
8869Initiating Service scan at 14:16
8870Scanning 13 services on 93-89-20-20.static.internetadresi.com (93.89.20.20)
8871Completed Service scan at 14:17, 28.98s elapsed (13 services on 1 host)
8872Initiating OS detection (try #1) against 93-89-20-20.static.internetadresi.com (93.89.20.20)
8873Retrying OS detection (try #2) against 93-89-20-20.static.internetadresi.com (93.89.20.20)
8874Initiating Traceroute at 14:17
8875Completed Traceroute at 14:17, 0.43s elapsed
8876Initiating Parallel DNS resolution of 15 hosts. at 14:17
8877Completed Parallel DNS resolution of 15 hosts. at 14:17, 0.29s elapsed
8878NSE: Script scanning 93.89.20.20.
8879Initiating NSE at 14:17
8880Completed NSE at 14:17, 30.10s elapsed
8881Initiating NSE at 14:17
8882Completed NSE at 14:17, 3.02s elapsed
8883Nmap scan report for 93-89-20-20.static.internetadresi.com (93.89.20.20)
8884Host is up (0.23s latency).
8885Not shown: 65519 closed ports
8886PORT STATE SERVICE VERSION
888721/tcp open ftp Pure-FTPd
8888| vulscan: VulDB - https://vuldb.com:
8889| [102925] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface pureftpd.passwd HTTP Request privilege escalation
8890| [57510] Pureftpd Pure-FTPd up to 0.x Memory Consumption denial of service
8891| [57504] Pureftpd Pure-FTPd up to 0.x ftp_parser.c Cleartext unknown vulnerability
8892|
8893| MITRE CVE - https://cve.mitre.org:
8894| [CVE-2004-0656] The accept_client function in PureFTPd 1.0.18 and earlier allows remote attackers to cause a denial of service by exceeding the maximum number of connections.
8895|
8896| SecurityFocus - https://www.securityfocus.com/bid/:
8897| [10664] PureFTPd Accept_Client Remote Denial of Service Vulnerability
8898|
8899| IBM X-Force - https://exchange.xforce.ibmcloud.com:
8900| No findings
8901|
8902| Exploit-DB - https://www.exploit-db.com:
8903| No findings
8904|
8905| OpenVAS (Nessus) - http://www.openvas.org:
8906| No findings
8907|
8908| SecurityTracker - https://www.securitytracker.com:
8909| [1010701] PureFTPd Logic Bug in accept_client() Lets Remote Users Crash the FTP Daemon
8910| [1008135] (Claim is Retracted) PureFTPd Buffer Overflow in displayrate() Lets Remote Users Crash the Service
8911| [1002993] PurePostPro Script Add-on for PureFTPd and MySQL Allows Remote Users to Execute SQL Commands on the Server
8912| [1001126] PureFTPd May Allow Remote Users to Deny Service on the Server
8913|
8914| OSVDB - http://www.osvdb.org:
8915| No findings
8916|_
891722/tcp filtered ssh
891853/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
8919| vulners:
8920| cpe:/a:isc:bind:9.9.4:
8921| CVE-2015-4620 7.8 https://vulners.com/cve/CVE-2015-4620
8922| CVE-2014-8500 7.8 https://vulners.com/cve/CVE-2014-8500
8923| CVE-2017-3141 7.2 https://vulners.com/cve/CVE-2017-3141
8924| CVE-2015-8461 7.1 https://vulners.com/cve/CVE-2015-8461
8925| CVE-2013-6230 6.8 https://vulners.com/cve/CVE-2013-6230
8926| CVE-2015-1349 5.4 https://vulners.com/cve/CVE-2015-1349
8927| CVE-2018-5740 5.0 https://vulners.com/cve/CVE-2018-5740
8928| CVE-2017-3145 5.0 https://vulners.com/cve/CVE-2017-3145
8929| CVE-2016-9131 5.0 https://vulners.com/cve/CVE-2016-9131
8930| CVE-2016-8864 5.0 https://vulners.com/cve/CVE-2016-8864
8931| CVE-2016-1286 5.0 https://vulners.com/cve/CVE-2016-1286
8932| CVE-2015-8000 5.0 https://vulners.com/cve/CVE-2015-8000
8933| CVE-2019-6465 4.3 https://vulners.com/cve/CVE-2019-6465
8934| CVE-2018-5743 4.3 https://vulners.com/cve/CVE-2018-5743
8935| CVE-2018-5742 4.3 https://vulners.com/cve/CVE-2018-5742
8936| CVE-2017-3143 4.3 https://vulners.com/cve/CVE-2017-3143
8937| CVE-2017-3142 4.3 https://vulners.com/cve/CVE-2017-3142
8938| CVE-2017-3136 4.3 https://vulners.com/cve/CVE-2017-3136
8939| CVE-2016-2775 4.3 https://vulners.com/cve/CVE-2016-2775
8940| CVE-2016-1285 4.3 https://vulners.com/cve/CVE-2016-1285
8941| CVE-2018-5741 4.0 https://vulners.com/cve/CVE-2018-5741
8942| CVE-2016-6170 4.0 https://vulners.com/cve/CVE-2016-6170
8943| CVE-2018-5745 3.5 https://vulners.com/cve/CVE-2018-5745
8944|_ CVE-2014-0591 2.6 https://vulners.com/cve/CVE-2014-0591
8945| vulscan: VulDB - https://vuldb.com:
8946| [11804] ISC BIND up to 9.9.4 DNS Query bin/named/query.c query_findclosestnsec3 denial of service
8947| [11104] ISC BIND up to 9.9.4 WSAloctl Winsock API Bypass privilege escalation
8948| [9764] ISC BIND up to 9.9.4 RDATA rdata.c denial of service
8949| [119548] ISC BIND 9.9.12/9.10.7/9.11.3/9.12.1-P2 Recursion information disclosure
8950| [95202] ISC BIND up to 9.9.9-P4/9.10.4-P4/9.11.0-P1 DNSSEC denial of service
8951| [95201] ISC BIND up to 9.9.9-P4/9.10.4-P4/9.11.0-P1 DS Record Response denial of service
8952| [95200] ISC BIND up to 9.9.9-P4/9.10.4-P4/9.11.0-P1 ANY Query Response denial of service
8953| [89850] ISC BIND up to 9.9.9-P1/9.10.4-P1/9.11.0b1 Lightweight Resolution named.conf denial of service
8954| [81312] ISC BIND up to 9.9.8-P3/9.10.3-P3 named db.c/resolver.c Signature Record denial of service
8955| [81311] ISC BIND up to 9.9.8-P3/9.10.3-P3 named alist.c/sexpr.c denial of service
8956| [80787] ISC BIND up to 9.9.8-S4 Query rdataset.c denial of service
8957| [79802] ISC BIND 9.9.0/9.10.0/9.10.1-P1 Socket Error resolver.c denial of service
8958| [79801] ISC BIND 9.9.0/9.10.0/9.10.1-P1 Response db.c denial of service
8959| [76834] ISC BIND up to 9.9.7-P1/9.10.2-P2 TKEY Query Packet Crash denial of service
8960| [8108] ISC BIND up to 9.9.3 on Unix/Linux Regular Expression denial of service
8961| [7079] ISC BIND up to 9.9.1 DNS64 IPv6 Transition Mechanism denial of service
8962| [6295] ISC BIND up to 9.9.1-P2 Assertion Error Resource Record Parser RDATA Query denial of service
8963| [5875] ISC BIND 9.9.0/9.9.1 denial of service
8964| [5874] ISC BIND up to 9.9.1-P1 denial of service
8965| [5483] ISC BIND up to 9.9.1 DNS Resource Record information disclosure
8966|
8967| MITRE CVE - https://cve.mitre.org:
8968| [CVE-2013-4854] The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
8969| [CVE-2013-3919] resolver.c in ISC BIND 9.8.5 before 9.8.5-P1, 9.9.3 before 9.9.3-P1, and 9.6-ESV-R9 before 9.6-ESV-R9-P1, when a recursive resolver is configured, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a record in a malformed zone.
8970| [CVE-2013-2266] libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
8971| [CVE-2012-5689] ISC BIND 9.8.x through 9.8.4-P1 and 9.9.x through 9.9.2-P1, in certain configurations involving DNS64 with a Response Policy Zone that lacks an AAAA rewrite rule, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for an AAAA record.
8972| [CVE-2012-5688] ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
8973| [CVE-2012-5166] ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
8974| [CVE-2012-4244] ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P3 allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a long resource record.
8975| [CVE-2012-3868] Race condition in the ns_client structure management in ISC BIND 9.9.x before 9.9.1-P2 allows remote attackers to cause a denial of service (memory consumption or process exit) via a large volume of TCP queries.
8976| [CVE-2012-1667] ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record.
8977| [CVE-2011-4313] query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
8978| [CVE-2011-2465] Unspecified vulnerability in ISC BIND 9 9.8.0, 9.8.0-P1, 9.8.0-P2, and 9.8.1b1, when recursion is enabled and the Response Policy Zone (RPZ) contains DNAME or certain CNAME records, allows remote attackers to cause a denial of service (named daemon crash) via an unspecified query.
8979| [CVE-2011-2464] Unspecified vulnerability in ISC BIND 9 9.6.x before 9.6-ESV-R4-P3, 9.7.x before 9.7.3-P3, and 9.8.x before 9.8.0-P4 allows remote attackers to cause a denial of service (named daemon crash) via a crafted UPDATE request.
8980|
8981| SecurityFocus - https://www.securityfocus.com/bid/:
8982| [61774] ISC BIND 9 SRTT Algorithm Authoritative Server Selection Security Vulnerability
8983| [61479] ISC BIND 9 DNS RDATA Handling CVE-2013-4854 Remote Denial of Service Vulnerability
8984| [58736] ISC BIND 9 'libdns' Remote Denial of Service Vulnerability
8985| [57556] ISC BIND 9 DNS64 CVE-2012-5689 Remote Denial of Service Vulnerability
8986| [56817] ISC BIND 9 DNS64 Remote Denial of Service Vulnerability
8987| [55852] ISC BIND 9 DNS RDATA Handling CVE-2012-5166 Remote Denial of Service Vulnerability
8988| [55522] ISC BIND 9 DNS Resource Records Handling CVE-2012-4244 Remote Denial of Service Vulnerability
8989| [54659] ISC BIND 9 TCP Query Remote Denial of Service Vulnerability
8990| [54658] ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability
8991| [53772] ISC BIND 9 DNS Resource Records Handling Remote Denial of Service Vulnerability
8992| [50690] ISC BIND 9 Recursive Queries Remote Denial of Service Vulnerability
8993| [48566] ISC BIND 9 Unspecified Packet Processing Remote Denial of Service Vulnerability
8994| [48565] ISC BIND 9 RPZ Configurations Remote Denial of Service Vulnerabilities
8995| [48007] ISC BIND 9 Large RRSIG RRsets Remote Denial of Service Vulnerability
8996| [47734] ISC BIND 9 RRSIG Query Type Remote Denial of Service Vulnerability
8997| [46491] ISC BIND 9 IXFR Transfer/DDNS Update Remote Denial of Service Vulnerability
8998| [45385] ISC BIND 9 DNSSEC Validation Remote Denial of Service Vulnerability
8999| [45133] ISC BIND 9 'RRSIG' Record Type Negative Cache Remote Denial of Service Vulnerability
9000| [41730] ISC BIND 9 'RRSIG' Record Type Remote Denial of Service Vulnerability
9001| [37865] ISC BIND 9 DNSSEC Bogus NXDOMAIN Response Remote Cache Poisoning Vulnerability
9002| [37118] ISC BIND 9 DNSSEC Query Response Additional Section Remote Cache Poisoning Vulnerability
9003| [35848] ISC BIND 9 Remote Dynamic Update Message Denial of Service Vulnerability
9004| [25076] ISC BIND 9 Default ACL Settings Recursive Queries And Cached Content Security Bypass Vulnerability
9005| [25037] ISC BIND 9 Remote Cache Poisoning Vulnerability
9006| [4936] ISC BIND 9 Remote Denial Of Service Vulnerability
9007| [100656] Cisco ASR 920 Series Routers CVE-2017-6795 Local Arbitrary File Overwrite Vulnerability
9008| [97450] Cisco ASR 903 and ASR 920 Series CVE-2017-6603 Denial of Service Vulnerability
9009| [93415] Cisco Nexus 9000 Series Switches CVE-2016-1455 Remote Information Disclosure Vulnerability
9010| [82579] Cisco Nexus 9000 Series ACI Mode Switches CVE-2015-6398 Denial of Service Vulnerability
9011| [77686] Cisco Firepower 9000 Series CVE-2015-6380 Unspecified OS Command Injection Vulnerability
9012| [77635] Cisco Firepower 9000 Series CVE-2015-6371 Multiple Arbitrary File Read Vulnerabilities
9013| [77634] Cisco Firepower 9000 Series CVE-2015-6370 Local Command Injection Vulnerability
9014| [77633] Cisco Firepower 9000 Series Switches CVE-2015-6372 HTML Injection Vulnerability
9015| [77631] Cisco Firepower 9000 Series Switches CVE-2015-6374 Clickjacking Vulnerability
9016| [77629] Cisco Firepower 9000 Series CVE-2015-6369 Local Denial of Service Vulnerability
9017| [77628] Cisco Firepower 9000 CVE-2015-6373 Cross Site Request Forgery Vulnerability
9018| [77614] Cisco Firepower 9000 Series Switches CVE-2015-6368 Information Disclosure Vulnerability
9019| [76913] Cisco NX-OS Software for Nexus 9000 Series Switches CVE-2015-6308 Denial of Service Vulnerability
9020| [76791] Cisco ASR 9000 Series Aggregation Services Routers CVE-2015-6301 Denial of Service Vulnerability
9021| [76762] Cisco NX-OS Software for Nexus 9000 Series CVE-2015-6295 Denial of Service Vulnerability
9022| [76329] Cisco Nexus 9000 Series Software CVE-2015-4301 Remote Denial of Service Vulnerability
9023| [76057] Cisco Firepower 9000 Series Devices CVE-2015-4287 Information Disclosure Vulnerability
9024| [75471] Cisco Unified IP Phones 9900 Series CVE-2015-4226 Denial of Service Vulnerability
9025| [75378] Cisco NX-OS Software for Nexus 9000 Series CVE-2015-4213 Information Disclosure Vulnerability
9026| [74029] Cisco ASR 9000 Series Routers CVE-2015-0694 Remote Security Bypass Vulnerability
9027| [73895] Cisco NX-OS Software for Nexus 9000 Series CVE-2015-0686 Denial of Service Vulnerability
9028| [73470] Cisco ASR 9000 Series Routers CVE-2015-0685 Denial of Service Vulnerability
9029| [73318] Cisco ASR 9000 Series Aggregation Services Routers CVE-2015-0672 Denial of Service Vulnerability
9030| [72485] Cisco Unified IP Phones 9900 Series CVE-2015-0604 Arbitrary File Upload Vulnerability
9031| [72484] Cisco Unified IP Phones 9900 Series CVE-2015-0603 Local Denial of Service Vulnerability
9032| [72483] Cisco Unified IP Phones 9900 Series CVE-2015-0601 Local Denial of Service Vulnerability
9033| [72482] Cisco Unified IP Phones 9900 Series CVE-2015-0602 Information Disclosure Vulnerability
9034| [72481] Cisco Unified IP Phones 9900 Series CVE-2015-0600 Denial of Service Vulnerability
9035| [71979] Cisco MDS 9000 NX-OS Software CVE-2015-0582 Denial of Service Vulnerability
9036| [70744] Cisco ASR 901 Series Routers CVE-2014-3293 Denial of Service Vulnerability
9037| [70658] ZTE ZXDSL 931VII 'manager_dev_config_t.gch' Information Disclosure Vulnerability
9038| [69057] Cisco Nexus 9000 Series Switches CVE-2014-3330 Access List Security Bypass Vulnerability
9039| [64770] Cisco Unified IP Phones 9900 Series Crafted Header Unregister Denial of Service Vulnerability
9040| [63564] Cisco MDS 9000 NX-OS Software VRRP Frames Denial of Service Vulnerability
9041| [62944] Cisco Unified IP Phones 9900 Series CVE-2013-5532 Buffer Overflow Vulnerability
9042| [62943] Cisco Unified IP Phones 9900 Series CVE-2013-5533 Local Command Injection Vulnerability
9043| [62905] Cisco Unified IP Phones 9900 Series CVE-2013-5526 Denial of Service Vulnerability
9044| [61330] Cisco Unified IP Phones 9900 Series CVE-2013-3426 Arbitrary File Download Vulnerability
9045| [49633] Oracle Application Server 9i 'httpd.conf' Information Disclosure Vulnerability
9046| [48811] Cisco ASR 9000 Series Routers IP Version 4 Denial of Service Vulnerability
9047| [48264] Aastra 9480i CT Multiple Information Disclosure Vulnerabilities
9048| [15542] NetObjects Fusion 9 Information Disclosure Vulnerability
9049| [6556] Oracle 9i Application Server Sample Scripts Information Disclosure Vulnerability
9050| [6459] Oracle 9i Application Server Java Server Page Source Code Disclosure Vulnerability
9051| [5335] Multiple Lucent Router UDP Port 9 Information Disclosure Vulnerability
9052| [4290] Oracle 9i Default Configuration File Information Disclosure Vulnerability
9053| [4034] Oracle 9IAS OracleJSP Information Disclosure Vulnerability
9054| [3848] Mandrake Bind 9 Package Insecure File Permissions Vulnerability
9055| [2516] Microsoft Plus! 98 Windows ME Password Disclosure Vulnerability
9056|
9057| IBM X-Force - https://exchange.xforce.ibmcloud.com:
9058| [85799] Cisco Unified IP Phones 9900 Series directory traversal
9059| [75412] Cisco Unified IP Phones 9900 series RT privilege escalation
9060| [68733] Cisco 9000 Series Aggregation Service Router IPv4 packet denial of service
9061| [9704] Multiple Lucent router UDP port 9 could disclose sensitive information
9062| [9250] BIND 9 dns_message_findtype() denial of service
9063| [1852] BIND prior to 4.9.7 buffer overflow affects Digital Firewall 97 users
9064| [539] Microsoft Windows 95 and Internet Explorer password disclosure
9065| [86004] ISC BIND RDATA denial of service
9066| [84767] ISC BIND denial of service
9067| [83066] ISC BIND denial of service
9068| [81504] ISC BIND AAAA denial of service
9069| [80510] ISC BIND DNS64 denial of service
9070| [79121] ISC BIND queries denial of service
9071| [78479] ISC BIND RDATA denial of service
9072| [77185] ISC BIND TCP queries denial of service
9073| [77184] ISC BIND bad cache denial of service
9074| [76034] ISC BIND rdata denial of service
9075| [73053] ISC BIND cache update policy security bypass
9076| [71332] ISC BIND recursive queries denial of service
9077| [68375] ISC BIND UPDATE denial of service
9078| [68374] ISC BIND Response Policy Zones denial of service
9079| [67665] ISC BIND RRSIG Rrsets denial of service
9080| [67297] ISC BIND RRSIG denial of service
9081| [65554] ISC BIND IXFR transfer denial of service
9082| [63602] ISC BIND allow-query security bypass
9083| [63596] ISC BIND zone data security bypass
9084| [63595] ISC BIND RRSIG denial of service
9085| [62072] ISC BIND DNSSEC query denial of service
9086| [62071] ISC BIND ACL security bypass
9087| [61871] ISC BIND anchors denial of service
9088| [60421] ISC BIND RRSIG denial of service
9089| [56049] ISC BIND out-of-bailiwick weak security
9090| [55937] ISC Bind unspecified cache poisoning
9091| [55753] ISC BIND DNSSEC NSEC/NSEC3 cache poisoning
9092| [54416] ISC BIND DNSSEC cache poisoning
9093| [52073] ISC BIND dns_db_findrdataset() denial of service
9094| [47409] Multiple Mozilla products XBL loadBindingDocument information disclosure
9095| [45234] ISC BIND UDP denial of service
9096| [39670] ISC BIND inet_network buffer overflow
9097| [37233] libgssapi ISC BIND Novell SUSE Linux Enterprise Server GSS-TSIG request denial of service
9098| [37128] RHSA update for ISC BIND RRset denial of service not installed
9099| [37127] RHSA update for ISC BIND named service denial of service not installed
9100| [36275] ISC BIND DNS query spoofing
9101| [35575] ISC BIND query ID cache poisoning
9102| [35571] ISC BIND ACL security bypass
9103| [31838] ISC BIND RRset denial of service
9104| [31799] ISC BIND named service denial of service
9105| [29876] HP Tru64 ypbind core dump information disclosure
9106| [28745] ISC BIND DNSSEC RRset denial of service
9107| [28744] ISC BIND recursive INSIST denial of service
9108| [22041] BEA WebLogic Server and Express LDAP anonymous bind information disclosure
9109| [18836] BIND hostname disclosure
9110| [10624] ISC BIND DNS stub resolver library (libresolv.a) stack buffer overflows
9111| [10333] ISC BIND SIG null pointer dereference denial of service
9112| [10332] ISC BIND OPT resource record (RR) denial of service
9113| [10304] ISC BIND SIG cached resource records (RR) heap buffer overflow
9114| [7027] Cisco CBOS Web-based configuration utility binds to port 80 by default
9115| [5814] ISC BIND "
9116| [5540] ISC BIND can be remotely crashed by issuing ZXFR requests
9117| [5462] ISC BIND AXFR host command remote buffer overflow
9118|
9119| Exploit-DB - https://www.exploit-db.com:
9120| [24689] cPanel 9.9.1 -R3 Front Page Extension Installation Information Disclosure
9121| [23059] Netbula Anyboard 9.9.5 6 Information Disclosure Vulnerability
9122| [9300] ISC BIND 9 Remote Dynamic Update Message Denial of Service PoC
9123|
9124| OpenVAS (Nessus) - http://www.openvas.org:
9125| [103090] ISC BIND 9 IXFR Transfer/DDNS Update Remote Denial of Service Vulnerability
9126| [103031] ISC BIND 9 < 9.7.2-P2 Multiple Vulnerabilities
9127| [103030] ISC BIND 9 'RRSIG' Record Type Negative Cache Remote Denial of Service Vulnerability
9128| [100717] ISC BIND 9 'RRSIG' Record Type Remote Denial of Service Vulnerability
9129| [100458] ISC BIND 9 DNSSEC Bogus NXDOMAIN Response Remote Cache Poisoning Vulnerability
9130| [100362] ISC BIND 9 DNSSEC Query Response Additional Section Remote Cache Poisoning Vulnerability
9131| [100251] ISC BIND 9 Remote Dynamic Update Message Denial of Service Vulnerability
9132| [63208] Fedora Core 9 FEDORA-2009-0350 (bind)
9133| [11226] Oracle 9iAS default error information disclosure
9134|
9135| SecurityTracker - https://www.securitytracker.com:
9136| [1025811] Cisco ASR 9000 Series Router IPv4 Packet Processing Flaw Lets Remote Users Deny Service
9137| [1012995] BIND 9 Validator Assumption Error May Let Remote Users Deny Service
9138| [1005048] Oracle Enterprise Manager Web Service Component of Oracle 9i Application Server Discloses the Web Cache Administrator Password to Local Users
9139| [1003675] Oracle 9iAS Application Server Discloses CGI-BIN Script Source Code to Remote Users
9140| [1001186] Microsoft Windows Me Operating System and Windows 98 with the Plus! 98 Package Disclose Data Compression Passwords
9141| [1028901] (McAfee Issues Advisory for McAfee Email Gateway) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
9142| [1028900] (McAfee Issues Advisory for McAfee Email and Web Security Appliance) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
9143| [1028899] (McAfee Issues Fix for McAfee Web Gateway) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
9144| [1028866] (McAfee Issues Fix for McAfee Firewall Enterprise) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
9145| [1028854] (NetBSD Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
9146| [1028849] (Red Hat Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
9147| [1028848] (Red Hat Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
9148| [1028839] (FreeBSD Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
9149| [1028838] ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
9150| [1028632] ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against Recursive Resolvers
9151| [1028046] ISC BIND DNS64 and Response Policy Zones (RPZ) Bug Lets Remote Users Deny Service
9152| [1027835] ISC BIND DNS64 Bug Lets Remote Users Deny Service
9153| [1027642] ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service
9154| [1027529] ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service
9155| [1026647] ISC BIND Cache Update Policy Can Be Bypassed to Allow Revoked Domain Names to Remain Resolvable
9156| [1026335] ISC BIND Invalid Record Caching Flaw Lets Remote Users Deny Service
9157| [1025743] ISC BIND Response Policy Zones DNAME/CNAME Processing Flaw Lets Remote Users Deny Service
9158| [1025742] ISC BIND Packet Processing Flaw Lets Remote Users Deny Service
9159| [1015850] Samba winbindd Daemon Discloses Server Password to Local Users
9160| [1003359] BindView NETinventory Discloses Password to Local Users During Auditing
9161| [1001721] BIND Domain Name System Software May Disclose DNS Transactional Signature (TSIG) Keys to Local Users
9162|
9163| OSVDB - http://www.osvdb.org:
9164| [86219] Cardiac Science G3 Plus 9390A-501 AED AEDUpdate Cleartext Password Local Disclosure
9165| [22517] MPN HP-180W Wireless IP Phone UDP Port 9090 Information Disclosure
9166| [22516] ZyXEL P-2000W_v2 VoIP Wi-Fi Phone UDP Port 9090 Information Disclosure
9167| [21292] ZyXEL P2000W UDP 9090 Remote Information Disclosure
9168|_
916980/tcp open ssl/http Apache/2
9170|_http-server-header: Apache/2
9171110/tcp open pop3 Dovecot DirectAdmin pop3d
9172| vulscan: VulDB - https://vuldb.com:
9173| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
9174| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
9175| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
9176| [134243] InfinitumIT DirectAdmin up to 1.561 FileManager CSRF privilege escalation
9177| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
9178| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
9179| [131477] JBMC DirectAdmin 1.55 /CMD_ACCOUNT_ADMIN cross site request forgery
9180| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
9181| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
9182| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
9183| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
9184| [112266] JBMC DirectAdmin up to 1.51 email_ftp_password_change Setting memory corruption
9185| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
9186| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
9187| [95172] Directadmin Controlpanel 1.50.1 /CMD_SELECT_USERS cross site scripting
9188| [95100] DirectAdmin up to 1.50.1 Crash denial of service
9189| [69835] Dovecot 2.2.0/2.2.1 denial of service
9190| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
9191| [65684] Dovecot up to 2.2.6 unknown vulnerability
9192| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
9193| [63692] Dovecot up to 2.0.15 spoofing
9194| [7062] Dovecot 2.1.10 mail-search.c denial of service
9195| [62578] DirectAdmin 1.403 cross site scripting
9196| [61198] Jbmc-software DirectAdmin 1.403 cross site scripting
9197| [57517] Dovecot up to 2.0.12 Login directory traversal
9198| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
9199| [57515] Dovecot up to 2.0.12 Crash denial of service
9200| [54944] Dovecot up to 1.2.14 denial of service
9201| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
9202| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
9203| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
9204| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
9205| [53277] Dovecot up to 1.2.10 denial of service
9206| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
9207| [48756] Jbmc-software DirectAdmin up to 1.292 cross site scripting
9208| [48060] Jbmc-software DirectAdmin up to 1.17 privilege escalation
9209| [45256] Dovecot up to 1.1.5 directory traversal
9210| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
9211| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
9212| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
9213| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
9214| [40356] Dovecot 1.0.9 Cache unknown vulnerability
9215| [38747] DirectAdmin 1.30.2 cross site scripting
9216| [38222] Dovecot 1.0.2 directory traversal
9217| [37578] DirectAdmin 1.30.1 cross site scripting
9218| [36376] Dovecot up to 1.0.x directory traversal
9219| [36066] JBMC Software DirectAdmin 1.293 cross site scripting
9220| [35680] Jbmc Software DirectAdmin 1.293 cross site scripting
9221| [33341] JBMC Software DirectAdmin 1.28.1 cross site scripting
9222| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
9223|
9224| MITRE CVE - https://cve.mitre.org:
9225| [CVE-2012-5305] Cross-site scripting (XSS) vulnerability in CMD_DOMAIN in JBMC Software DirectAdmin 1.403 allows remote attackers to inject arbitrary web script or HTML via the domain parameter.
9226| [CVE-2012-3842] Multiple cross-site scripting (XSS) vulnerabilities in CMD_DOMAIN in JBMC Software DirectAdmin 1.403 allow remote authenticated users with certain privileges to inject arbitrary web script or HTML via the (1) select0 or (2) select8 parameters.
9227| [CVE-2011-5033] Stack-based buffer overflow in CFS.c in ConfigServer Security & Firewall (CSF) before 5.43, when running on a DirectAdmin server, allows local users to cause a denial of service (crash) via a long string in an admin.list file.
9228| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
9229| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
9230| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
9231| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
9232| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
9233| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
9234| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
9235| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
9236| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
9237| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
9238| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
9239| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
9240| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
9241| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
9242| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
9243| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
9244| [CVE-2009-2216] Cross-site scripting (XSS) vulnerability in CMD_REDIRECT in DirectAdmin 1.33.6 and earlier allows remote attackers to inject arbitrary web script or HTML via the URI in a view=advanced request.
9245| [CVE-2009-1526] JBMC Software DirectAdmin before 1.334 allows local users to create or overwrite any file via a symlink attack on an arbitrary file in a certain temporary directory, related to a request for this temporary file in the PATH_INFO to the CMD_DB script during a backup action.
9246| [CVE-2009-1525] CMD_DB in JBMC Software DirectAdmin before 1.334 allows remote authenticated users to gain privileges via shell metacharacters in the name parameter during a restore action.
9247| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
9248| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
9249| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
9250| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
9251| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
9252| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
9253| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
9254| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
9255| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
9256| [CVE-2007-4830] Cross-site scripting (XSS) vulnerability in CMD_BANDWIDTH_BREAKDOWN in DirectAdmin 1.30.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the user parameter.
9257| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
9258| [CVE-2007-3501] Cross-site scripting (XSS) vulnerability in CMD_USER_STATS in DirectAdmin 1.30.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the domain parameter, a different vector than CVE-2007-1508.
9259| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
9260| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
9261| [CVE-2007-1926] Cross-site scripting (XSS) vulnerability in JBMC Software DirectAdmin before 1.293 does not properly display log files, which allows remote authenticated users to inject arbitrary web script or HTML via (1) http or (2) ftp requests logged in /var/log/directadmin/security.log
9262| [CVE-2007-1508] Cross-site scripting (XSS) vulnerability in CMD_USER_STATS in DirectAdmin allows remote attackers to inject arbitrary web script or HTML via the RESULT parameter, a different vector than CVE-2006-5983.
9263| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
9264| [CVE-2006-5983] Multiple cross-site scripting (XSS) vulnerabilities in JBMC Software DirectAdmin 1.28.1 allow remote authenticated users to inject arbitrary web script or HTML via the (1) user parameter to (a) CMD_SHOW_RESELLER or (b) CMD_SHOW_USER in the Admin level
9265| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
9266| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
9267| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
9268| [CVE-2006-2153] Cross-site scripting (XSS) vulnerability in HTM_PASSWD in DirectAdmin Hosting Management allows remote attackers to inject arbitrary web script or HTML via the domain parameter.
9269| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
9270| [CVE-2002-0925] Format string vulnerability in mmsyslog function allows remote attackers to execute arbitrary code via (1) the USER command to mmpop3d for mmmail 0.0.13 and earlier, (2) the HELO command to mmsmtpd for mmmail 0.0.13 and earlier, or (3) the USER command to mmftpd 0.0.7 and earlier.
9271| [CVE-2001-0143] vpop3d program in linuxconf 1.23r and earlier allows local users to overwrite arbitrary files via a symlink attack.
9272| [CVE-2000-1197] POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes.
9273| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
9274|
9275| SecurityFocus - https://www.securityfocus.com/bid/:
9276| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
9277| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
9278| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
9279| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
9280| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
9281| [83952] DirectAdmin CVE-2006-2153 Cross-Site Scripting Vulnerability
9282| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
9283| [67306] Dovecot Denial of Service Vulnerability
9284| [67219] akpop3d 'pszQuery' Remote Memory Corruption Vulnerability
9285| [63911] Installatron Plugin for DirectAdmin Insecure Temporary File Creation Vulnerability
9286| [63373] Installatron Plugin for DirectAdmin cURL Output Remote Privilege Escalation Vulnerability
9287| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
9288| [62929] DirectAdmin Backup Multiple Security Vulnerabilities
9289| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
9290| [61017] DirectAdmin Symlink Attack Multiple Remote Privilege Escalation Vulnerabilities
9291| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
9292| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
9293| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
9294| [53281] DirectAdmin Multiple Cross Site Scripting Vulnerabilities
9295| [52848] RETIRED: DirectAdmin 'CMD_DOMAIN' Cross-Site Scripting Vulnerability
9296| [52845] JBMC Software DirectAdmin 'domain' Parameter Cross Site Scripting Vulnerability
9297| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
9298| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
9299| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
9300| [47693] DirectAdmin 'mysql_backup' Folder Permissions Information Disclosure Vulnerability
9301| [47690] DirectAdmin Hard Link Local Privilege Escalation Vulnerability
9302| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
9303| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
9304| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
9305| [39838] tpop3d Remote Denial of Service Vulnerability
9306| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
9307| [38721] DirectAdmin 'CMD_DB_VIEW' Cross-Site Scripting Vulnerability
9308| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
9309| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
9310| [35450] DirectAdmin 'CMD_REDIRECT' Cross-Site Scripting Vulnerability
9311| [34678] DirectAdmin '/CMD_DB' Restore Action Local Privilege Escalation Vulnerability
9312| [34676] DirectAdmin '/CMD_DB' Backup Action Insecure Temporary File Creation Vulnerability
9313| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
9314| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
9315| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
9316| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
9317| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
9318| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
9319| [25607] DirectAdmin CMD_BANDWIDTH_BREAKDOWN Cross-Site Scripting Vulnerability
9320| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
9321| [24688] DirectAdmin Domain Parameter Cross-Site Scripting Vulnerability
9322| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
9323| [23254] DirectAdmin Logfile HTML Injection Vulnerability
9324| [22996] DirectAdmin CMD_USER_STATS Cross-Site Scripting Vulnerability
9325| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
9326| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
9327| [21049] DirectAdmin Multiple Cross-Site Scripting Vulnerabilities
9328| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
9329| [17961] Dovecot Remote Information Disclosure Vulnerability
9330| [16672] Dovecot Double Free Denial of Service Vulnerability
9331| [8495] akpop3d User Name SQL Injection Vulnerability
9332| [8473] Vpop3d Remote Denial Of Service Vulnerability
9333| [3990] ZPop3D Bad Login Logging Failure Vulnerability
9334| [2781] DynFX MailServer POP3d Denial of Service Vulnerability
9335|
9336| IBM X-Force - https://exchange.xforce.ibmcloud.com:
9337| [86382] Dovecot POP3 Service denial of service
9338| [85490] DirectAdmin Backup System email account functionality symlink
9339| [85488] DirectAdmin Backup System symlink
9340| [84396] Dovecot IMAP APPEND denial of service
9341| [80453] Dovecot mail-search.c denial of service
9342| [74569] DirectAdmin CMD_DOMAIN cross-site scripting
9343| [72685] DirectAdmin domain parameter cross-site request forgery
9344| [71354] Dovecot SSL Common Name (CN) weak security
9345| [67675] Dovecot script-login security bypass
9346| [67674] Dovecot script-login directory traversal
9347| [67589] Dovecot header name denial of service
9348| [67254] DirectAdmin MySQL information disclosure
9349| [67253] DirectAdmin hard link privilege escalation
9350| [63267] Apple Mac OS X Dovecot information disclosure
9351| [62340] Dovecot mailbox security bypass
9352| [62339] Dovecot IMAP or POP3 denial of service
9353| [62256] Dovecot mailbox security bypass
9354| [62255] Dovecot ACL entry security bypass
9355| [60639] Dovecot ACL plugin weak security
9356| [57267] Apple Mac OS X Dovecot Kerberos security bypass
9357| [56875] DirectAdmin name cross-site scripting
9358| [56763] Dovecot header denial of service
9359| [55181] DirectAdmin account cross-site request forgery
9360| [54363] Dovecot base_dir privilege escalation
9361| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
9362| [51292] DirectAdmin CMD_REDIRECT cross-site scripting
9363| [50167] DirectAdmin CMD_DB command execution
9364| [49416] DirectAdmin CMD_DB backup action symlink
9365| [46323] Dovecot dovecot.conf information disclosure
9366| [46227] Dovecot message parsing denial of service
9367| [45669] Dovecot ACL mailbox security bypass
9368| [45667] Dovecot ACL plugin rights security bypass
9369| [41085] Dovecot TAB characters authentication bypass
9370| [41009] Dovecot mail_extra_groups option unauthorized access
9371| [39342] Dovecot LDAP auth cache configuration security bypass
9372| [36510] DirectAdmin user parameter cross-site scripting
9373| [35767] Dovecot ACL plugin security bypass
9374| [35177] DirectAdmin domain parameter cross-site scripting
9375| [34082] Dovecot mbox-storage.c directory traversal
9376| [33390] DirectAdmin log file cross-site scripting
9377| [33023] DirectAdmin CMD_USER_STATS form cross-site scripting
9378| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
9379| [30256] DirectAdmin user, TYPE, and name parameters cross-site scripting
9380| [26578] Cyrus IMAP pop3d buffer overflow
9381| [26536] Dovecot IMAP LIST information disclosure
9382| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
9383| [24709] Dovecot APPEND command denial of service
9384| [13018] akpop3d authentication code SQL injection
9385| [7345] Slackware Linux imapd and ipop3d core dump
9386| [6269] imap, ipop2d and ipop3d buffer overflows
9387| [5923] Linuxconf vpop3d symbolic link
9388| [4918] IPOP3D, Buffer overflow attack
9389| [1560] IPOP3D, user login successful
9390| [1559] IPOP3D user login to remote host successful
9391| [1525] IPOP3D, user logout
9392| [1524] IPOP3D, user auto-logout
9393| [1523] IPOP3D, user login failure
9394| [1522] IPOP3D, brute force attack
9395| [1521] IPOP3D, user kiss of death logout
9396| [418] pop3d mktemp creates insecure temporary files
9397|
9398| Exploit-DB - https://www.exploit-db.com:
9399| [29747] DirectAdmin 1.292 CMD_USER_STATS Cross-Site Scripting Vulnerability
9400| [29006] DirectAdmin 1.28/1.29 CMD_FTP_SHOW DOMAIN Parameter XSS
9401| [29005] DirectAdmin 1.28/1.29 CMD_EMAIL_LIST name Parameter XSS
9402| [29004] DirectAdmin 1.28/1.29 CMD_EMAIL_VACATION_MODIFY user Parameter XSS
9403| [29003] DirectAdmin 1.28/1.29 CMD_TICKET type Parameter XSS
9404| [29002] DirectAdmin 1.28/1.29 CMD_EMAIL_FORWARDER_MODIFY user Parameter XSS
9405| [29001] DirectAdmin 1.28/1.29 CMD_TICKET_CREATE TYPE Parameter XSS
9406| [29000] DirectAdmin 1.28/1.29 CMD_SHOW_USER user Parameter XSS
9407| [28999] DirectAdmin 1.28/1.29 CMD_SHOW_RESELLER user Parameter XSS
9408| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
9409| [23053] Vpop3d Remote Denial of Service Vulnerability
9410| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
9411| [11893] tPop3d 1.5.3 DoS
9412| [11813] DirectAdmin 1.34.4 - Multi CSRF vulnerability
9413| [11029] DirectAdmin <= 1.33.6 Symlink Permission Bypass
9414| [10779] DirectAdmin 1.34.0 - CSRF Create Administrator Vulnerability
9415| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
9416| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
9417| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
9418| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
9419|
9420| OpenVAS (Nessus) - http://www.openvas.org:
9421| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
9422| [901025] Dovecot Version Detection
9423| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
9424| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
9425| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
9426| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
9427| [870607] RedHat Update for dovecot RHSA-2011:0600-01
9428| [870471] RedHat Update for dovecot RHSA-2011:1187-01
9429| [870153] RedHat Update for dovecot RHSA-2008:0297-02
9430| [863272] Fedora Update for dovecot FEDORA-2011-7612
9431| [863115] Fedora Update for dovecot FEDORA-2011-7258
9432| [861525] Fedora Update for dovecot FEDORA-2007-664
9433| [861394] Fedora Update for dovecot FEDORA-2007-493
9434| [861333] Fedora Update for dovecot FEDORA-2007-1485
9435| [860845] Fedora Update for dovecot FEDORA-2008-9202
9436| [860663] Fedora Update for dovecot FEDORA-2008-2475
9437| [860169] Fedora Update for dovecot FEDORA-2008-2464
9438| [860089] Fedora Update for dovecot FEDORA-2008-9232
9439| [840950] Ubuntu Update for dovecot USN-1295-1
9440| [840668] Ubuntu Update for dovecot USN-1143-1
9441| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
9442| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
9443| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
9444| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
9445| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
9446| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
9447| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
9448| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
9449| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
9450| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
9451| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
9452| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
9453| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
9454| [70259] FreeBSD Ports: dovecot
9455| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
9456| [66522] FreeBSD Ports: dovecot
9457| [65010] Ubuntu USN-838-1 (dovecot)
9458| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
9459| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
9460| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
9461| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
9462| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
9463| [62854] FreeBSD Ports: dovecot-managesieve
9464| [61916] FreeBSD Ports: dovecot
9465| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
9466| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
9467| [60528] FreeBSD Ports: dovecot
9468| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
9469| [60089] FreeBSD Ports: dovecot
9470| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
9471| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
9472|
9473| SecurityTracker - https://www.securitytracker.com:
9474| [1028744] DirectAdmin Backup System Flaws Let Local Users Gain Elevated Privileges
9475| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
9476| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
9477| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
9478|
9479| OSVDB - http://www.osvdb.org:
9480| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
9481| [94899] DirectAdmin Backup System Unspecified Email Account Function Symlink Local Privilege Escalation
9482| [94898] DirectAdmin Backup System Unspecified Symlink Arbitrary File Manipulation Local Privilege Escalation
9483| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
9484| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
9485| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
9486| [80919] DirectAdmin CMD_DOMAIN Multiple Parameter XSS
9487| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
9488| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
9489| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
9490| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
9491| [72120] DirectAdmin mysql_backups Folder MySQL Database Backup Local Disclosure
9492| [72119] DirectAdmin Backup Creation Hard Link Check Weakness Local Privilege Escalation
9493| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
9494| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
9495| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
9496| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
9497| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
9498| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
9499| [66113] Dovecot Mail Root Directory Creation Permission Weakness
9500| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
9501| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
9502| [66110] Dovecot Multiple Unspecified Buffer Overflows
9503| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
9504| [64783] Dovecot E-mail Message Header Unspecified DoS
9505| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
9506| [62914] DirectAdmin CMD_DB_VIEW name Parameter XSS
9507| [62796] Dovecot mbox Format Email Header Handling DoS
9508| [61395] DirectAdmin Admin Account Creation CSRF
9509| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
9510| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
9511| [55296] DirectAdmin CMD_REDIRECT URL Parameter XSS
9512| [54015] DirectAdmin CMD_DB name Parameter Shell Metacharacter Arbitrary Command Execution
9513| [54014] DirectAdmin CMD_DB Database Backup Request Temporary File Symlink Arbitrary File Overwrite
9514| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
9515| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
9516| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
9517| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
9518| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
9519| [43137] Dovecot mail_extra_groups Symlink File Manipulation
9520| [42979] Dovecot passdbs Argument Injection Authentication Bypass
9521| [39876] Dovecot LDAP Auth Cache Security Bypass
9522| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
9523| [36999] DirectAdmin CMD_BANDWIDTH_BREAKDOWN user Parameter XSS
9524| [36339] DirectAdmin CMD_USER_STATS domain Parameter XSS
9525| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
9526| [34687] DirectAdmin http/ftp XSS Log Viewer Data Injection
9527| [34273] DirectAdmin CMD_USER_STATS RESULT Parameter XSS
9528| [32676] DirectAdmin CMD_FTP_SHOW DOMAIN Parameter XSS
9529| [32675] DirectAdmin CMD_EMAIL_LIST name Parameter XSS
9530| [32674] DirectAdmin CMD_EMAIL_VACATION_MODIFY user Parameter XSS
9531| [32673] DirectAdmin CMD_TICKET type Parameter XSS
9532| [32672] DirectAdmin CMD_EMAIL_FORWARDER_MODIFY user Parameter XSS
9533| [32671] DirectAdmin CMD_TICKET_CREATE TYPE Parameter XSS
9534| [32670] DirectAdmin CMD_SHOW_USER user Parameter XSS
9535| [32669] DirectAdmin CMD_SHOW_RESELLER user Parameter XSS
9536| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
9537| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
9538| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
9539| [25138] DirectAdmin HTM_PASSWD domain Parameter XSS
9540| [23281] Dovecot imap/pop3-login dovecot-auth DoS
9541| [23280] Dovecot Malformed APPEND Command DoS
9542| [14459] mmmail mmpop3d USER Command mmsyslog Function Format String
9543| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
9544| [5857] Linux pop3d Arbitrary Mail File Access
9545| [2471] akpop3d username SQL Injection
9546|_
9547111/tcp open rpcbind 2-4 (RPC #100000)
9548| rpcinfo:
9549| program version port/proto service
9550| 100000 2,3,4 111/tcp rpcbind
9551| 100000 2,3,4 111/udp rpcbind
9552| 100000 3,4 111/tcp6 rpcbind
9553|_ 100000 3,4 111/udp6 rpcbind
9554143/tcp open imap Dovecot imapd
9555| vulscan: VulDB - https://vuldb.com:
9556| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
9557| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
9558| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
9559| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
9560| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
9561| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
9562| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
9563| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
9564| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
9565| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
9566| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
9567| [69835] Dovecot 2.2.0/2.2.1 denial of service
9568| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
9569| [65684] Dovecot up to 2.2.6 unknown vulnerability
9570| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
9571| [63692] Dovecot up to 2.0.15 spoofing
9572| [7062] Dovecot 2.1.10 mail-search.c denial of service
9573| [59792] Cyrus IMAPd 2.4.11 weak authentication
9574| [57517] Dovecot up to 2.0.12 Login directory traversal
9575| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
9576| [57515] Dovecot up to 2.0.12 Crash denial of service
9577| [54944] Dovecot up to 1.2.14 denial of service
9578| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
9579| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
9580| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
9581| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
9582| [53277] Dovecot up to 1.2.10 denial of service
9583| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
9584| [45256] Dovecot up to 1.1.5 directory traversal
9585| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
9586| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
9587| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
9588| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
9589| [40356] Dovecot 1.0.9 Cache unknown vulnerability
9590| [38222] Dovecot 1.0.2 directory traversal
9591| [37927] Ipswitch Ipswitch Collaboration Suite up to 2006.1 IMAP Service imapd32.exe memory corruption
9592| [36376] Dovecot up to 1.0.x directory traversal
9593| [35759] Atrium MERCUR IMAPD IMAP4 mcrimap4.exe memory corruption
9594| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
9595|
9596| MITRE CVE - https://cve.mitre.org:
9597| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
9598| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
9599| [CVE-2011-3481] The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message.
9600| [CVE-2011-3372] imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command.
9601| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
9602| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
9603| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
9604| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
9605| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
9606| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
9607| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
9608| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
9609| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
9610| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
9611| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
9612| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
9613| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
9614| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
9615| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
9616| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
9617| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
9618| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
9619| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
9620| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
9621| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
9622| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
9623| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
9624| [CVE-2007-5740] The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism.
9625| [CVE-2007-5018] Stack-based buffer overflow in IMAPD in Mercury/32 4.52 allows remote authenticated users to execute arbitrary code via a long argument in a SEARCH ON command. NOTE: this issue might overlap with CVE-2004-1211.
9626| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
9627| [CVE-2007-3925] Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.
9628| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
9629| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
9630| [CVE-2007-1579] Stack-based buffer overflow in Atrium MERCUR IMAPD allows remote attackers to have an unknown impact via a certain SUBSCRIBE command.
9631| [CVE-2007-1578] Multiple integer signedness errors in the NTLM implementation in Atrium MERCUR IMAPD (mcrimap4.exe) 5.00.14, with SP4, allow remote attackers to execute arbitrary code via a long NTLMSSP argument that triggers a stack-based buffer overflow.
9632| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
9633| [CVE-2006-6762] The IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to cause a denial of service via an APPEND command with a single "(" (parenthesis) in the argument.
9634| [CVE-2006-6761] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.
9635| [CVE-2006-6425] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via unspecified vectors involving the APPEND command.
9636| [CVE-2006-6424] Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow
9637| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
9638| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
9639| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
9640| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
9641| [CVE-2005-2278] Stack-based buffer overflow in the IMAP daemon (imapd) in MailEnable Professional 1.54 allows remote authenticated users to execute arbitrary code via the status command with a long mailbox name.
9642| [CVE-2005-1256] Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.
9643| [CVE-2005-1249] The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop.
9644| [CVE-2005-1015] Buffer overflow in MailEnable Imapd (MEIMAP.exe) allows remote attackers to execute arbitrary code via a long LOGIN command.
9645| [CVE-2005-0546] Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.
9646| [CVE-2003-1322] Multiple stack-based buffer overflows in Atrium MERCUR IMAPD in MERCUR Mailserver before 4.2.15.0 allow remote attackers to execute arbitrary code via a long (1) EXAMINE, (2) DELETE, (3) SUBSCRIBE, (4) RENAME, (5) UNSUBSCRIBE, (6) LIST, (7) LSUB, (8) STATUS, (9) LOGIN, (10) CREATE, or (11) SELECT command.
9647| [CVE-2002-1782] The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user.
9648| [CVE-2002-1604] Multiple buffer overflows in HP Tru64 UNIX allow local and possibly remote attackers to execute arbitrary code via a long NLSPATH environment variable to (1) csh, (2) dtsession, (3) dxsysinfo, (4) imapd, (5) inc, (6) uucp, (7) uux, (8) rdist, or (9) deliver.
9649| [CVE-2002-0997] Buffer overflows in IMAP Agent (imapd) for Novell NetMail (NIMS) 3.0.3 before 3.0.3A allows remote attackers to cause a denial of service.
9650| [CVE-2002-0379] Buffer overflow in University of Washington imap server (uw-imapd) imap-2001 (imapd 2001.315) and imap-2001a (imapd 2001.315) with legacy RFC 1730 support, and imapd 2000.287 and earlier, allows remote authenticated users to execute arbitrary code via a long BODY request.
9651| [CVE-2001-0691] Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations.
9652| [CVE-2000-0284] Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.
9653| [CVE-1999-1557] Buffer overflow in the login functions in IMAP server (imapd) in Ipswitch IMail 5.0 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long user name or (2) a long password.
9654| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
9655| [CVE-1999-1224] IMAP 4.1 BETA, and possibly other versions, does not properly handle the SIGABRT (abort) signal, which allows local users to crash the server (imapd) via certain sequences of commands, which causes a core dump that may contain sensitive password information.
9656|
9657| SecurityFocus - https://www.securityfocus.com/bid/:
9658| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
9659| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
9660| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
9661| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
9662| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
9663| [84478] imapd CVE-1999-1224 Denial-Of-Service Vulnerability
9664| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
9665| [67306] Dovecot Denial of Service Vulnerability
9666| [65650] Eudora WorldMail imapd 'UID' Command Buffer Overflow Vulnerability
9667| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
9668| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
9669| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
9670| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
9671| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
9672| [51403] Eudora WorldMail imapd 'LIST' Command Buffer Overflow Vulnerability
9673| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
9674| [49949] Cyrus IMAPd NTTP Logic Error Authentication Bypass Vulnerability
9675| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
9676| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
9677| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
9678| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
9679| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
9680| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
9681| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
9682| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
9683| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
9684| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
9685| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
9686| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
9687| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
9688| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
9689| [26270] Perdition IMAPD __STR_VWRITE Remote Format String Vulnerability
9690| [25733] Mercury/32 IMAPD SEARCH Command Remote Stack Buffer Overflow Vulnerability
9691| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
9692| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
9693| [23058] Atrium Mercur IMapD NTLM Buffer Overflow Vulnerability
9694| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
9695| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
9696| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
9697| [17961] Dovecot Remote Information Disclosure Vulnerability
9698| [16672] Dovecot Double Free Denial of Service Vulnerability
9699| [15980] Qualcomm WorldMail IMAPD Buffer Overflow Vulnerability
9700| [15753] Ipswitch Collaboration Suite and IMail Server IMAPD LIST Command Denial Of Service Vulnerability
9701| [12636] Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities
9702| [11738] Cyrus IMAPD Multiple Remote Unspecified Vulnerabilities
9703| [11729] Cyrus IMAPD Multiple Remote Vulnerabilities
9704| [6298] Cyrus IMAPD Pre-Login Heap Corruption Vulnerability
9705| [4713] Wu-imapd Partial Mailbox Attribute Remote Buffer Overflow Vulnerability
9706| [2856] Imapd 'Local' Buffer Overflow Vulnerabilities
9707| [1110] Univ. Of Washington imapd Buffer Overflow Vulnerabilities
9708| [502] NT IMail Imapd Buffer Overflow DoS Vulnerability
9709| [130] imapd Buffer Overflow Vulnerability
9710|
9711| IBM X-Force - https://exchange.xforce.ibmcloud.com:
9712| [86382] Dovecot POP3 Service denial of service
9713| [84396] Dovecot IMAP APPEND denial of service
9714| [80453] Dovecot mail-search.c denial of service
9715| [71354] Dovecot SSL Common Name (CN) weak security
9716| [70325] Cyrus IMAPd NNTP security bypass
9717| [67675] Dovecot script-login security bypass
9718| [67674] Dovecot script-login directory traversal
9719| [67589] Dovecot header name denial of service
9720| [63267] Apple Mac OS X Dovecot information disclosure
9721| [62340] Dovecot mailbox security bypass
9722| [62339] Dovecot IMAP or POP3 denial of service
9723| [62256] Dovecot mailbox security bypass
9724| [62255] Dovecot ACL entry security bypass
9725| [60639] Dovecot ACL plugin weak security
9726| [57267] Apple Mac OS X Dovecot Kerberos security bypass
9727| [56763] Dovecot header denial of service
9728| [54363] Dovecot base_dir privilege escalation
9729| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
9730| [47526] UW-imapd rfc822_output_char() denial of service
9731| [46323] Dovecot dovecot.conf information disclosure
9732| [46227] Dovecot message parsing denial of service
9733| [45669] Dovecot ACL mailbox security bypass
9734| [45667] Dovecot ACL plugin rights security bypass
9735| [41085] Dovecot TAB characters authentication bypass
9736| [41009] Dovecot mail_extra_groups option unauthorized access
9737| [39342] Dovecot LDAP auth cache configuration security bypass
9738| [35767] Dovecot ACL plugin security bypass
9739| [34082] Dovecot mbox-storage.c directory traversal
9740| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
9741| [26536] Dovecot IMAP LIST information disclosure
9742| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
9743| [24709] Dovecot APPEND command denial of service
9744| [22629] RHSA-2005:408 updates for cyrus-imapd not installed
9745| [19460] Cyrus IMAP imapd buffer overflow
9746| [19455] Cyrus IMAP imapd extension off-by-one buffer overflow
9747| [18492] Novell NetMail IMAPD 101_mEna buffer overflow
9748| [10803] UW IMAP (wu-imapd) authenticated user buffer overflow
9749| [9238] UW IMAP (wu-imapd) could allow a remote attacker to access arbitrary files
9750| [9055] UW IMAP (wu-imapd) partial mailbox attributes to request buffer overflow
9751| [7345] Slackware Linux imapd and ipop3d core dump
9752| [573] Imapd denial of service
9753|
9754| Exploit-DB - https://www.exploit-db.com:
9755| [30724] Perdition 1.17 IMAPD __STR_VWRITE Remote Format String Vulnerability
9756| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
9757| [22061] Cyrus IMAPD 1.4/1.5.19/2.0.12/2.0.16/2.1.9/2.1.10 Pre-Login Heap Corruption Vulnerability
9758| [21443] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (2)
9759| [21442] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (1)
9760| [19849] UoW imapd 10.234/12.264 COPY Buffer Overflow (meta)
9761| [19848] UoW imapd 10.234/12.264 LSUB Buffer Overflow (meta)
9762| [19847] UoW imapd 10.234/12.264 Buffer Overflow Vulnerabilities
9763| [19377] Ipswitch IMail 5.0 Imapd Buffer Overflow DoS Vulnerability
9764| [19107] Netscape Messaging Server 3.55,University of Washington imapd 10.234 Buffer Overflow Vulnerability
9765| [18354] WorldMail imapd 3.0 SEH overflow (egg hunter)
9766| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
9767| [16485] MailEnable IMAPD 1.54 - STATUS Request Buffer Overflow
9768| [16482] MDaemon 9.6.4 IMAPD FETCH Buffer Overflow
9769| [16480] MailEnable IMAPD W3C Logging Buffer Overflow
9770| [16477] Mdaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow
9771| [16475] MailEnable IMAPD (2.35) Login Request Buffer Overflow
9772| [16474] Qualcomm WorldMail 3.0 IMAPD LIST Buffer Overflow
9773| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
9774| [4429] Mercury/32 4.52 IMAPD SEARCH command Post-Auth Overflow Exploit
9775| [3627] IPSwitch IMail Server <= 8.20 IMAPD Remote Buffer Overflow Exploit
9776| [3527] Mercur IMAPD 5.00.14 Remote Denial of Service Exploit (win32)
9777| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
9778| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
9779| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
9780| [1380] Eudora Qualcomm WorldMail 3.0 (IMAPd) Remote Overflow Exploit
9781| [1332] MailEnable 1.54 Pro Universal IMAPD W3C Logging BoF Exploit
9782| [1327] FTGate4 Groupware Mail Server 4.1 (imapd) Remote Buffer Overflow PoC
9783| [1151] MDaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow Exploit
9784| [1124] IPSwitch IMail Server <= 8.15 IMAPD Remote Root Exploit
9785| [915] MailEnable Enterprise 1.x Imapd Remote Exploit
9786| [903] Cyrus imapd 2.2.4 - 2.2.8 (imapmagicplus) Remote Exploit
9787| [340] Linux imapd Remote Overflow File Retrieve Exploit
9788|
9789| OpenVAS (Nessus) - http://www.openvas.org:
9790| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
9791| [901025] Dovecot Version Detection
9792| [881425] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 x86_64
9793| [881403] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 x86_64
9794| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
9795| [881397] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 x86_64
9796| [881370] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 x86_64
9797| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
9798| [881318] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 x86_64
9799| [881255] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 x86_64
9800| [881050] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 i386
9801| [881049] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 i386
9802| [881007] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 i386
9803| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
9804| [880978] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 i386
9805| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
9806| [880958] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 i386
9807| [880905] CentOS Update for cyrus-imapd CESA-2009:1459 centos4 i386
9808| [880864] CentOS Update for cyrus-imapd CESA-2009:1459 centos5 i386
9809| [880826] CentOS Update for cyrus-imapd CESA-2009:1116 centos5 i386
9810| [880536] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 i386
9811| [870607] RedHat Update for dovecot RHSA-2011:0600-01
9812| [870520] RedHat Update for cyrus-imapd RHSA-2011:1508-01
9813| [870489] RedHat Update for cyrus-imapd RHSA-2011:1317-01
9814| [870471] RedHat Update for dovecot RHSA-2011:1187-01
9815| [870443] RedHat Update for cyrus-imapd RHSA-2011:0859-01
9816| [870153] RedHat Update for dovecot RHSA-2008:0297-02
9817| [864075] Fedora Update for cyrus-imapd FEDORA-2011-13832
9818| [863585] Fedora Update for cyrus-imapd FEDORA-2011-13869
9819| [863579] Fedora Update for cyrus-imapd FEDORA-2011-13860
9820| [863281] Fedora Update for cyrus-imapd FEDORA-2011-7193
9821| [863273] Fedora Update for cyrus-imapd FEDORA-2011-7217
9822| [863272] Fedora Update for dovecot FEDORA-2011-7612
9823| [863115] Fedora Update for dovecot FEDORA-2011-7258
9824| [861525] Fedora Update for dovecot FEDORA-2007-664
9825| [861394] Fedora Update for dovecot FEDORA-2007-493
9826| [861333] Fedora Update for dovecot FEDORA-2007-1485
9827| [860845] Fedora Update for dovecot FEDORA-2008-9202
9828| [860663] Fedora Update for dovecot FEDORA-2008-2475
9829| [860169] Fedora Update for dovecot FEDORA-2008-2464
9830| [860089] Fedora Update for dovecot FEDORA-2008-9232
9831| [840950] Ubuntu Update for dovecot USN-1295-1
9832| [840668] Ubuntu Update for dovecot USN-1143-1
9833| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
9834| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
9835| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
9836| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
9837| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
9838| [831590] Mandriva Update for cyrus-imapd MDVSA-2012:037 (cyrus-imapd)
9839| [831468] Mandriva Update for cyrus-imapd MDVSA-2011:149 (cyrus-imapd)
9840| [831410] Mandriva Update for cyrus-imapd MDVSA-2011:100 (cyrus-imapd)
9841| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
9842| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
9843| [831207] Mandriva Update for cyrus-imapd MDVA-2010:208 (cyrus-imapd)
9844| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
9845| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
9846| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
9847| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
9848| [800149] UW-imapd tmail and dmail BOF Vulnerabilities (Linux)
9849| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
9850| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
9851| [70696] Debian Security Advisory DSA 2377-1 (cyrus-imapd-2.2)
9852| [70407] Debian Security Advisory DSA 2318-1 (cyrus-imapd-2.2)
9853| [70259] FreeBSD Ports: dovecot
9854| [69965] Debian Security Advisory DSA 2258-1 (kolab-cyrus-imapd)
9855| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
9856| [69740] Debian Security Advisory DSA 2242-1 (cyrus-imapd-2.2)
9857| [66522] FreeBSD Ports: dovecot
9858| [66416] Mandriva Security Advisory MDVSA-2009:229-1 (cyrus-imapd)
9859| [66233] SLES10: Security update for Cyrus IMAPD
9860| [66226] SLES11: Security update for Cyrus IMAPD
9861| [66222] SLES9: Security update for Cyrus IMAPD
9862| [65938] SLES10: Security update for Cyrus IMAPD
9863| [65723] SLES11: Security update for Cyrus IMAPD
9864| [65523] SLES9: Security update for Cyrus IMAPD
9865| [65479] SLES9: Security update for cyrus-imapd
9866| [65094] SLES9: Security update for cyrus-imapd
9867| [65010] Ubuntu USN-838-1 (dovecot)
9868| [64989] CentOS Security Advisory CESA-2009:1459 (cyrus-imapd)
9869| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
9870| [64977] Debian Security Advisory DSA 1893-1 (cyrus-imapd-2.2 kolab-cyrus-imapd)
9871| [64965] Fedora Core 11 FEDORA-2009-9901 (cyrus-imapd)
9872| [64963] Fedora Core 10 FEDORA-2009-9869 (cyrus-imapd)
9873| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
9874| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
9875| [64898] FreeBSD Ports: cyrus-imapd
9876| [64864] Debian Security Advisory DSA 1881-1 (cyrus-imapd-2.2)
9877| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
9878| [64847] Fedora Core 10 FEDORA-2009-9428 (cyrus-imapd)
9879| [64846] Fedora Core 11 FEDORA-2009-9417 (cyrus-imapd)
9880| [64838] Mandrake Security Advisory MDVSA-2009:229 (cyrus-imapd)
9881| [64271] CentOS Security Advisory CESA-2009:1116 (cyrus-imapd)
9882| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
9883| [62854] FreeBSD Ports: dovecot-managesieve
9884| [61916] FreeBSD Ports: dovecot
9885| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
9886| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
9887| [60528] FreeBSD Ports: dovecot
9888| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
9889| [60089] FreeBSD Ports: dovecot
9890| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
9891| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
9892| [55807] Slackware Advisory SSA:2005-310-06 imapd
9893| [54861] Gentoo Security Advisory GLSA 200502-29 (cyrus-imapd)
9894| [54755] Gentoo Security Advisory GLSA 200411-34 (cyrus-imapd)
9895| [53739] Debian Security Advisory DSA 215-1 (cyrus-imapd)
9896| [53288] Debian Security Advisory DSA 597-1 (cyrus-imapd)
9897| [52297] FreeBSD Ports: cyrus-imapd
9898| [52296] FreeBSD Ports: cyrus-imapd
9899| [52295] FreeBSD Ports: cyrus-imapd
9900| [52294] FreeBSD Ports: cyrus-imapd
9901| [52172] FreeBSD Ports: cyrus-imapd
9902|
9903| SecurityTracker - https://www.securitytracker.com:
9904| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
9905| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
9906| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
9907| [1013278] Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code
9908|
9909| OSVDB - http://www.osvdb.org:
9910| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
9911| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
9912| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
9913| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
9914| [78304] Eudora WorldMail imapd SEH LIST Command Parsing Remote Overflow
9915| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
9916| [75445] Cyrus IMAP Server imapd index.c index_get_ids Function References Header NULL Dereference Remote DoS
9917| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
9918| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
9919| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
9920| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
9921| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
9922| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
9923| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
9924| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
9925| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
9926| [66113] Dovecot Mail Root Directory Creation Permission Weakness
9927| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
9928| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
9929| [66110] Dovecot Multiple Unspecified Buffer Overflows
9930| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
9931| [64783] Dovecot E-mail Message Header Unspecified DoS
9932| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
9933| [62796] Dovecot mbox Format Email Header Handling DoS
9934| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
9935| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
9936| [57843] Cyrus IMAP Server (cyrus-imapd) SIEVE Script Component (sieve/script.c) Crafted Script Handling Overflow
9937| [57681] UoW imap Server (uw-imapd) Arbitrary Remote File Access
9938| [52906] UW-imapd c-client Initial Request Remote Format String
9939| [52905] UW-imapd c-client Library RFC822BUFFER Routines rfc822_output_char Function Off-by-one
9940| [52456] UW-imapd on Debian Linux LOGIN Command Remote DoS
9941| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
9942| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
9943| [49485] UW-imapd dmail Utility Mailbox Name Handling Overflow
9944| [49484] UW-imapd tmail Utility Mailbox Name Handling Overflow
9945| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
9946| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
9947| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
9948| [43137] Dovecot mail_extra_groups Symlink File Manipulation
9949| [42979] Dovecot passdbs Argument Injection Authentication Bypass
9950| [42004] Perdition Mail Retrieval Proxy IMAPD IMAP Tag Remote Format String Arbitrary Code Execution
9951| [39876] Dovecot LDAP Auth Cache Security Bypass
9952| [39670] Mercury Mail Transport System IMAPD SEARCH Command Remote Overflow
9953| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
9954| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
9955| [31362] Novell NetMail IMAP Daemon (IMAPD) APPEND Command Remote Overflow
9956| [31361] Novell NetMail IMAP Daemon (IMAPD) APPEND Command DoS
9957| [31360] Novell NetMail IMAP Daemon (IMAPD) SUBSCRIBE Command Remote Overflow
9958| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
9959| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
9960| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
9961| [23281] Dovecot imap/pop3-login dovecot-auth DoS
9962| [23280] Dovecot Malformed APPEND Command DoS
9963| [18179] HP Tru64 UNIX imapd NLSPATH Environment Variable Local Overflow
9964| [13242] UW-imapd CRAM-MD5 Authentication Bypass
9965| [12385] Novell NetMail IMAPD 101_mEna Script Remote Overflow
9966| [12042] UoW imapd Multiple Unspecified Overflows
9967| [12037] UoW imapd (UW-IMAP) Multiple Command Remote Overflows
9968| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
9969| [911] UoW imapd AUTHENTICATE Command Remote Overflow
9970| [790] UoW imap Server (uw-imapd) BODY Request Remote Overflow
9971| [519] UoW imapd SIGABRT Signal Forced Crash Information Disclosure
9972|_
9973443/tcp open ssl/https Apache/2
9974| fingerprint-strings:
9975| FourOhFourRequest:
9976| HTTP/1.1 404 Not Found
9977| Date: Thu, 16 Jan 2020 19:16:45 GMT
9978| Server: Apache/2
9979| Content-Length: 315
9980| Connection: close
9981| Content-Type: text/html; charset=iso-8859-1
9982| <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
9983| <html><head>
9984| <title>404 Not Found</title>
9985| </head><body>
9986| <h1>Not Found</h1>
9987| <p>The requested URL was not found on this server.</p>
9988| <p>Additionally, a 404 Not Found
9989| error was encountered while trying to use an ErrorDocument to handle the request.</p>
9990| </body></html>
9991| GetRequest:
9992| HTTP/1.1 200 OK
9993| Date: Thu, 16 Jan 2020 19:16:43 GMT
9994| Server: Apache/2
9995| Upgrade: h2,h2c
9996| Connection: Upgrade, close
9997| Last-Modified: Fri, 30 Aug 2019 21:14:16 GMT
9998| ETag: "2c-5915c1ac9ba00"
9999| Accept-Ranges: bytes
10000| Content-Length: 44
10001| Vary: User-Agent
10002| Content-Type: text/html
10003| <html>Apache is functioning normally</html>
10004| HTTPOptions:
10005| HTTP/1.1 200 OK
10006| Date: Thu, 16 Jan 2020 19:16:44 GMT
10007| Server: Apache/2
10008| Upgrade: h2,h2c
10009| Connection: Upgrade, close
10010| Allow: GET,POST,OPTIONS,HEAD
10011| Vary: User-Agent
10012| Content-Length: 0
10013|_ Content-Type: text/html
10014|_http-server-header: Apache/2
10015465/tcp open ssl/smtp Exim smtpd 4.89
10016| vulners:
10017| cpe:/a:exim:exim:4.89:
10018| CVE-2019-15846 10.0 https://vulners.com/cve/CVE-2019-15846
10019| CVE-2019-13917 10.0 https://vulners.com/cve/CVE-2019-13917
10020| CVE-2019-10149 7.5 https://vulners.com/cve/CVE-2019-10149
10021| CVE-2018-6789 7.5 https://vulners.com/cve/CVE-2018-6789
10022| CVE-2017-16943 7.5 https://vulners.com/cve/CVE-2017-16943
10023| CVE-2017-16944 5.0 https://vulners.com/cve/CVE-2017-16944
10024|_ CVE-2017-1000369 2.1 https://vulners.com/cve/CVE-2017-1000369
10025| vulscan: VulDB - https://vuldb.com:
10026| [109969] Exim 4.88/4.89 SMTP Daemon receive.c bdat_getc denial of service
10027| [109968] Exim 4.88/4.89 SMTP Daemon receive.c receive_msg memory corruption
10028| [94599] Exim up to 4.87 information disclosure
10029| [13422] Exim 4.82 Mail Header dmarc.c expand_string memory corruption
10030| [6817] Exim up to 4.80 src/dkim.c dkim_exim_query_dns_txt memory corruption
10031| [141327] Exim up to 4.92.1 Backslash privilege escalation
10032| [138827] Exim up to 4.92 Expansion Code Execution
10033| [135932] Exim up to 4.92 privilege escalation
10034| [113048] Exim up to 4.90 SMTP Listener Message memory corruption
10035| [58841] exim up to 4.69 dkim_exim_verify_finish memory corruption
10036| [57462] Exim up to 4.75 Filesystem memory corruption
10037| [4280] Exim Server 4.x open_log race condition
10038|
10039| MITRE CVE - https://cve.mitre.org:
10040| [CVE-2012-5671] Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.
10041| [CVE-2012-0478] The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
10042| [CVE-2011-1764] Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.
10043| [CVE-2011-1407] The DKIM implementation in Exim 4.7x before 4.76 permits matching for DKIM identities to apply to lookup items, instead of only strings, which allows remote attackers to execute arbitrary code or access a filesystem via a crafted identity.
10044| [CVE-2011-0017] The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
10045| [CVE-2010-4345] Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
10046| [CVE-2010-4344] Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.
10047| [CVE-2010-2024] transports/appendfile.c in Exim before 4.72, when MBX locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/.
10048| [CVE-2010-2023] transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file.
10049| [CVE-2006-1251] Argument injection vulnerability in greylistclean.cron in sa-exim 4.2 allows remote attackers to delete arbitrary files via an email with a To field that contains a filename separated by whitespace, which is not quoted when greylistclean.cron provides the argument to the rm command.
10050| [CVE-2005-0022] Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.
10051| [CVE-2005-0021] Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function.
10052| [CVE-2004-0400] Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.
10053| [CVE-2004-0399] Stack-based buffer overflow in Exim 3.35, and other versions before 4, when the sender_verify option is true, allows remote attackers to cause a denial of service and possibly execute arbitrary code during sender verification.
10054| [CVE-2003-0743] Heap-based buffer overflow in smtp_in.c for Exim 3 (exim3) before 3.36 and Exim 4 (exim4) before 4.21 may allow remote attackers to execute arbitrary code via an invalid (1) HELO or (2) EHLO argument with a large number of spaces followed by a NULL character and a newline, which is not properly trimmed before the "(no argument given)" string is appended to the buffer.
10055| [CVE-2002-1381] Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
10056|
10057| SecurityFocus - https://www.securityfocus.com/bid/:
10058| [103049] Exim 'base64d()' Function Buffer Overflow Vulnerability
10059| [99252] Exim CVE-2017-1000369 Local Privilege Escalation Vulnerability
10060| [94947] Exim CVE-2016-9963 Unspecified Information Disclosure Vulnerability
10061| [84132] Exim CVE-2016-1531 Local Privilege Escalation Vulnerability
10062| [68857] Exim CVE-2014-2972 Local Privilege Escalation Vulnerability
10063| [67695] Exim 'dmarc.c' Remote Code Execution Vulnerability
10064| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
10065| [56285] Exim DKIM DNS Decoding CVE-2012-5671 Remote Buffer Overflow Vulnerability
10066| [47836] Exim DKIM CVE-2011-1407 Remote Code Execution Vulnerability
10067| [47736] Exim 'dkim_exim_verify_finish()' Remote Format String Vulnerability
10068| [46065] Exim 'log.c' Local Privilege Escalation Vulnerability
10069| [45341] Exim ALT_CONFIG_ROOT_ONLY 'exim' User Local Privilege Escalation Vulnerability
10070| [45308] Exim Crafted Header Remote Code Execution Vulnerability
10071| [40454] Exim MBX Locking Insecure Temporary File Creation Vulnerability
10072| [40451] Exim Sticky Mail Directory Local Privilege Escalation Vulnerability
10073| [36181] ikiwiki 'teximg' Plugin Insecure TeX Commands Information Disclosure Vulnerability
10074| [23977] Exim SpamAssassin Reply Remote Buffer Overflow Vulnerability
10075| [17110] sa-exim Unauthorized File Access Vulnerability
10076| [12268] Exim IP Address Command Line Argument Local Buffer Overflow Vulnerability
10077| [12188] Exim SPA Authentication Remote Buffer Overflow Vulnerability
10078| [12185] Exim Illegal IPv6 Address Buffer Overflow Vulnerability
10079| [10291] Exim Header Syntax Checking Remote Stack Buffer Overrun Vulnerability
10080| [10290] Exim Sender Verification Remote Stack Buffer Overrun Vulnerability
10081| [8518] Exim EHLO/HELO Remote Heap Corruption Vulnerability
10082| [6314] Exim Internet Mailer Format String Vulnerability
10083| [4096] Exim Configuration File Argument Command Line Buffer Overflow Vulnerability
10084| [3728] Exim Pipe Hostname Arbitrary Command Execution Vulnerability
10085| [2828] Exim Format String Vulnerability
10086| [1859] Exim Buffer Overflow Vulnerability
10087|
10088| IBM X-Force - https://exchange.xforce.ibmcloud.com:
10089| [84758] Exim sender_address parameter command execution
10090| [84015] Exim command execution
10091| [80186] Mozilla Firefox, Thunderbird, and SeaMonkey copyTexImage2D code execution
10092| [80184] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D calls code execution
10093| [79615] Exim dkim_exim_query_dns_txt() buffer overflow
10094| [75155] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D denial of service
10095| [67455] Exim DKIM processing code execution
10096| [67299] Exim dkim_exim_verify_finish() format string
10097| [65028] Exim open_log privilege escalation
10098| [63967] Exim config file privilege escalation
10099| [63960] Exim header buffer overflow
10100| [59043] Exim mail directory privilege escalation
10101| [59042] Exim MBX symlink
10102| [52922] ikiwiki teximg plugin information disclosure
10103| [34265] Exim spamd buffer overflow
10104| [25286] Sa-exim greylistclean.cron file deletion
10105| [22687] RHSA-2005:025 updates for exim not installed
10106| [18901] Exim dns_build_reverse buffer overflow
10107| [18764] Exim spa_base64_to_bits function buffer overflow
10108| [18763] Exim host_aton buffer overflow
10109| [16079] Exim require_verify buffer overflow
10110| [16077] Exim header_check_syntax buffer overflow
10111| [16075] Exim sender_verify buffer overflow
10112| [13067] Exim HELO or EHLO command heap overflow
10113| [10761] Exim daemon.c format string
10114| [8194] Exim configuration file -c command-line argument buffer overflow
10115| [7738] Exim allows attacker to hide commands in localhost names using pipes
10116| [6671] Exim "
10117| [1893] Exim MTA allows local users to gain root privileges
10118|
10119| Exploit-DB - https://www.exploit-db.com:
10120| [16925] Exim4 <= 4.69 - string_format Function Heap Buffer Overflow
10121| [15725] Exim 4.63 Remote Root Exploit
10122| [1009] Exim <= 4.41 dns_build_reverse Local Exploit
10123| [812] Exim <= 4.43 auth_spa_server() Remote PoC Exploit
10124| [796] Exim <= 4.42 Local Root Exploit
10125| [756] Exim <= 4.41 dns_build_reverse Local Exploit PoC
10126|
10127| OpenVAS (Nessus) - http://www.openvas.org:
10128| [100663] Exim < 4.72 RC2 Multiple Vulnerabilities
10129|
10130| SecurityTracker - https://www.securitytracker.com:
10131| [1025539] Exim DKIM Processing Flaw Lets Remote Users Execute Arbitrary Code
10132| [1025504] Exim DKIM Signature Format String Flaw Lets Remote Users Execute Arbitrary Code
10133| [1024859] Exim Configuration File Capability Lets Local Users Gain Elevated Privileges
10134| [1024858] Exim Buffer Overfow in string_format() Lets Remote Users Execute Arbitrary Code
10135| [1012904] Exim Buffer Overflow in dns_build_reverse() Lets Local Users Obtain Elevated Privileges
10136| [1012771] Exim Buffer Overflows in host_aton() and spa_base64_to_bits() May Let Local Users Gain Elevated Privileges
10137| [1010081] Exim Buffer Overflows in 'accept.c' and 'verify.c' Let Remote Users Execute Arbitrary Code
10138| [1007609] Exim Heap Overflow in 'smtp_in.c' May Allow Remote Arbitrary Code Execution
10139| [1005756] Exim Mail Server Format String Bug Lets Local Exim Administrators Execute Arbitrary Code With Root Privileges
10140| [1003547] Potential Bug in Exim Mail Server May Let Local Users Execute Code With Root Privileges
10141| [1003014] Exim Mail Server Pipe Address Validation Error May Let Remote Users Execute Arbitrary Code With Root Privileges in a Certain Configuration
10142| [1001694] Exim Mail Server May Allow Remote Users to Execute Arbitrary Code with Root-Level Privileges on the Server
10143|
10144| OSVDB - http://www.osvdb.org:
10145| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
10146| [87599] Mozilla Multiple Product copyTexImage2D Call Image Dimension Handling Memory Corruption
10147| [87581] Mozilla Multiple Product texImage2D Call Handling Memory Corruption
10148| [86616] Exim src/dkim.c dkim_exim_query_dns_txt() Function DNS Record Parsing Remote Overflow
10149| [81523] Mozilla Multiple Product WebGL texImage2D() Function JSVAL_TO_OBJECT Remote Code Execution
10150| [72642] Exim DKIM Identity Lookup Item Remote Code Execution
10151| [72156] Exim src/dkim.c dkim_exim_verify_finish() Function DKIM-Signature Header Format String
10152| [70696] Exim log.c open_log() Function Local Privilege Escalation
10153| [69860] Exim exim User Account Configuration File Directive Local Privilege Escalation
10154| [69685] Exim string_format Function Remote Overflow
10155| [65159] Exim transports/appendfile.c MBX Locking Race Condition Permission Modification
10156| [65158] Exim transports/appendfile.c Hardlink Handling Arbitrary File Overwrite
10157| [57575] teximg Plugin for ikiwiki TEX Command Arbitrary File Local Disclosure
10158| [23849] sa-exim greylistclean.cron Arbitrary File Deletion
10159| [13073] Oracle Database Server Advanced Queuing Component dbms_transform_eximp Unspecified Security Issue
10160| [12946] Exim -bh Command Line Option dns_build_reverse Function Local Overflow
10161| [12727] Exim SPA Authentication spa_base64_to_bits Function Remote Overflow
10162| [12726] Exim -be Command Line Option host_aton Function Local Overflow
10163| [10877] Exim smtp_in.c HELO/EHLO Remote Overflow
10164| [10360] Exim daemon.c pid_file_path Variable Manipulation Arbitrary Command Execution
10165| [10032] libXpm CreateXImage Function Integer Overflow
10166| [7160] Exim .forward :include: Option Privilege Escalation
10167| [6479] Vexim COOKIE Authentication Credential Disclosure
10168| [6478] Vexim Multiple Parameter SQL Injection
10169| [5930] Exim Parenthesis File Name Filter Bypass
10170| [5897] Exim header_syntax Function Remote Overflow
10171| [5896] Exim sender_verify Function Remote Overflow
10172| [5530] Exim Localhost Name Arbitrary Command Execution
10173| [5330] Exim Configuration File Variable Overflow
10174| [1855] Exim Batched SMTP Mail Header Format String
10175|_
10176587/tcp open smtp Exim smtpd 4.89
10177| vulscan: VulDB - https://vuldb.com:
10178| [109969] Exim 4.88/4.89 SMTP Daemon receive.c bdat_getc denial of service
10179| [109968] Exim 4.88/4.89 SMTP Daemon receive.c receive_msg memory corruption
10180| [94599] Exim up to 4.87 information disclosure
10181| [13422] Exim 4.82 Mail Header dmarc.c expand_string memory corruption
10182| [6817] Exim up to 4.80 src/dkim.c dkim_exim_query_dns_txt memory corruption
10183| [141327] Exim up to 4.92.1 Backslash privilege escalation
10184| [138827] Exim up to 4.92 Expansion Code Execution
10185| [135932] Exim up to 4.92 privilege escalation
10186| [113048] Exim up to 4.90 SMTP Listener Message memory corruption
10187| [58841] exim up to 4.69 dkim_exim_verify_finish memory corruption
10188| [57462] Exim up to 4.75 Filesystem memory corruption
10189| [4280] Exim Server 4.x open_log race condition
10190|
10191| MITRE CVE - https://cve.mitre.org:
10192| [CVE-2012-5671] Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.
10193| [CVE-2012-0478] The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
10194| [CVE-2011-1764] Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.
10195| [CVE-2011-1407] The DKIM implementation in Exim 4.7x before 4.76 permits matching for DKIM identities to apply to lookup items, instead of only strings, which allows remote attackers to execute arbitrary code or access a filesystem via a crafted identity.
10196| [CVE-2011-0017] The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
10197| [CVE-2010-4345] Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
10198| [CVE-2010-4344] Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.
10199| [CVE-2010-2024] transports/appendfile.c in Exim before 4.72, when MBX locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/.
10200| [CVE-2010-2023] transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file.
10201| [CVE-2006-1251] Argument injection vulnerability in greylistclean.cron in sa-exim 4.2 allows remote attackers to delete arbitrary files via an email with a To field that contains a filename separated by whitespace, which is not quoted when greylistclean.cron provides the argument to the rm command.
10202| [CVE-2005-0022] Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.
10203| [CVE-2005-0021] Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function.
10204| [CVE-2004-0400] Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.
10205| [CVE-2004-0399] Stack-based buffer overflow in Exim 3.35, and other versions before 4, when the sender_verify option is true, allows remote attackers to cause a denial of service and possibly execute arbitrary code during sender verification.
10206| [CVE-2003-0743] Heap-based buffer overflow in smtp_in.c for Exim 3 (exim3) before 3.36 and Exim 4 (exim4) before 4.21 may allow remote attackers to execute arbitrary code via an invalid (1) HELO or (2) EHLO argument with a large number of spaces followed by a NULL character and a newline, which is not properly trimmed before the "(no argument given)" string is appended to the buffer.
10207| [CVE-2002-1381] Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
10208|
10209| SecurityFocus - https://www.securityfocus.com/bid/:
10210| [103049] Exim 'base64d()' Function Buffer Overflow Vulnerability
10211| [99252] Exim CVE-2017-1000369 Local Privilege Escalation Vulnerability
10212| [94947] Exim CVE-2016-9963 Unspecified Information Disclosure Vulnerability
10213| [84132] Exim CVE-2016-1531 Local Privilege Escalation Vulnerability
10214| [68857] Exim CVE-2014-2972 Local Privilege Escalation Vulnerability
10215| [67695] Exim 'dmarc.c' Remote Code Execution Vulnerability
10216| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
10217| [56285] Exim DKIM DNS Decoding CVE-2012-5671 Remote Buffer Overflow Vulnerability
10218| [47836] Exim DKIM CVE-2011-1407 Remote Code Execution Vulnerability
10219| [47736] Exim 'dkim_exim_verify_finish()' Remote Format String Vulnerability
10220| [46065] Exim 'log.c' Local Privilege Escalation Vulnerability
10221| [45341] Exim ALT_CONFIG_ROOT_ONLY 'exim' User Local Privilege Escalation Vulnerability
10222| [45308] Exim Crafted Header Remote Code Execution Vulnerability
10223| [40454] Exim MBX Locking Insecure Temporary File Creation Vulnerability
10224| [40451] Exim Sticky Mail Directory Local Privilege Escalation Vulnerability
10225| [36181] ikiwiki 'teximg' Plugin Insecure TeX Commands Information Disclosure Vulnerability
10226| [23977] Exim SpamAssassin Reply Remote Buffer Overflow Vulnerability
10227| [17110] sa-exim Unauthorized File Access Vulnerability
10228| [12268] Exim IP Address Command Line Argument Local Buffer Overflow Vulnerability
10229| [12188] Exim SPA Authentication Remote Buffer Overflow Vulnerability
10230| [12185] Exim Illegal IPv6 Address Buffer Overflow Vulnerability
10231| [10291] Exim Header Syntax Checking Remote Stack Buffer Overrun Vulnerability
10232| [10290] Exim Sender Verification Remote Stack Buffer Overrun Vulnerability
10233| [8518] Exim EHLO/HELO Remote Heap Corruption Vulnerability
10234| [6314] Exim Internet Mailer Format String Vulnerability
10235| [4096] Exim Configuration File Argument Command Line Buffer Overflow Vulnerability
10236| [3728] Exim Pipe Hostname Arbitrary Command Execution Vulnerability
10237| [2828] Exim Format String Vulnerability
10238| [1859] Exim Buffer Overflow Vulnerability
10239|
10240| IBM X-Force - https://exchange.xforce.ibmcloud.com:
10241| [84758] Exim sender_address parameter command execution
10242| [84015] Exim command execution
10243| [80186] Mozilla Firefox, Thunderbird, and SeaMonkey copyTexImage2D code execution
10244| [80184] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D calls code execution
10245| [79615] Exim dkim_exim_query_dns_txt() buffer overflow
10246| [75155] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D denial of service
10247| [67455] Exim DKIM processing code execution
10248| [67299] Exim dkim_exim_verify_finish() format string
10249| [65028] Exim open_log privilege escalation
10250| [63967] Exim config file privilege escalation
10251| [63960] Exim header buffer overflow
10252| [59043] Exim mail directory privilege escalation
10253| [59042] Exim MBX symlink
10254| [52922] ikiwiki teximg plugin information disclosure
10255| [34265] Exim spamd buffer overflow
10256| [25286] Sa-exim greylistclean.cron file deletion
10257| [22687] RHSA-2005:025 updates for exim not installed
10258| [18901] Exim dns_build_reverse buffer overflow
10259| [18764] Exim spa_base64_to_bits function buffer overflow
10260| [18763] Exim host_aton buffer overflow
10261| [16079] Exim require_verify buffer overflow
10262| [16077] Exim header_check_syntax buffer overflow
10263| [16075] Exim sender_verify buffer overflow
10264| [13067] Exim HELO or EHLO command heap overflow
10265| [10761] Exim daemon.c format string
10266| [8194] Exim configuration file -c command-line argument buffer overflow
10267| [7738] Exim allows attacker to hide commands in localhost names using pipes
10268| [6671] Exim "
10269| [1893] Exim MTA allows local users to gain root privileges
10270|
10271| Exploit-DB - https://www.exploit-db.com:
10272| [16925] Exim4 <= 4.69 - string_format Function Heap Buffer Overflow
10273| [15725] Exim 4.63 Remote Root Exploit
10274| [1009] Exim <= 4.41 dns_build_reverse Local Exploit
10275| [812] Exim <= 4.43 auth_spa_server() Remote PoC Exploit
10276| [796] Exim <= 4.42 Local Root Exploit
10277| [756] Exim <= 4.41 dns_build_reverse Local Exploit PoC
10278|
10279| OpenVAS (Nessus) - http://www.openvas.org:
10280| [100663] Exim < 4.72 RC2 Multiple Vulnerabilities
10281|
10282| SecurityTracker - https://www.securitytracker.com:
10283| [1025539] Exim DKIM Processing Flaw Lets Remote Users Execute Arbitrary Code
10284| [1025504] Exim DKIM Signature Format String Flaw Lets Remote Users Execute Arbitrary Code
10285| [1024859] Exim Configuration File Capability Lets Local Users Gain Elevated Privileges
10286| [1024858] Exim Buffer Overfow in string_format() Lets Remote Users Execute Arbitrary Code
10287| [1012904] Exim Buffer Overflow in dns_build_reverse() Lets Local Users Obtain Elevated Privileges
10288| [1012771] Exim Buffer Overflows in host_aton() and spa_base64_to_bits() May Let Local Users Gain Elevated Privileges
10289| [1010081] Exim Buffer Overflows in 'accept.c' and 'verify.c' Let Remote Users Execute Arbitrary Code
10290| [1007609] Exim Heap Overflow in 'smtp_in.c' May Allow Remote Arbitrary Code Execution
10291| [1005756] Exim Mail Server Format String Bug Lets Local Exim Administrators Execute Arbitrary Code With Root Privileges
10292| [1003547] Potential Bug in Exim Mail Server May Let Local Users Execute Code With Root Privileges
10293| [1003014] Exim Mail Server Pipe Address Validation Error May Let Remote Users Execute Arbitrary Code With Root Privileges in a Certain Configuration
10294| [1001694] Exim Mail Server May Allow Remote Users to Execute Arbitrary Code with Root-Level Privileges on the Server
10295|
10296| OSVDB - http://www.osvdb.org:
10297| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
10298| [87599] Mozilla Multiple Product copyTexImage2D Call Image Dimension Handling Memory Corruption
10299| [87581] Mozilla Multiple Product texImage2D Call Handling Memory Corruption
10300| [86616] Exim src/dkim.c dkim_exim_query_dns_txt() Function DNS Record Parsing Remote Overflow
10301| [81523] Mozilla Multiple Product WebGL texImage2D() Function JSVAL_TO_OBJECT Remote Code Execution
10302| [72642] Exim DKIM Identity Lookup Item Remote Code Execution
10303| [72156] Exim src/dkim.c dkim_exim_verify_finish() Function DKIM-Signature Header Format String
10304| [70696] Exim log.c open_log() Function Local Privilege Escalation
10305| [69860] Exim exim User Account Configuration File Directive Local Privilege Escalation
10306| [69685] Exim string_format Function Remote Overflow
10307| [65159] Exim transports/appendfile.c MBX Locking Race Condition Permission Modification
10308| [65158] Exim transports/appendfile.c Hardlink Handling Arbitrary File Overwrite
10309| [57575] teximg Plugin for ikiwiki TEX Command Arbitrary File Local Disclosure
10310| [23849] sa-exim greylistclean.cron Arbitrary File Deletion
10311| [13073] Oracle Database Server Advanced Queuing Component dbms_transform_eximp Unspecified Security Issue
10312| [12946] Exim -bh Command Line Option dns_build_reverse Function Local Overflow
10313| [12727] Exim SPA Authentication spa_base64_to_bits Function Remote Overflow
10314| [12726] Exim -be Command Line Option host_aton Function Local Overflow
10315| [10877] Exim smtp_in.c HELO/EHLO Remote Overflow
10316| [10360] Exim daemon.c pid_file_path Variable Manipulation Arbitrary Command Execution
10317| [10032] libXpm CreateXImage Function Integer Overflow
10318| [7160] Exim .forward :include: Option Privilege Escalation
10319| [6479] Vexim COOKIE Authentication Credential Disclosure
10320| [6478] Vexim Multiple Parameter SQL Injection
10321| [5930] Exim Parenthesis File Name Filter Bypass
10322| [5897] Exim header_syntax Function Remote Overflow
10323| [5896] Exim sender_verify Function Remote Overflow
10324| [5530] Exim Localhost Name Arbitrary Command Execution
10325| [5330] Exim Configuration File Variable Overflow
10326| [1855] Exim Batched SMTP Mail Header Format String
10327|_
10328993/tcp open ssl/imaps?
10329995/tcp open ssl/pop3s?
103302222/tcp open http DirectAdmin httpd 1.59.5 (Registered to MEDYABIM)
10331|_http-trane-info: Problem with XML parsing of /evox/about
10332| vulscan: VulDB - https://vuldb.com:
10333| [134243] InfinitumIT DirectAdmin up to 1.561 FileManager CSRF privilege escalation
10334| [131477] JBMC DirectAdmin 1.55 /CMD_ACCOUNT_ADMIN cross site request forgery
10335| [112266] JBMC DirectAdmin up to 1.51 email_ftp_password_change Setting memory corruption
10336| [95172] Directadmin Controlpanel 1.50.1 /CMD_SELECT_USERS cross site scripting
10337| [95100] DirectAdmin up to 1.50.1 Crash denial of service
10338| [62578] DirectAdmin 1.403 cross site scripting
10339| [61198] Jbmc-software DirectAdmin 1.403 cross site scripting
10340| [48756] Jbmc-software DirectAdmin up to 1.292 cross site scripting
10341| [48060] Jbmc-software DirectAdmin up to 1.17 privilege escalation
10342| [38747] DirectAdmin 1.30.2 cross site scripting
10343| [37578] DirectAdmin 1.30.1 cross site scripting
10344| [36066] JBMC Software DirectAdmin 1.293 cross site scripting
10345| [35680] Jbmc Software DirectAdmin 1.293 cross site scripting
10346| [33341] JBMC Software DirectAdmin 1.28.1 cross site scripting
10347|
10348| MITRE CVE - https://cve.mitre.org:
10349| [CVE-2012-5305] Cross-site scripting (XSS) vulnerability in CMD_DOMAIN in JBMC Software DirectAdmin 1.403 allows remote attackers to inject arbitrary web script or HTML via the domain parameter.
10350| [CVE-2012-3842] Multiple cross-site scripting (XSS) vulnerabilities in CMD_DOMAIN in JBMC Software DirectAdmin 1.403 allow remote authenticated users with certain privileges to inject arbitrary web script or HTML via the (1) select0 or (2) select8 parameters.
10351| [CVE-2009-2216] Cross-site scripting (XSS) vulnerability in CMD_REDIRECT in DirectAdmin 1.33.6 and earlier allows remote attackers to inject arbitrary web script or HTML via the URI in a view=advanced request.
10352| [CVE-2009-1526] JBMC Software DirectAdmin before 1.334 allows local users to create or overwrite any file via a symlink attack on an arbitrary file in a certain temporary directory, related to a request for this temporary file in the PATH_INFO to the CMD_DB script during a backup action.
10353| [CVE-2009-1525] CMD_DB in JBMC Software DirectAdmin before 1.334 allows remote authenticated users to gain privileges via shell metacharacters in the name parameter during a restore action.
10354| [CVE-2007-4830] Cross-site scripting (XSS) vulnerability in CMD_BANDWIDTH_BREAKDOWN in DirectAdmin 1.30.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the user parameter.
10355| [CVE-2007-3501] Cross-site scripting (XSS) vulnerability in CMD_USER_STATS in DirectAdmin 1.30.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the domain parameter, a different vector than CVE-2007-1508.
10356| [CVE-2007-1926] Cross-site scripting (XSS) vulnerability in JBMC Software DirectAdmin before 1.293 does not properly display log files, which allows remote authenticated users to inject arbitrary web script or HTML via (1) http or (2) ftp requests logged in /var/log/directadmin/security.log
10357| [CVE-2006-5983] Multiple cross-site scripting (XSS) vulnerabilities in JBMC Software DirectAdmin 1.28.1 allow remote authenticated users to inject arbitrary web script or HTML via the (1) user parameter to (a) CMD_SHOW_RESELLER or (b) CMD_SHOW_USER in the Admin level
10358|
10359| SecurityFocus - https://www.securityfocus.com/bid/:
10360| [83952] DirectAdmin CVE-2006-2153 Cross-Site Scripting Vulnerability
10361| [63911] Installatron Plugin for DirectAdmin Insecure Temporary File Creation Vulnerability
10362| [63373] Installatron Plugin for DirectAdmin cURL Output Remote Privilege Escalation Vulnerability
10363| [62929] DirectAdmin Backup Multiple Security Vulnerabilities
10364| [61017] DirectAdmin Symlink Attack Multiple Remote Privilege Escalation Vulnerabilities
10365| [53281] DirectAdmin Multiple Cross Site Scripting Vulnerabilities
10366| [52848] RETIRED: DirectAdmin 'CMD_DOMAIN' Cross-Site Scripting Vulnerability
10367| [52845] JBMC Software DirectAdmin 'domain' Parameter Cross Site Scripting Vulnerability
10368| [47693] DirectAdmin 'mysql_backup' Folder Permissions Information Disclosure Vulnerability
10369| [47690] DirectAdmin Hard Link Local Privilege Escalation Vulnerability
10370| [38721] DirectAdmin 'CMD_DB_VIEW' Cross-Site Scripting Vulnerability
10371| [35450] DirectAdmin 'CMD_REDIRECT' Cross-Site Scripting Vulnerability
10372| [34678] DirectAdmin '/CMD_DB' Restore Action Local Privilege Escalation Vulnerability
10373| [34676] DirectAdmin '/CMD_DB' Backup Action Insecure Temporary File Creation Vulnerability
10374| [25607] DirectAdmin CMD_BANDWIDTH_BREAKDOWN Cross-Site Scripting Vulnerability
10375| [24688] DirectAdmin Domain Parameter Cross-Site Scripting Vulnerability
10376| [23254] DirectAdmin Logfile HTML Injection Vulnerability
10377| [22996] DirectAdmin CMD_USER_STATS Cross-Site Scripting Vulnerability
10378| [21049] DirectAdmin Multiple Cross-Site Scripting Vulnerabilities
10379|
10380| IBM X-Force - https://exchange.xforce.ibmcloud.com:
10381| [85490] DirectAdmin Backup System email account functionality symlink
10382| [85488] DirectAdmin Backup System symlink
10383| [74569] DirectAdmin CMD_DOMAIN cross-site scripting
10384| [72685] DirectAdmin domain parameter cross-site request forgery
10385| [67254] DirectAdmin MySQL information disclosure
10386| [67253] DirectAdmin hard link privilege escalation
10387| [56875] DirectAdmin name cross-site scripting
10388| [55181] DirectAdmin account cross-site request forgery
10389| [51292] DirectAdmin CMD_REDIRECT cross-site scripting
10390| [50167] DirectAdmin CMD_DB command execution
10391| [49416] DirectAdmin CMD_DB backup action symlink
10392| [36510] DirectAdmin user parameter cross-site scripting
10393| [35177] DirectAdmin domain parameter cross-site scripting
10394| [33390] DirectAdmin log file cross-site scripting
10395| [33023] DirectAdmin CMD_USER_STATS form cross-site scripting
10396| [30256] DirectAdmin user, TYPE, and name parameters cross-site scripting
10397|
10398| Exploit-DB - https://www.exploit-db.com:
10399| [29747] DirectAdmin 1.292 CMD_USER_STATS Cross-Site Scripting Vulnerability
10400| [29006] DirectAdmin 1.28/1.29 CMD_FTP_SHOW DOMAIN Parameter XSS
10401| [29005] DirectAdmin 1.28/1.29 CMD_EMAIL_LIST name Parameter XSS
10402| [29004] DirectAdmin 1.28/1.29 CMD_EMAIL_VACATION_MODIFY user Parameter XSS
10403| [29003] DirectAdmin 1.28/1.29 CMD_TICKET type Parameter XSS
10404| [29002] DirectAdmin 1.28/1.29 CMD_EMAIL_FORWARDER_MODIFY user Parameter XSS
10405| [29001] DirectAdmin 1.28/1.29 CMD_TICKET_CREATE TYPE Parameter XSS
10406| [29000] DirectAdmin 1.28/1.29 CMD_SHOW_USER user Parameter XSS
10407| [28999] DirectAdmin 1.28/1.29 CMD_SHOW_RESELLER user Parameter XSS
10408| [11813] DirectAdmin 1.34.4 - Multi CSRF vulnerability
10409| [11029] DirectAdmin <= 1.33.6 Symlink Permission Bypass
10410| [10779] DirectAdmin 1.34.0 - CSRF Create Administrator Vulnerability
10411|
10412| OpenVAS (Nessus) - http://www.openvas.org:
10413| No findings
10414|
10415| SecurityTracker - https://www.securitytracker.com:
10416| [1028744] DirectAdmin Backup System Flaws Let Local Users Gain Elevated Privileges
10417|
10418| OSVDB - http://www.osvdb.org:
10419| [94899] DirectAdmin Backup System Unspecified Email Account Function Symlink Local Privilege Escalation
10420| [94898] DirectAdmin Backup System Unspecified Symlink Arbitrary File Manipulation Local Privilege Escalation
10421| [80919] DirectAdmin CMD_DOMAIN Multiple Parameter XSS
10422| [72120] DirectAdmin mysql_backups Folder MySQL Database Backup Local Disclosure
10423| [72119] DirectAdmin Backup Creation Hard Link Check Weakness Local Privilege Escalation
10424| [62914] DirectAdmin CMD_DB_VIEW name Parameter XSS
10425| [61395] DirectAdmin Admin Account Creation CSRF
10426| [55296] DirectAdmin CMD_REDIRECT URL Parameter XSS
10427| [54015] DirectAdmin CMD_DB name Parameter Shell Metacharacter Arbitrary Command Execution
10428| [54014] DirectAdmin CMD_DB Database Backup Request Temporary File Symlink Arbitrary File Overwrite
10429| [36999] DirectAdmin CMD_BANDWIDTH_BREAKDOWN user Parameter XSS
10430| [36339] DirectAdmin CMD_USER_STATS domain Parameter XSS
10431| [34687] DirectAdmin http/ftp XSS Log Viewer Data Injection
10432| [34273] DirectAdmin CMD_USER_STATS RESULT Parameter XSS
10433| [32676] DirectAdmin CMD_FTP_SHOW DOMAIN Parameter XSS
10434| [32675] DirectAdmin CMD_EMAIL_LIST name Parameter XSS
10435| [32674] DirectAdmin CMD_EMAIL_VACATION_MODIFY user Parameter XSS
10436| [32673] DirectAdmin CMD_TICKET type Parameter XSS
10437| [32672] DirectAdmin CMD_EMAIL_FORWARDER_MODIFY user Parameter XSS
10438| [32671] DirectAdmin CMD_TICKET_CREATE TYPE Parameter XSS
10439| [32670] DirectAdmin CMD_SHOW_USER user Parameter XSS
10440| [32669] DirectAdmin CMD_SHOW_RESELLER user Parameter XSS
10441| [25138] DirectAdmin HTM_PASSWD domain Parameter XSS
10442|_
104433306/tcp open mysql MySQL 5.5.5-10.0.34-MariaDB
10444| vulners:
10445| MySQL 5.5.5-10.0.34-MariaDB:
10446|_ NODEJS:602 0.0 https://vulners.com/nodejs/NODEJS:602
10447| vulscan: VulDB - https://vuldb.com:
10448| [92900] Oracle MySQL Server up to 5.5.51/5.6.32/5.7.14 Optimizer denial of service
10449| [92898] Oracle MySQL Server up to 5.5.51/5.6.32/5.7.14 GIS denial of service
10450| [92897] Oracle MySQL Server up to 5.5.51 DML denial of service
10451| [92827] Oracle MySQL Server up to 5.5.51/5.6.32/5.7.14 Federated denial of service
10452| [92817] Oracle MySQL Server up to 5.5.51/5.6.32/5.7.14 Types denial of service
10453| [116762] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 DDL information disclosure
10454| [116761] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 Locking denial of service
10455| [116755] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 Optimizer denial of service
10456| [116751] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 Privileges denial of service
10457| [116742] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 Client programs denial of service
10458| [116738] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 DDL denial of service
10459| [116736] Oracle MySQL Server up to 5.5.59/5.6.39/5.7.21 InnoDB denial of service
10460| [112099] Oracle MySQL Server up to 5.5.58/5.6.38/5.7.20 Optimizer denial of service
10461| [112098] Oracle MySQL Server up to 5.5.58/5.6.38/5.7.20 Optimizer denial of service
10462| [112097] Oracle MySQL Server up to 5.5.58/5.6.38/5.7.20 Optimizer denial of service
10463| [112095] Oracle MySQL Server up to 5.5.58/5.6.38/5.7.20 DDL denial of service
10464| [112091] Oracle MySQL Server up to 5.5.58/5.6.38/5.7.19 Partition denial of service
10465| [108176] Oracle MySQL Server up to 5.5.57/5.6.37/5.7.11 Optimizer denial of service
10466| [108173] Oracle MySQL Server up to 5.5.57/5.6.37/5.7.19 DDL denial of service
10467| [108172] Oracle MySQL Server up to 5.5.57/5.6.37/5.7.19 Client programs information disclosure
10468| [104089] Oracle MySQL Server up to 5.5.56/5.6.36/5.7.18 DDL unknown vulnerability
10469| [104087] Oracle MySQL Server up to 5.5.56/5.6.36/5.7.18 DDL unknown vulnerability
10470| [104086] Oracle MySQL Server up to 5.5.56/5.6.36/5.7.18 Client mysqldump unknown vulnerability
10471| [104083] Oracle MySQL Server up to 5.5.56/5.6.36/5.7.18 Charsets denial of service
10472| [104075] Oracle MySQL Server up to 5.5.56/5.6.36/5.7.18 DML denial of service
10473| [104069] Oracle MySQL Server up to 5.5.56/5.6.36/5.7.18 C API denial of service
10474| [100225] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 DDL unknown vulnerability
10475| [100224] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Privileges denial of service
10476| [100223] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Privileges denial of service
10477| [100222] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Privileges denial of service
10478| [100218] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 DML denial of service
10479| [100215] Oracle MySQL Server up to 5.5.54/5.6.35 C API information disclosure
10480| [100207] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Optimizer denial of service
10481| [100204] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Client mysqldump unknown vulnerability
10482| [100203] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Thread Pooling denial of service
10483| [100200] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 Optimizer denial of service
10484| [100199] Oracle MySQL Server up to 5.5.54/5.6.35/5.7.17 DML denial of service
10485| [96814] MariaDB up to 5.5.54/10.0.29/10.1.21/10.2.3 libmysqlclient.so denial of service
10486| [95722] Oracle MySQL Server up to 5.5.53 Charsets denial of service
10487| [95715] Oracle MySQL Server 5.5.53/5.6.34/5.7.16 Optimizer denial of service
10488| [95713] Oracle MySQL Server 5.5.53/5.6.34/5.7.16 DML denial of service
10489| [95711] Oracle MySQL Server 5.5.53/5.6.34/5.7.16 DDL denial of service
10490| [92896] Oracle MySQL Server up to 5.5.50/5.6.31/5.7.13 DML denial of service
10491| [92818] Oracle MySQL Server up to 5.5.52/5.6.33/5.7.15 Encryption information disclosure
10492| [91505] Oracle MySQL up to 5.5.52/5.6.33/5.7.15 Logging my.cnf privilege escalation
10493| [63111] Oracle MySQL 5.5.19 Installation denial of service
10494| [7068] Oracle MySQL Server up to 5.5.19 Authentication information disclosure
10495| [7067] Oracle MySQL Server up to 5.5.19 sql/sql_acl.cc acl_get memory corruption
10496| [7066] Oracle MySQL Server up to 5.5.19 SELECT Command Crash denial of service
10497| [7065] Oracle MySQL Server up to 5.5.19 Create Table MDL_key::mdl_key_init memory corruption
10498| [5165] Oracle MySQL Server up to 5.5.19 Optimizer denial of service
10499|
10500| MITRE CVE - https://cve.mitre.org:
10501| [CVE-2012-5615] MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a, 5.3.11, 5.2.13, 5.1.66, and possibly other versions, generates different error messages with different time delays depending on whether a user name exists, which allows remote attackers to enumerate valid usernames.
10502| [CVE-2012-5613] ** DISPUTED ** MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a and possibly other versions, when configured to assign the FILE privilege to users who should not have administrative privileges, allows remote authenticated users to gain privileges by leveraging the FILE privilege to create files as the MySQL administrator. NOTE: the vendor disputes this issue, stating that this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. NOTE: it could be argued that this should not be included in CVE because it is a configuration issue.
10503| [CVE-2012-5612] Heap-based buffer overflow in Oracle MySQL 5.5.19 and other versions through 5.5.28, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code, as demonstrated using certain variations of the (1) USE, (2) SHOW TABLES, (3) DESCRIBE, (4) SHOW FIELDS FROM, (5) SHOW COLUMNS FROM, (6) SHOW INDEX FROM, (7) CREATE TABLE, (8) DROP TABLE, (9) ALTER TABLE, (10) DELETE FROM, (11) UPDATE, and (12) SET PASSWORD commands.
10504| [CVE-2012-5611] Stack-based buffer overflow in the acl_get function in Oracle MySQL 5.5.19 and other versions through 5.5.28, and 5.1.53 and other versions through 5.1.66, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command.
10505| [CVE-2012-1696] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
10506| [CVE-2012-0583] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.60 and earlier, and 5.5.19 and earlier, allows remote authenticated users to affect availability, related to MyISAM.
10507| [CVE-2010-3683] Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when a LOAD DATA INFILE request generates SQL errors, which allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a crafted request.
10508| [CVE-2010-3681] Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using the HANDLER interface and performing "alternate reads from two indexes on a table," which triggers an assertion failure.
10509| [CVE-2013-3812] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Replication.
10510| [CVE-2013-3809] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Audit Log.
10511| [CVE-2013-3808] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.
10512| [CVE-2013-3805] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Prepared Statements.
10513| [CVE-2013-3804] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
10514| [CVE-2013-3802] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Full Text Search.
10515| [CVE-2013-3801] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.
10516| [CVE-2013-3794] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Partition.
10517| [CVE-2013-3793] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.
10518| [CVE-2013-3783] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Parser.
10519| [CVE-2013-2392] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
10520| [CVE-2013-2391] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows local users to affect confidentiality and integrity via unknown vectors related to Server Install.
10521| [CVE-2013-2389] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
10522| [CVE-2013-2378] Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, 5.5.29 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Information Schema.
10523| [CVE-2013-2376] Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Stored Procedure.
10524| [CVE-2013-2375] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
10525| [CVE-2013-1861] MariaDB 5.5.x before 5.5.30, 5.3.x before 5.3.13, 5.2.x before 5.2.15, and 5.1.x before 5.1.68, and Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote attackers to cause a denial of service (crash) via a crafted geometry feature that specifies a large number of points, which is not properly handled when processing the binary representation of this feature, related to a numeric calculation error.
10526| [CVE-2013-1555] Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, and 5.5.29 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Partition.
10527| [CVE-2013-1552] Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
10528| [CVE-2013-1544] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.
10529| [CVE-2013-1532] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Information Schema.
10530| [CVE-2013-1531] Unspecified vulnerability in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Privileges.
10531| [CVE-2013-1526] Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Replication.
10532| [CVE-2013-1523] Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Optimizer.
10533| [CVE-2013-1521] Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Locking.
10534| [CVE-2013-1512] Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.
10535| [CVE-2013-1511] Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
10536| [CVE-2013-1506] Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, 5.5.29 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Locking.
10537| [CVE-2013-1502] Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.9 and earlier allows local users to affect availability via unknown vectors related to Server Partition.
10538| [CVE-2013-1492] Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.30, has unspecified impact and attack vectors, a different vulnerability than CVE-2012-0553.
10539| [CVE-2013-0389] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
10540| [CVE-2013-0386] Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Stored Procedure.
10541| [CVE-2013-0385] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows local users to affect confidentiality and integrity via unknown vectors related to Server Replication.
10542| [CVE-2013-0384] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Information Schema.
10543| [CVE-2013-0383] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote attackers to affect availability via unknown vectors related to Server Locking.
10544| [CVE-2013-0371] Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability, related to MyISAM.
10545| [CVE-2013-0368] Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
10546| [CVE-2013-0367] Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Partition.
10547| [CVE-2012-5614] Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (mysqld crash) via a SELECT command with an UpdateXML command containing XML with a large number of unique, nested elements.
10548| [CVE-2012-5383] ** DISPUTED ** Untrusted search path vulnerability in the installation functionality in Oracle MySQL 5.5.28, when installed in the top-level C:\ directory, might allow local users to gain privileges via a Trojan horse DLL in the "C:\MySQL\MySQL Server 5.5\bin" directory, which may be added to the PATH system environment variable by an administrator, as demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview. NOTE: CVE disputes this issue because the unsafe PATH is established only by a separate administrative action that is not a default part of the MySQL installation.
10549| [CVE-2012-5096] Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users with Server Privileges to affect availability via unknown vectors.
10550| [CVE-2012-5060] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.65 and earlier and 5.5.27 and earlier allows remote authenticated users to affect availability, related to GIS Extension.
10551| [CVE-2012-4414] Multiple SQL injection vulnerabilities in the replication code in Oracle MySQL possibly before 5.5.29, and MariaDB 5.1.x through 5.1.62, 5.2.x through 5.2.12, 5.3.x through 5.3.7, and 5.5.x through 5.5.25, allow remote authenticated users to execute arbitrary SQL commands via vectors related to the binary log. NOTE: as of 20130116, Oracle has not commented on claims from a downstream vendor that the fix in MySQL 5.5.29 is incomplete.
10552| [CVE-2012-3197] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Replication.
10553| [CVE-2012-3180] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
10554| [CVE-2012-3177] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server.
10555| [CVE-2012-3173] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to InnoDB Plugin.
10556| [CVE-2012-3167] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Full Text Search.
10557| [CVE-2012-3166] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
10558| [CVE-2012-3163] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Information Schema.
10559| [CVE-2012-3160] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows local users to affect confidentiality via unknown vectors related to Server Installation.
10560| [CVE-2012-3158] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Protocol.
10561| [CVE-2012-3156] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server.
10562| [CVE-2012-3150] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
10563| [CVE-2012-3149] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.26 and earlier allows remote authenticated users to affect confidentiality, related to MySQL Client.
10564| [CVE-2012-3147] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.26 and earlier allows remote attackers to affect integrity and availability, related to MySQL Client.
10565| [CVE-2012-3144] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server.
10566| [CVE-2012-2750] Unspecified vulnerability in MySQL 5.5.x before 5.5.23 has unknown impact and attack vectors related to a "Security Fix", aka Bug #59533. NOTE: this might be a duplicate of CVE-2012-1689, but as of 20120816, Oracle has not commented on this possibility.
10567| [CVE-2012-2749] MySQL 5.1.x before 5.1.63 and 5.5.x before 5.5.24 allows remote authenticated users to cause a denial of service (mysqld crash) via vectors related to incorrect calculation and a sort order index.
10568| [CVE-2012-2122] sql/password.c in Oracle MySQL 5.1.x before 5.1.63, 5.5.x before 5.5.24, and 5.6.x before 5.6.6, and MariaDB 5.1.x before 5.1.62, 5.2.x before 5.2.12, 5.3.x before 5.3.6, and 5.5.x before 5.5.23, when running in certain environments with certain implementations of the memcmp function, allows remote attackers to bypass authentication by repeatedly authenticating with the same incorrect password, which eventually causes a token comparison to succeed due to an improperly-checked return value.
10569| [CVE-2012-2102] MySQL 5.1.x before 5.1.62 and 5.5.x before 5.5.22 allows remote authenticated users to cause a denial of service (assertion failure and mysqld abort) by deleting a record and using HANDLER READ NEXT.
10570| [CVE-2012-1757] Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
10571| [CVE-2012-1756] Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors.
10572| [CVE-2012-1735] Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
10573| [CVE-2012-1734] Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier, and 5.5.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
10574| [CVE-2012-1705] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
10575| [CVE-2012-1703] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
10576| [CVE-2012-1702] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote attackers to affect availability via unknown vectors.
10577| [CVE-2012-1697] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.21 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.
10578| [CVE-2012-1690] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
10579| [CVE-2012-1689] Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier, and 5.5.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
10580| [CVE-2012-1688] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability, related to Server DML.
10581| [CVE-2012-0882] Buffer overflow in yaSSL, as used in MySQL 5.5.20 and possibly other versions including 5.5.x before 5.5.22 and 5.1.x before 5.1.62, allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VulnDisco Pack Professional 9.17. NOTE: as of 20120224, this disclosure has no actionable information. However, because the module author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. NOTE: due to lack of details, it is not clear whether this issue is a duplicate of CVE-2012-0492 or another CVE.
10582| [CVE-2012-0578] Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
10583| [CVE-2012-0574] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors.
10584| [CVE-2012-0572] Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
10585| [CVE-2012-0553] Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.28, has unspecified impact and attack vectors, a different vulnerability than CVE-2013-1492.
10586| [CVE-2012-0540] Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier and 5.5.23 and earlier allows remote authenticated users to affect availability, related to GIS Extension.
10587| [CVE-2012-0496] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
10588| [CVE-2012-0495] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0486, CVE-2012-0487, CVE-2012-0488, CVE-2012-0489, CVE-2012-0491, and CVE-2012-0493.
10589| [CVE-2012-0494] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows local users to affect availability via unknown vectors.
10590| [CVE-2012-0493] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0486, CVE-2012-0487, CVE-2012-0488, CVE-2012-0489, CVE-2012-0491, and CVE-2012-0495.
10591| [CVE-2012-0492] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0485.
10592| [CVE-2012-0491] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0486, CVE-2012-0487, CVE-2012-0488, CVE-2012-0489, CVE-2012-0493, and CVE-2012-0495.
10593| [CVE-2012-0490] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect availability via unknown vectors.
10594| [CVE-2012-0489] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0486, CVE-2012-0487, CVE-2012-0488, CVE-2012-0491, CVE-2012-0493, and CVE-2012-0495.
10595| [CVE-2012-0488] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0486, CVE-2012-0487, CVE-2012-0489, CVE-2012-0491, CVE-2012-0493, and CVE-2012-0495.
10596| [CVE-2012-0487] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0486, CVE-2012-0488, CVE-2012-0489, CVE-2012-0491, CVE-2012-0493, and CVE-2012-0495.
10597| [CVE-2012-0486] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0487, CVE-2012-0488, CVE-2012-0489, CVE-2012-0491, CVE-2012-0493, and CVE-2012-0495.
10598| [CVE-2012-0485] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0492.
10599| [CVE-2012-0484] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect confidentiality via unknown vectors.
10600| [CVE-2012-0120] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0485, and CVE-2012-0492.
10601| [CVE-2012-0119] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492.
10602| [CVE-2012-0118] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0113.
10603| [CVE-2012-0117] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0486, CVE-2012-0487, CVE-2012-0488, CVE-2012-0489, CVE-2012-0491, CVE-2012-0493, and CVE-2012-0495.
10604| [CVE-2012-0116] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
10605| [CVE-2012-0115] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492.
10606| [CVE-2012-0114] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows local users to affect confidentiality and integrity via unknown vectors.
10607| [CVE-2012-0113] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0118.
10608| [CVE-2012-0112] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492.
10609| [CVE-2012-0075] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect integrity via unknown vectors.
10610| [CVE-2011-5049] MySQL 5.5.8, when running on Windows, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted packet to TCP port 3306.
10611| [CVE-2011-2262] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote attackers to affect availability via unknown vectors.
10612| [CVE-2010-3839] MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (infinite loop) via multiple invocations of a (1) prepared statement or (2) stored procedure that creates a query with nested JOIN statements.
10613| [CVE-2010-3838] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a query that uses the (1) GREATEST or (2) LEAST function with a mixed list of numeric and LONGBLOB arguments, which is not properly handled when the function's result is "processed using an intermediate temporary table."
10614| [CVE-2010-3837] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object.
10615| [CVE-2010-3836] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (assertion failure and server crash) via vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers.
10616| [CVE-2010-3835] MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (mysqld server crash) by performing a user-variable assignment in a logical expression that is calculated and stored in a temporary table for GROUP BY, then causing the expression value to be used after the table is created, which causes the expression to be re-evaluated instead of accessing its value from the table.
10617| [CVE-2010-3834] Unspecified vulnerability in MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via vectors related to "materializing a derived table that required a temporary table for grouping" and "user variable assignments."
10618| [CVE-2010-3833] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 does not properly propagate type errors, which allows remote attackers to cause a denial of service (server crash) via crafted arguments to extreme-value functions such as (1) LEAST and (2) GREATEST, related to KILL_BAD_DATA and a "CREATE TABLE ... SELECT."
10619| [CVE-2009-4484] Multiple stack-based buffer overflows in the CertDecoder::GetName function in src/asn.cpp in TaoCrypt in yaSSL before 1.9.9, as used in mysqld in MySQL 5.0.x before 5.0.90, MySQL 5.1.x before 5.1.43, MySQL 5.5.x through 5.5.0-m2, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and daemon crash) by establishing an SSL connection and sending an X.509 client certificate with a crafted name field, as demonstrated by mysql_overflow1.py and the vd_mysql5 module in VulnDisco Pack Professional 8.11. NOTE: this was originally reported for MySQL 5.0.51a.
10620| [CVE-2006-4835] Bluview Blue Magic Board (BMB) (aka BMForum) 5.5 allows remote attackers to obtain sensitive information via a direct request to (1) footer.php, (2) header.php, (3) db_mysql_error.php, (4) langlist.php, (5) sendmail.php, or (6) style.php, which reveals the path in various error messages.
10621|
10622| SecurityFocus - https://www.securityfocus.com/bid/:
10623| [52154] RETIRED: MySQL 5.5.20 Unspecified Remote Code Execution Vulnerability
10624|
10625| IBM X-Force - https://exchange.xforce.ibmcloud.com:
10626| [85724] Oracle MySQL Server XA Transactions denial of service
10627| [85723] Oracle MySQL Server Server Replication denial of service
10628| [85722] Oracle MySQL Server InnoDB denial of service
10629| [85721] Oracle MySQL Server Server Privileges unspecified
10630| [85720] Oracle MySQL Server Server Partition denial of service
10631| [85719] Oracle MySQL Server Server Parser denial of service
10632| [85718] Oracle MySQL Server Server Options denial of service
10633| [85717] Oracle MySQL Server Server Options denial of service
10634| [85716] Oracle MySQL Server Server Optimizer denial of service
10635| [85715] Oracle MySQL Server Server Optimizer denial of service
10636| [85714] Oracle MySQL Server Prepared Statements denial of service
10637| [85713] Oracle MySQL Server InnoDB denial of service
10638| [85712] Oracle MySQL Server Full Text Search denial of service
10639| [85711] Oracle MySQL Server Data Manipulation Language denial of service
10640| [85710] Oracle MySQL Server Data Manipulation Language denial of service
10641| [85709] Oracle MySQL Server Audit Log unspecified
10642| [85708] Oracle MySQL Server MemCached unspecified
10643| [84846] Debian mysql-server package information disclosure
10644| [84375] Wireshark MySQL dissector denial of service
10645| [83554] Oracle MySQL Server Server Partition denial of service
10646| [83553] Oracle MySQL Server Server Locking denial of service
10647| [83552] Oracle MySQL Server Server Install unspecified
10648| [83551] Oracle MySQL Server Server Types denial of service
10649| [83550] Oracle MySQL Server Server Privileges unspecified
10650| [83549] Oracle MySQL Server InnoDB denial of service
10651| [83548] Oracle MySQL Server InnoDB denial of service
10652| [83547] Oracle MySQL Server Data Manipulation Language denial of service
10653| [83546] Oracle MySQL Server Stored Procedure denial of service
10654| [83545] Oracle MySQL Server Server Replication denial of service
10655| [83544] Oracle MySQL Server Server Partition denial of service
10656| [83543] Oracle MySQL Server Server Optimizer denial of service
10657| [83542] Oracle MySQL Server InnoDB denial of service
10658| [83541] Oracle MySQL Server Information Schema denial of service
10659| [83540] Oracle MySQL Server Data Manipulation Language denial of service
10660| [83539] Oracle MySQL Server Data Manipulation Language denial of service
10661| [83538] Oracle MySQL Server Server Optimizer unspecified
10662| [83537] Oracle MySQL Server MemCached denial of service
10663| [83536] Oracle MySQL Server Server Privileges unspecified
10664| [83535] Oracle MySQL Server Server Privileges unspecified
10665| [83534] Oracle MySQL Server Server unspecified
10666| [83533] Oracle MySQL Server Information Schema unspecified
10667| [83532] Oracle MySQL Server Server Locking unspecified
10668| [83531] Oracle MySQL Server Data Manipulation Language denial of service
10669| [83388] MySQL administrative login attempt detected
10670| [82963] Mambo MySQL database information disclosure
10671| [82946] Oracle MySQL buffer overflow
10672| [82945] Oracle MySQL buffer overflow
10673| [82895] Oracle MySQL and MariaDB geometry queries denial of service
10674| [81577] MySQL2JSON extension for TYPO3 unspecified SQL injection
10675| [81325] Oracle MySQL Server Server Privileges denial of service
10676| [81324] Oracle MySQL Server Server Partition denial of service
10677| [81323] Oracle MySQL Server Server Optimizer denial of service
10678| [81322] Oracle MySQL Server Server Optimizer denial of service
10679| [81321] Oracle MySQL Server Server denial of service
10680| [81320] Oracle MySQL Server MyISAM denial of service
10681| [81319] Oracle MySQL Server InnoDB denial of service
10682| [81318] Oracle MySQL Server InnoDB denial of service
10683| [81317] Oracle MySQL Server Server Locking denial of service
10684| [81316] Oracle MySQL Server Server denial of service
10685| [81315] Oracle MySQL Server Server Replication unspecified
10686| [81314] Oracle MySQL Server Server Replication unspecified
10687| [81313] Oracle MySQL Server Stored Procedure denial of service
10688| [81312] Oracle MySQL Server Server Optimizer denial of service
10689| [81311] Oracle MySQL Server Information Schema denial of service
10690| [81310] Oracle MySQL Server GIS Extension denial of service
10691| [80790] Oracle MySQL yaSSL buffer overflow
10692| [80553] Oracle MySQL and MariaDB salt security bypass
10693| [80443] Oracle MySQL Server unspecified code execution
10694| [80442] Oracle MySQL Server acl_get() buffer overflow
10695| [80440] Oracle MySQL Server table buffer overflow
10696| [80435] Oracle MySQL Server database privilege escalation
10697| [80434] Oracle MySQL Server COM_BINLOG_DUMP denial of service
10698| [80433] Oracle MySQL Server Stuxnet privilege escalation
10699| [80432] Oracle MySQL Server authentication information disclosure
10700| [79394] Oracle MySQL Server Server Installation information disclosure
10701| [79393] Oracle MySQL Server Server Replication denial of service
10702| [79392] Oracle MySQL Server Server Full Text Search denial of service
10703| [79391] Oracle MySQL Server Server denial of service
10704| [79390] Oracle MySQL Server Client information disclosure
10705| [79389] Oracle MySQL Server Server Optimizer denial of service
10706| [79388] Oracle MySQL Server Server Optimizer denial of service
10707| [79387] Oracle MySQL Server Server denial of service
10708| [79386] Oracle MySQL Server InnoDB Plugin denial of service
10709| [79385] Oracle MySQL Server InnoDB denial of service
10710| [79384] Oracle MySQL Server Client unspecified
10711| [79383] Oracle MySQL Server Server denial of service
10712| [79382] Oracle MySQL Server Protocol unspecified
10713| [79381] Oracle MySQL Server Information Schema unspecified
10714| [78954] SilverStripe MySQLDatabase.php information disclosure
10715| [78948] MySQL MyISAM table symlink
10716| [77865] MySQL unknown vuln
10717| [77864] MySQL sort order denial of service
10718| [77768] MySQLDumper refresh_dblist.php information disclosure
10719| [77177] MySQL Squid Access Report unspecified cross-site scripting
10720| [77065] Oracle MySQL Server Optimizer denial of service
10721| [77064] Oracle MySQL Server Optimizer denial of service
10722| [77063] Oracle MySQL Server denial of service
10723| [77062] Oracle MySQL InnoDB denial of service
10724| [77061] Oracle MySQL GIS Extension denial of service
10725| [77060] Oracle MySQL Server Optimizer denial of service
10726| [76189] MySQL unspecified error
10727| [76188] MySQL attempts security bypass
10728| [75287] MySQLDumper restore.php information disclosure
10729| [75286] MySQLDumper filemanagement.php directory traversal
10730| [75285] MySQLDumper main.php cross-site request forgery
10731| [75284] MySQLDumper install.php cross-site scripting
10732| [75283] MySQLDumper install.php file include
10733| [75282] MySQLDumper menu.php code execution
10734| [75022] Oracle MySQL Server Server Optimizer denial of service
10735| [75021] Oracle MySQL Server Server Optimizer denial of service
10736| [75020] Oracle MySQL Server Server DML denial of service
10737| [75019] Oracle MySQL Server Partition denial of service
10738| [75018] Oracle MySQL Server MyISAM denial of service
10739| [75017] Oracle MySQL Server Server Optimizer denial of service
10740| [74672] Oracle MySQL Server multiple unspecified
10741| [73092] MySQL unspecified code execution
10742| [72540] Oracle MySQL Server denial of service
10743| [72539] Oracle MySQL Server unspecified
10744| [72538] Oracle MySQL Server denial of service
10745| [72537] Oracle MySQL Server denial of service
10746| [72536] Oracle MySQL Server unspecified
10747| [72535] Oracle MySQL Server denial of service
10748| [72534] Oracle MySQL Server denial of service
10749| [72533] Oracle MySQL Server denial of service
10750| [72532] Oracle MySQL Server denial of service
10751| [72531] Oracle MySQL Server denial of service
10752| [72530] Oracle MySQL Server denial of service
10753| [72529] Oracle MySQL Server denial of service
10754| [72528] Oracle MySQL Server denial of service
10755| [72527] Oracle MySQL Server denial of service
10756| [72526] Oracle MySQL Server denial of service
10757| [72525] Oracle MySQL Server information disclosure
10758| [72524] Oracle MySQL Server denial of service
10759| [72523] Oracle MySQL Server denial of service
10760| [72522] Oracle MySQL Server denial of service
10761| [72521] Oracle MySQL Server denial of service
10762| [72520] Oracle MySQL Server denial of service
10763| [72519] Oracle MySQL Server denial of service
10764| [72518] Oracle MySQL Server unspecified
10765| [72517] Oracle MySQL Server unspecified
10766| [72516] Oracle MySQL Server unspecified
10767| [72515] Oracle MySQL Server denial of service
10768| [72514] Oracle MySQL Server unspecified
10769| [71965] MySQL port denial of service
10770| [70680] DBD::mysqlPP unspecified SQL injection
10771| [70370] TaskFreak! multi-mysql unspecified path disclosure
10772| [68799] mod_authnz_external module for Apache mysql-auth.pl SQL injection
10773| [68294] MySQLDriverCS statement.cs sql injection
10774| [68175] Prosody MySQL denial of service
10775| [67539] Zend Framework MySQL PDO security bypass
10776| [67254] DirectAdmin MySQL information disclosure
10777| [66567] Xoops mysql.sql information disclosure
10778| [65871] PyWebDAV MySQLAuthHandler class SQL injection
10779| [65543] MySQL Select Arbitrary data into a File
10780| [65529] MySQL Eventum full_name field cross-site scripting
10781| [65380] Oracle MySQL Eventum forgot_password.php cross-site scripting
10782| [65379] Oracle MySQL Eventum list.php cross-site scripting
10783| [65266] Accellion File Transfer Appliance MySQL default password
10784| [64878] MySQL Geometry denial of service
10785| [64877] MySQL EXPLAIN EXTENDED denial of service
10786| [64876] MySQL prepared statement denial of service
10787| [64845] MySQL extreme-value denial of service
10788| [64844] MySQL Gis_line_string::init_from_wkb denial of service
10789| [64843] MySQL user-variable denial of service
10790| [64842] MySQL view preparation denial of service
10791| [64841] MySQL prepared statement denial of service
10792| [64840] MySQL LONGBLOB denial of service
10793| [64839] MySQL invocations denial of service
10794| [64838] MySQL Gis_line_string::init_from_wkb denial of service
10795| [64689] MySQL dict0crea.c denial of service
10796| [64688] MySQL SET column denial of service
10797| [64687] MySQL BINLOG command denial of service
10798| [64686] MySQL InnoDB denial of service
10799| [64685] MySQL HANDLER interface denial of service
10800| [64684] MySQL Item_singlerow_subselect::store denial of service
10801| [64683] MySQL OK packet denial of service
10802| [63518] MySQL Query Browser GUI Tools information disclosure
10803| [63517] MySQL Administrator GUI Tools information disclosure
10804| [62272] MySQL PolyFromWKB() denial of service
10805| [62269] MySQL LIKE predicates denial of service
10806| [62268] MySQL joins denial of service
10807| [62267] MySQL GREATEST() or LEAST() denial of service
10808| [62266] MySQL GROUP_CONCAT() denial of service
10809| [62265] MySQL expression values denial of service
10810| [62264] MySQL temporary table denial of service
10811| [62263] MySQL LEAST() or GREATEST() denial of service
10812| [62262] MySQL replication privilege escalation
10813| [61739] MySQL WITH ROLLUP denial of service
10814| [61343] MySQL LOAD DATA INFILE denial of service
10815| [61342] MySQL EXPLAIN denial of service
10816| [61341] MySQL HANDLER denial of service
10817| [61340] MySQL BINLOG denial of service
10818| [61339] MySQL IN() or CASE denial of service
10819| [61338] MySQL SET denial of service
10820| [61337] MySQL DDL denial of service
10821| [61318] PHP mysqlnd_wireprotocol.c buffer overflow
10822| [61317] PHP php_mysqlnd_read_error_from_line buffer overflow
10823| [61316] PHP php_mysqlnd_auth_write buffer overflow
10824| [61274] MySQL TEMPORARY InnoDB denial of service
10825| [59905] MySQL ALTER DATABASE denial of service
10826| [59841] CMySQLite updateUser.php cross-site request forgery
10827| [59112] MySQL Enterprise Monitor unspecified cross-site request forgery
10828| [59075] PHP php_mysqlnd_auth_write() buffer overflow
10829| [59074] PHP php_mysqlnd_read_error_from_line() buffer overflow
10830| [59073] PHP php_mysqlnd_rset_header_read() buffer overflow
10831| [59072] PHP php_mysqlnd_ok_read() information disclosure
10832| [58842] MySQL DROP TABLE file deletion
10833| [58676] Template Shares MySQL information disclosure
10834| [58531] MySQL COM_FIELD_LIST buffer overflow
10835| [58530] MySQL packet denial of service
10836| [58529] MySQL COM_FIELD_LIST security bypass
10837| [58311] ClanSphere the captcha generator and MySQL driver SQL injection
10838| [57925] MySQL UNINSTALL PLUGIN security bypass
10839| [57006] Quicksilver Forums mysqldump information disclosure
10840| [56800] Employee Timeclock Software mysqldump information disclosure
10841| [56200] Flex MySQL Connector ActionScript SQL injection
10842| [55877] MySQL yaSSL buffer overflow
10843| [55622] kiddog_mysqldumper extension for TYPO3 information disclosure
10844| [55416] MySQL unspecified buffer overflow
10845| [55382] Ublog UblogMySQL.sql information disclosure
10846| [55251] PHP-MySQL-Quiz editquiz.php SQL injection
10847| [54597] MySQL sql_table.cc security bypass
10848| [54596] MySQL mysqld denial of service
10849| [54365] MySQL OpenSSL security bypass
10850| [54364] MySQL MyISAM table symlink
10851| [53950] The mysql-ocaml mysql_real_escape_string weak security
10852| [52978] Zmanda Recovery Manager for MySQL mysqlhotcopy privilege escalation
10853| [52977] Zmanda Recovery Manager for MySQL socket-server.pl command execution
10854| [52660] iScouter PHP Web Portal MySQL Password Retrieval
10855| [52220] aa33code mysql.inc information disclosure
10856| [52122] MySQL Connector/J unicode SQL injection
10857| [51614] MySQL dispatch_command() denial of service
10858| [51406] MySQL Connector/NET SSL spoofing
10859| [49202] MySQL UDF command execution
10860| [49050] MySQL XPath denial of service
10861| [48919] Cisco Application Networking Manager MySQL default account password
10862| [48163] libapache2-mod-auth-mysql module for Debian multibyte encoding SQL injection
10863| [47544] MySQL Calendar index.php SQL injection
10864| [47476] MySQL Calendar index.php nodstrumCalendarV2 security bypass
10865| [45649] MySQL MyISAM symlink security bypass
10866| [45648] MySQL MyISAM symlinks security bypass
10867| [45607] MySQL Quick Admin actions.php file include
10868| [45606] MySQL Quick Admin index.php file include
10869| [45590] MySQL command-line client cross-site scripting
10870| [45436] PromoteWeb MySQL go.php SQL injection
10871| [45042] MySQL empty bit-string literal denial of service
10872| [44662] mysql-lists unspecified cross-site scripting
10873| [42267] MySQL MyISAM security bypass
10874| [42211] GEDCOM_to_MySQL2 index.php, info.php and prenom.php cross-site scripting
10875| [42014] miniBB setup_mysql.php and setup_options.php SQL injection
10876| [40920] MySQL sql_select.cc denial of service
10877| [40734] MySQL Server BINLOG privilege escalation
10878| [40350] MySQL password information disclosure
10879| [39415] Debian GNU/Linux libdspam7-drv-mysql cron job password disclosure
10880| [39402] PHP LOCAL INFILE and MySQL extension security bypass
10881| [38999] aurora framework db_mysql.lib SQL injection
10882| [38990] MySQL federated engine denial of service
10883| [38989] MySQL DEFINER value privilege escalation
10884| [38988] MySQL DATA DIRECTORY and INDEX DIRECTORY privilege escalation
10885| [38964] MySQL RENAME TABLE symlink
10886| [38733] ManageEngine EventLog Analyzer MySQL default password
10887| [38284] MySQL ha_innodb.cc convert_search_mode_to_innobase() denial of service
10888| [38189] MySQL default root password
10889| [37235] Asterisk-Addons cdr_addon_mysql module SQL injection
10890| [37099] RHSA update for MySQL case sensistive database name privilege escalation not installed
10891| [36555] PHP MySQL extension multiple functions security bypass
10892| [35960] MySQL view privilege escalation
10893| [35959] MySQL CREATE TABLE LIKE information disclosure
10894| [35958] MySQL connection protocol denial of service
10895| [35291] MySQLDumper main.php security bypass
10896| [34811] MySQL udf_init and mysql_create_function command execution
10897| [34809] MySQL mysql_update privilege escalation
10898| [34349] MySQL ALTER information disclosure
10899| [34348] MySQL mysql_change_db privilege escalation
10900| [34347] MySQL RENAME TABLE weak security
10901| [34232] MySQL IF clause denial of service
10902| [33388] Advanced Website Creator (AWC) mysql_escape_string SQL injection
10903| [33285] Eve-Nuke mysql.php file include
10904| [32957] MySQL Commander dbopen.php file include
10905| [32933] cPanel load_language.php and mysqlconfig.php file include
10906| [32911] MySQL filesort function denial of service
10907| [32462] cPanel passwdmysql cross-site scripting
10908| [32288] RHSA-2006:0544 updates for mysql not installed
10909| [32266] MySQLNewsEngine affichearticles.php3 file include
10910| [31244] The Address Book MySQL export.php password information disclosure
10911| [31037] Php/Mysql Site Builder (PHPBuilder) htm2php.php directory traversal
10912| [30760] BTSaveMySql URL file disclosure
10913| [30191] StoryStream mysql.php and mysqli.php file include
10914| [30085] MySQL MS-DOS device name denial of service
10915| [30031] Agora MysqlfinderAdmin.php file include
10916| [29438] MySQLDumper mysqldumper_path/sql.php cross-site scripting
10917| [29179] paBugs class.mysql.php file include
10918| [29120] ZoomStats MySQL file include
10919| [28448] MySQL case sensitive database name privilege escalation
10920| [28442] MySQL GRANT EXECUTE privilege escalation
10921| [28387] FunkBoard admin/mysql_install.php and admin/pg_install.php unauthorized access
10922| [28202] MySQL multiupdate subselect query denial of service
10923| [28180] MySQL MERGE table security bypass
10924| [28176] PHP MySQL Banner Exchange lib.inc information disclosure
10925| [27995] Opsware Network Automation System MySQL plaintext password
10926| [27904] MySQL date_format() format string
10927| [27635] MySQL Instance Manager denial of service
10928| [27212] MySQL SELECT str_to_date denial of service
10929| [26875] MySQL ASCII escaping SQL injection
10930| [26420] Apple Mac OS X MySQL Manager blank password
10931| [26236] MySQL login packet information disclosure
10932| [26232] MySQL COM_TABLE_DUMP buffer overflow
10933| [26228] MySQL sql_parce.cc information disclosure
10934| [26042] MySQL running
10935| [25313] WoltLab Burning Board class_db_mysql.php cross-site scripting
10936| [24966] MySQL mysql_real_query logging bypass
10937| [24653] PAM-MySQL logging function denial of service
10938| [24652] PAM-MySQL authentication double free code execution
10939| [24567] PHP/MYSQL Timesheet index.php and changehrs.php SQL injection
10940| [24095] PHP ext/mysqli exception handling format string
10941| [23990] PHP mysql_connect() buffer overflow
10942| [23596] MySQL Auction search module could allow cross-site scripting
10943| [22642] RHSA-2005:334 updates for mysql not installed
10944| [21757] MySQL UDF library functions command execution
10945| [21756] MySQL LoadLibraryEx function denial of service
10946| [21738] MySQL UDF mysql_create_function function directory traversal
10947| [21737] MySQL user defined function buffer overflow
10948| [21640] MySQL Eventum multiple class SQL injection
10949| [21638] MySQL Eventum multiple scripts cross-site scripting
10950| [20984] xmysqladmin temporary file symlink
10951| [20656] MySQL mysql_install_db script symlink
10952| [20333] Plans MySQL password information disclosure
10953| [19659] MySQL CREATE TEMPORARY TABLE command creates insecure files
10954| [19658] MySQL udf_init function gain access
10955| [19576] auraCMS mysql_fetch_row function path disclosure
10956| [18922] MySQL mysqlaccess script symlink attack
10957| [18824] MySQL UDF root privileges
10958| [18464] mysql_auth unspecified vulnerability
10959| [18449] Sugar Sales plaintext MySQL password
10960| [17783] MySQL underscore allows elevated privileges
10961| [17768] MySQL MATCH ... AGAINST SQL statement denial of service
10962| [17667] MySQL UNION change denial of service
10963| [17666] MySQL ALTER TABLE RENAME bypass restriction
10964| [17493] MySQL libmysqlclient bulk inserts buffer overflow
10965| [17462] MySQLGuest AWSguest.php script cross-site scripting
10966| [17047] MySQL mysql_real_connect buffer overflow
10967| [17030] MySQL mysqlhotcopy insecure temporary file
10968| [16612] MySQL my_rnd buffer overflow
10969| [16604] MySQL check_scramble_323 function allows unauthorized access
10970| [15883] MySQL mysqld_multi script symlink attack
10971| [15617] MySQL mysqlbug script symlink attack
10972| [15417] Confixx db_mysql_loeschen2.php SQL injection
10973| [15280] Proofpoint Protection Server MySQL allows unauthorized access
10974| [13404] HP Servicecontrol Manager multiple vulnerabilities in MySQL could allow execution of code
10975| [13153] MySQL long password buffer overflow
10976| [12689] MySQL AB ODBC Driver stores ODBC passwords and usernames in plain text
10977| [12540] Teapop PostSQL and MySQL modules SQL injection
10978| [12337] MySQL mysql_real_connect function buffer overflow
10979| [11510] MySQL datadir/my.cnf modification could allow root privileges
10980| [11493] mysqlcc configuration and connection files are world writable
10981| [11340] SuckBot mod_mysql_logger denial of service
10982| [11199] MySQL mysql_change_user() double-free memory pointer denial of service
10983| [10850] MySQL libmysql client read_one_row buffer overflow
10984| [10849] MySQL libmysql client read_rows buffer overflow
10985| [10848] MySQL COM_CHANGE_USER password buffer overflow
10986| [10847] MySQL COM_CHANGE_USER command password authentication bypass
10987| [10846] MySQL COM_TABLE_DUMP unsigned integer denial of service
10988| [10483] Bugzilla stores passwords in plain text in the MySQL database
10989| [10455] gBook MySQL could allow administrative access
10990| [10243] MySQL my.ini "
10991| [9996] MySQL SHOW GRANTS command discloses adminstrator`s encrypted password
10992| [9909] MySQL logging disabled by default on Windows
10993| [9908] MySQL binding to the loopback adapter is disabled
10994| [9902] MySQL default root password could allow unauthorized access
10995| [8748] Cyrus SASL LDAP+MySQL patch allows user unauthorized POP access
10996| [8105] PHP MySQL client library allows an attacker to bypass safe_mode restrictions
10997| [7923] Conectiva Linux MySQL /var/log/mysql file has insecure permissions
10998| [7206] WinMySQLadmin stores MySQL password in plain text
10999| [6617] MySQL "
11000| [6419] MySQL drop database command buffer overflow
11001| [6418] MySQL libmysqlclient.so buffer overflow
11002| [5969] MySQL select buffer overflow
11003| [5447] pam_mysql authentication input
11004| [5409] MySQL authentication algorithm obtain password hash
11005| [5057] PCCS MySQL Database Admin Tool could reveal username and password
11006| [4228] MySQL unauthenticated remote access
11007| [3849] MySQL default test account could allow any user to connect to the database
11008| [1568] MySQL creates readable log files
11009|
11010| Exploit-DB - https://www.exploit-db.com:
11011| [18269] MySQL 5.5.8 - Remote Denial of Service (DOS)
11012|
11013| OpenVAS (Nessus) - http://www.openvas.org:
11014| [53251] Debian Security Advisory DSA 562-1 (mysql)
11015| [53230] Debian Security Advisory DSA 540-1 (mysql)
11016|
11017| SecurityTracker - https://www.securitytracker.com:
11018| [1028790] MySQL Multiple Bugs Let Remote Users Deny Service and Partially Access and Modify Data
11019| [1028449] MySQL Multiple Bugs Let Remote Authenticated Users Deny Service and Partially Access and Modify Data
11020| [1028004] MySQL Multiple Bugs Let Remote Authenticated Users Take Full Control or Deny Service and Let Local Users Access and Modify Data
11021| [1027829] MySQL Bug in UpdateXML() Lets Remote Authenticated Users Deny Service
11022| [1027828] MySQL Heap Overflow May Let Remote Authenticated Users Execute Arbitrary Code
11023| [1027827] MySQL Stack Overflow May Let Remote Authenticated Users Execute Arbitrary Code
11024| [1027665] MySQL Multiple Bugs Let Remote Authenticated Users Access and Modify Data and Deny Service and Local Users Access Data
11025| [1027263] MySQL Multiple Bugs Let Remote Authenticated Users Deny Service
11026| [1027143] MySQL memcmp() Comparison Error Lets Remote Users Bypass Authentication
11027| [1026934] MySQL Multiple Bugs Let Remote Users Deny Service
11028| [1026896] MySQL Unspecified Flaws Have Unspecified Impact
11029| [1026659] MySQL Unspecified Flaw Lets Remote Users Execute Arbitrary Code
11030| [1026530] MySQL Multiple Bugs Let Local and Remote Users Partially Access and Modifiy Data and Partially Deny Service
11031| [1024508] MySQL Replication Flaw Lets Remote Authenticated Users Gain Elevated Privileges
11032| [1024507] MySQL Multiple Flaws Let Remote Authenticated Users Deny Service
11033| [1024360] MySQL Multiple Flaws Let Remote Authenticated Users Deny Service
11034| [1024160] MySQL ALTER DATABASE Processing Error Lets Remote Authenticated Users Deny Service
11035| [1024033] MySQL COM_FIELD_LIST Packet Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
11036| [1024032] MySQL Large Packet Processing Flaw in my_net_skip_rest() Lets Remote Users Deny Service
11037| [1024031] MySQL COM_FIELD_LIST Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges
11038| [1024004] MySQL mi_delete_table() Symlink Flaw Lets Remote Authenticated Users Delete Data and Index Files
11039| [1023402] MySQL Unspecified Flaw Lets Remote Users Execute Arbitrary Code
11040| [1023220] MySQL Client Fails to Check Server Certificates in Certain Cases
11041| [1022812] MySQL Unspecified Buffer Overflow Lets Remote Users Execute Arbitrary Code
11042| [1022533] MySQL Format String Bug in dispatch_command() Lets Remote Users Deny Service
11043| [1022482] MySQL Connector/Net is Missing SSL Certificate Validation
11044| [1021786] MySQL Bug in ExtractValue()/UpdateXML() in Processing XPath Expressions Lets Remote Authenticated Users Deny Service
11045| [1021714] (Red Hat Issues Fix) mod_auth_mysql Input Validation Flaw Lets Remote Users Inject SQL Commands
11046| [1020858] MySQL Item_bin_string::Item_bin_string() Binary Value Processing Bug Lets Remote Authenticated Users Deny Service
11047| [1019995] MySQL MyISAM Options Let Local Users Overwrite Table Files
11048| [1019085] MySQL Bugs Let Remote Authenticated Users Gain Elevated Privileges and Deny Service
11049| [1019084] MySQL DATA DIRECTORY and INDEX DIRECTORY Options May Let Remote Authenticated Users Gain Elevated Privileges
11050| [1019083] MySQL BINLOG Filename Path Bug May Let Remote Authenticated Users Gain Elevated Privileges
11051| [1019060] MySQL Rename Table Bug Lets Remote Authenticated Users Modify System Table Information
11052| [1018978] MySQL convert_search_mode_to_innobase() Bug Lets Remote Authenticated Users Deny Service
11053| [1018824] Asterisk-Addons Input Validation Flaw in cdr_addon_mysql Lets Remote Users Inject SQL Commands
11054| [1018663] MySQL Table View Access Bug Lets Remote Authenticated Users Gain Elevated Privileges
11055| [1018629] MySQL Authentication Protocol Bug Lets Remote Users Deny Service
11056| [1018071] MySQL ALTER TABLE Function Lets Remote Authenticated Users Obtain Potentially Sensitive Information
11057| [1018070] MySQL SQL SECURITY INVOKER Routines Let Remote Authenticated Users Gain Elevated Privileges
11058| [1018069] MySQL Lets Remote Authenticated Users Issue the RENAME TABLE Command
11059| [1017746] MySQL Single Row Subselect Statements Let Remote Users Deny Service
11060| [1016790] MySQL Replication Error Lets Local Users Deny Service
11061| [1016710] MySQL Case-Sensitive Database Names May Let Users Access Restricted Databases
11062| [1016709] MySQL Error in Checking suid Routine Arguments May Let Users Gain Elevated Privileges
11063| [1016617] MySQL MERGE Access Control Error May Let Users Access a Restricted Table
11064| [1016566] Opsware Network Automation System Discloses MySQL Password to Local Users
11065| [1016216] MySQL Error in Parsing Multibyte Encoded Data in mysql_real_escape() Lets Remote Users Inject SQL Commands
11066| [1016077] Apple MySQL Manager Database Initialization Bug May Let Local Users Access the Database
11067| [1016017] MySQL Anonymous Login Processing May Disclose Some Memory Contents to Remote Users
11068| [1016016] MySQL COM_TABLE_DUMP Processing Lets Remote Authenticated Users Execute Arbitrary Code or Obtain Information
11069| [1015789] Woltlab Burning Board Input Validation Hole in 'class_db_mysql.php' Permits Cross-Site Scripting Attacks
11070| [1015693] MySQL Query Bug Lets Remote Users Bypass Query Logging
11071| [1015603] PAM-MySQL pam_get_item() Double Free May Let Remote Users Execute Arbitrary Code
11072| [1015485] PHP mysqli Extension Error Mode Format String Flaw May Let Users Execute Arbitrary Code
11073| [1014603] MySQL Eventum Input Validation Hole in 'class.auth.php' Permits SQL Injection and Other Input Validation Bugs Permit Cross-Site Scripting Attacks
11074| [1014172] xMySQLadmin Lets Local Users Delete Files
11075| [1013995] MySQL 'mysql_install_db' Uses Unsafe Temporary Files and May Let Local Users Gain Elevated Privilege
11076| [1013994] MySQL Non-existent '--user' Error May Allow the Database to Run With Incorrect Privileges
11077| [1013415] MySQL CREATE FUNCTION Lets Authenticated Users Invoke libc Functions to Execute Arbitrary Code
11078| [1013414] MySQL udf_init() Path Validation Flaw Lets Authenticated Users Execute Arbitrary Libraries
11079| [1013413] MySQL CREATE TEMPORARY TABLE Uses Predictable Temporary Files That May Let Users Gain Elevated Privileges
11080| [1012914] MySQL 'mysqlaccess.sh' Unsafe Temporary Files May Let Local Users Gain Elevated Privileges
11081| [1012893] MySQL MaxDB Buffer Overflow in websql Password Parameter Lets Remote Users Execute Arbitrary Code
11082| [1012500] mysql_auth Memory Leak Has Unspecified Impact
11083| [1011741] MySQL Access Control Error in Databases With Underscore Wildcard Character May Grant Unauthorized Access
11084| [1011606] MySQL May Let Remote Authenticated Users Access Restricted Tables or Crash the System
11085| [1011408] MySQL libmysqlclient Buffer Overflow in Executing Prepared Statements Has Unspecified Impact
11086| [1011376] MySQLGuest Lack of Input Validation Lets Remote Users Conduct Cross-Site Scripting Attacks
11087| [1011008] MySQL Buffer Overflow in mysql_real_connect() May Let Remote Users Execute Arbitrary Code
11088| [1010979] MySQL 'mysqlhotcopy' Unsafe Temporary Files May Let Local Users Gain Elevated Privileges
11089| [1010645] MySQL check_scramble_323() Zero-Length Comparison Lets Remote Users Bypass Authentication
11090| [1009784] MySQL 'mysqld_multi' Temporary File Flaw Lets Local Users Overwrite Files
11091| [1009554] MySQL 'mysqlbug' Temporary File Flaw Lets Local Users Overwrite Files
11092| [1007979] MySQL mysql_change_user() Double Free Error Lets Remote Authenticated Users Crash mysqld
11093| [1007673] MySQL acl_init() Buffer Overflow Permits Remote Authenticated Administrators to Execute Arbitrary Code
11094| [1007518] DWebPro Discloses MySQL Database Password to Local Users
11095| [1007312] MySQL World-Writable Configuration File May Let Local Users Gain Root Privileges
11096| [1006976] MySQL Buffer Overflow in 'mysql_real_connect()' Client Function May Let Remote or Local Users Execute Arbitrary Code
11097| [1005800] MySQL Overflow and Authentication Bugs May Let Remote Users Execute Code or Access Database Accounts
11098| [1005345] MySQL Buffer Overflow Lets Local Users Gain System Privileges on Windows NT
11099| [1004506] vBulletin PHP-based Forum Software Has Unspecified Security Flaw in the 'db_mysql.php' Module
11100| [1004172] PHP-Survey Script Discloses Underlying MySQL Database Username and Password to Remote Users
11101| [1003955] 3rd Party Patch for Cyrus SASL ('auxprop for mysql and ldap') Lets Remote Users Access Protected POP Mail Accounts Without Authentication
11102| [1003290] Conectiva Linux MySQL Distribution May Allow Local Users to Obtain Sensitive Information
11103| [1002993] PurePostPro Script Add-on for PureFTPd and MySQL Allows Remote Users to Execute SQL Commands on the Server
11104| [1002485] WinMySQLadmin Database Administration Tool Discloses MySQL Password to Local Users
11105| [1002324] Vpopmail Mail Server Discloses Database Password to Local Users When Installed with MySQL
11106| [1001411] phpMyAdmin Administration Tool for MySQL Allows Remote Users to Execute Commands on the Server
11107| [1001118] MySQL Database Allows Authorized Users to Modify Server Files to Deny Service or Obtain Additional Access
11108|
11109| OSVDB - http://www.osvdb.org:
11110| [95337] Oracle MySQL Server XA Transactions Subcomponent Unspecified Remote DoS
11111| [95336] Oracle MySQL Server Replication Subcomponent Unspecified Remote DoS
11112| [95335] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
11113| [95334] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue
11114| [95333] Oracle MySQL Server Partition Subcomponent Unspecified Remote DoS
11115| [95332] Oracle MySQL Server Parser Subcomponent Unspecified Remote DoS
11116| [95331] Oracle MySQL Server Options Subcomponent Unspecified Remote DoS (2013-3801)
11117| [95330] Oracle MySQL Server Options Subcomponent Unspecified Remote DoS (2013-3808)
11118| [95329] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2013-3796)
11119| [95328] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2013-3804)
11120| [95327] Oracle MySQL Server Prepared Statements Subcomponent Unspecified Remote DoS
11121| [95326] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
11122| [95325] Oracle MySQL Server Full Text Search Subcomponent Unspecified Remote DoS
11123| [95324] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-3795)
11124| [95323] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-3793)
11125| [95322] Oracle MySQL Server Audit Log Subcomponent Unspecified Remote Issue
11126| [95321] Oracle MySQL Server MemCached Subcomponent Unspecified Remote Issue
11127| [95131] AutoMySQLBackup /usr/sbin/automysqlbackup Database Name Arbitrary Code Injection
11128| [94076] Debian Linux MySQL Server mysql-server-5.5.postinst Race Condition debian.cnf Plaintext Credential Local Disclosure
11129| [93505] Wireshark MySQL Dissector (packet-mysql.c) Malformed Packet Handling Infinite Loop Remote DoS
11130| [93174] MySQL Crafted Derived Table Handling DoS
11131| [92967] MySQL2JSON (mn_mysql2json) Extension for TYPO3 Unspecified SQL Injection
11132| [92950] MySQL Running START SLAVE Statement Process Listing Plaintext Local Password Disclosure
11133| [92485] Oracle MySQL Server Partition Subcomponent Unspecified Local DoS
11134| [92484] Oracle MySQL Server Locking Subcomponent Unspecified Remote DoS (2013-1506)
11135| [92483] Oracle MySQL Server Install Subcomponent Unspecified Local Issue
11136| [92482] Oracle MySQL Server Types Subcomponent Unspecified Remote DoS
11137| [92481] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue (2013-2381)
11138| [92480] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-1566)
11139| [92479] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-1511)
11140| [92478] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-1567)
11141| [92477] Oracle MySQL Server Stored Procedure Subcomponent Unspecified Remote DoS
11142| [92476] Oracle MySQL Server Replication Subcomponent Unspecified Remote DoS
11143| [92475] Oracle MySQL Server Partition Subcomponent Unspecified Remote DoS
11144| [92474] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS
11145| [92473] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-2389)
11146| [92472] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote DoS
11147| [92471] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-1512)
11148| [92470] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-1544)
11149| [92469] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote Issue
11150| [92468] Oracle MySQL Server MemCached Subcomponent Unspecified Remote DoS
11151| [92467] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue (2013-2375)
11152| [92466] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue (2013-1531)
11153| [92465] Oracle MySQL Server Server Subcomponent Unspecified Remote Issue
11154| [92464] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote Issue
11155| [92463] Oracle MySQL Server Locking Subcomponent Unspecified Remote Issue (2013-1521)
11156| [92462] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-2395)
11157| [91536] Oracle MySQL yaSSL Unspecified Overflow (2012-0553)
11158| [91534] Oracle MySQL yaSSL Unspecified Overflow (2013-1492)
11159| [91415] MySQL Raw Geometry Object String Conversion Remote DoS
11160| [91108] Juju mysql Charm Install Script mysql.passwd MySQL Password Plaintext Local Disclosure
11161| [89970] Site Go /site-go/admin/extra/mysql/index.php idm Parameter Traversal Arbitrary File Access
11162| [89265] Oracle MySQL Server Server Privileges Subcomponent Unspecified Remote DoS
11163| [89264] Oracle MySQL Server Server Partition Subcomponent Unspecified Remote DoS
11164| [89263] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-0578)
11165| [89262] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-1705)
11166| [89261] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-0574)
11167| [89260] Oracle MySQL Server MyISAM Subcomponent Unspecified Remote DoS
11168| [89259] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2012-0572)
11169| [89258] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-0368)
11170| [89257] Oracle MySQL Server Server Locking Subcomponent Unspecified Remote DoS
11171| [89256] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-1702)
11172| [89255] Oracle MySQL Server Server Replication Subcomponent Unspecified Remote Issue
11173| [89254] Oracle MySQL Server Server Replication Subcomponent Unspecified Local Issue
11174| [89253] Oracle MySQL Server Stored Procedure Subcomponent Unspecified Remote DoS
11175| [89252] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS
11176| [89251] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote DoS
11177| [89250] Oracle MySQL Server GIS Extension Subcomponent Unspecified Remote DoS
11178| [89042] ViciBox Server MySQL cron Service Default Credentials
11179| [88415] Oracle MySQL Server COM_CHANGE_USER Account Password Brute-Force Weakness
11180| [88118] Oracle MySQL Server FILE Privilege Database Privilege Escalation
11181| [88067] Oracle MySQL Server Authentication Error Message User Enumeration
11182| [88066] Oracle MySQL Server for Linux Access Rights Checking Routine Database Name Handling Stack Buffer Overflow
11183| [88065] Oracle MySQL Server COM_BINLOG_DUMP Invalid Data Handling DoS
11184| [88064] Oracle MySQL Server Multiple-Table DELETE Heap Buffer Overflow
11185| [87704] CodeIgniter MySQL / MySQLi Driver Database Client Multi-byte Character Set Unspecified SQL Injection
11186| [87507] Oracle MySQL Statement Logging Multiple Log Plaintext Local Password Disclosure
11187| [87501] Oracle MySQL optimizer_switch Malformed Value Processing Local DoS
11188| [87494] Oracle MySQL on Windows Field_new_decimal::store_value dbug_buff Variable Overflow DoS
11189| [87480] MySQL Malformed XML Comment Handling DoS
11190| [87466] MySQL SSL Certificate Revocation Weakness
11191| [87356] Oracle MySQL do_div_mod DIV Expression Handling Remote DoS
11192| [87355] Oracle MySQL handler::pushed_cond Table Cache Handling mysqld DoS
11193| [87354] Oracle MySQL Polygon Union / Intersection Spatial Operations DoS
11194| [86273] Oracle MySQL Server Server Installation Subcomponent Unspecified Local Information Disclosure
11195| [86272] Oracle MySQL Server Server Replication Subcomponent Unspecified Remote DoS
11196| [86271] Oracle MySQL Server Server Full Text Search Subcomponent Unspecified Remote DoS
11197| [86270] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-3156)
11198| [86269] Oracle MySQL Server MySQL Client Subcomponent Unspecified Remote Information Disclosure
11199| [86268] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-3180)
11200| [86267] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-3150)
11201| [86266] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-3144)
11202| [86265] Oracle MySQL Server InnoDB Plugin Subcomponent Unspecified Remote DoS
11203| [86264] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
11204| [86263] Oracle MySQL Server MySQL Client Subcomponent Unspecified Remote Issue
11205| [86262] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-3177)
11206| [86261] Oracle MySQL Server Protocol Subcomponent Unspecified Remote Issue
11207| [86260] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote Code Execution
11208| [86175] Oracle MySQL on Windows Path Subversion Arbitrary DLL Injection Code Execution
11209| [85155] Icinga module/idoutils/db/scripts/create_mysqldb.sh Icinga User Database Access Restriction Bypass
11210| [84755] Oracle MySQL Sort Order Index Calculation Remote DoS
11211| [84719] MySQLDumper index.php page Parameter XSS
11212| [84680] MySQL Squid Access Report access.log File Path XSS
11213| [83980] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2012-1689)
11214| [83979] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2012-1734)
11215| [83978] Oracle MySQL Server Subcomponent Unspecified Remote DoS
11216| [83977] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
11217| [83976] Oracle MySQL Server GIS Extension Subcomponent Unspecified Remote DoS
11218| [83975] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2012-1735)
11219| [83661] Oracle MySQL Unspecified Issue (59533)
11220| [82804] Oracle MySQL Authentication Protocol Token Comparison Casting Failure Password Bypass
11221| [82803] Oracle MySQL Unspecified Issue (59387)
11222| [82120] Oracle MySQL Version Specific Comment Handling Arbitrary SQL Command Execution
11223| [81897] Viscacha classes/database/mysql.inc.php Multiple Parameter SQL Injection
11224| [81616] MySQLDumper Multiple Script Direct Request Information Disclosure
11225| [81615] MySQLDumper filemanagement.php f Parameter Traversal Arbitrary File Access
11226| [81614] MySQLDumper File Upload PHP Code Execution
11227| [81613] MySQLDumper main.php Multiple Function CSRF
11228| [81612] MySQLDumper restore.php filename Parameter XSS
11229| [81611] MySQLDumper sql.php Multiple Parameter XSS
11230| [81610] MySQLDumper install.php Multiple Parameter XSS
11231| [81609] MySQLDumper install.php language Parameter Traversal Arbitrary File Access
11232| [81378] Oracle MySQL Server Server Optimizer Component Unspecified Remote DoS (2012-1690)
11233| [81377] Oracle MySQL Server Server Optimizer Component Unspecified Remote DoS (2012-1696)
11234| [81376] Oracle MySQL Server Server DML Component Unspecified Remote DoS
11235| [81375] Oracle MySQL Server Partition Component Unspecified Remote DoS
11236| [81374] Oracle MySQL Server MyISAM Component Unspecified Remote DoS
11237| [81373] Oracle MySQL Server Server Optimizer Component Unspecified Remote DoS (2012-1703)
11238| [81059] Oracle MySQL Server Multiple Unspecified Issues
11239| [79038] Webmin Process Listing MySQL Password Local Disclosure
11240| [78919] Oracle MySQL Unspecified Pre-authentication Remote Code Execution
11241| [78710] WordPress wp-admin/setup-config.php MySQL Query Saturation Brute-Force Proxy Weakness
11242| [78708] WordPress wp-admin/setup-config.php MySQL Database Verification Code Injection Weakness
11243| [78707] WordPress wp-admin/setup-config.php MySQL Credentials Error Message Brute-Force Weakness
11244| [78394] Oracle MySQL Server Unspecified Remote DoS (2012-0493)
11245| [78393] Oracle MySQL Server Unspecified Remote DoS (2012-0492)
11246| [78392] Oracle MySQL Server Unspecified Remote DoS (2012-0117)
11247| [78391] Oracle MySQL Server Unspecified Remote DoS (2012-0112)
11248| [78390] Oracle MySQL Server Unspecified Remote DoS (2012-0495)
11249| [78389] Oracle MySQL Server Unspecified Remote DoS (2012-0491)
11250| [78388] Oracle MySQL Server Unspecified Remote DoS (2012-0490)
11251| [78387] Oracle MySQL Server Unspecified Remote DoS (2012-0489)
11252| [78386] Oracle MySQL Server Unspecified Remote DoS (2012-0488)
11253| [78385] Oracle MySQL Server Unspecified Remote DoS (2012-0487)
11254| [78384] Oracle MySQL Server Unspecified Remote DoS (2012-0486)
11255| [78383] Oracle MySQL Server Unspecified Remote DoS (2012-0485)
11256| [78382] Oracle MySQL Server Unspecified Remote DoS (2012-0120)
11257| [78381] Oracle MySQL Server Unspecified Remote DoS (2012-0119)
11258| [78380] Oracle MySQL Server Unspecified Remote DoS (2012-0115)
11259| [78379] Oracle MySQL Server Unspecified Remote DoS (2012-0102)
11260| [78378] Oracle MySQL Server Unspecified Remote DoS (2012-0101)
11261| [78377] Oracle MySQL Server Unspecified Remote DoS (2012-0087)
11262| [78376] Oracle MySQL Server Unspecified Remote DoS (2011-2262)
11263| [78375] Oracle MySQL Server Unspecified Local DoS
11264| [78374] Oracle MySQL Server Unspecified Remote Issue (2012-0075)
11265| [78373] Oracle MySQL Server Unspecified Local Issue
11266| [78372] Oracle MySQL Server Unspecified Remote Information Disclosure
11267| [78371] Oracle MySQL Server Unspecified Remote Issue (2012-0496)
11268| [78370] Oracle MySQL Server Unspecified Remote Issue (2012-0118)
11269| [78369] Oracle MySQL Server Unspecified Remote Issue (2012-0116)
11270| [78368] Oracle MySQL Server Unspecified Remote Issue (2012-0113)
11271| [78283] Oracle MySQL NULL Pointer Dereference Packet Parsing Remote DoS
11272| [77042] e107 CMS install_.php MySQL Server Name Parsing Remote PHP Code Execution
11273| [77040] DBD::mysqlPP Unspecified SQL Injection
11274| [75888] TaskFreak! multi-mysql Multiple Script Direct Request Path Disclosure
11275| [74120] Apache HTTP Server mod_authnz_external mysql/mysql-auth.pl user Field SQL Injection
11276| [73555] Prosody MySQL Value Column Invalid Data Type Handling DoS
11277| [73387] Zend Framework PDO_MySql Character Set Security Bypass
11278| [72836] Arctic Fox CMS Multiple Script Direct Request MySQL Settings Disclosure
11279| [72660] MySQL GUI Tools Administrator / Query Browser Command Line Credentials Local Disclosure
11280| [72120] DirectAdmin mysql_backups Folder MySQL Database Backup Local Disclosure
11281| [71368] Accellion File Transfer Appliance Weak MySQL root Password
11282| [70967] MySQL Eventum Admin User Creation CSRF
11283| [70966] MySQL Eventum preferences.php full_name Parameter XSS
11284| [70961] MySQL Eventum list.php Multiple Parameter XSS
11285| [70960] MySQL Eventum forgot_password.php URI XSS
11286| [70947] PyWebDAV DAVServer/mysqlauth.py get_userinfo() Multiple Parameter SQL Injection
11287| [70610] PHP MySQLi Extension set_magic_quotes_runtime Function mysqli_fetch_assoc Function Interaction Weakness
11288| [69885] SilverStripe modules/sapphire/trunk/core/model/MySQLDatabase.php showqueries Parameter SQL Command Disclosure
11289| [69395] MySQL Derived Table Grouping DoS
11290| [69394] MySQL Temporary Table Expression Re-Evaluation DoS
11291| [69393] MySQL GROUP_CONCAT() WITH ROLLUP Modifier DoS
11292| [69392] MySQL Extreme-Value Functions Mixed Arguments DoS
11293| [69391] MySQL Stored Procedures / Prepared Statements Nested Joins DoS
11294| [69390] MySQL Extreme-Value Functions Argument Parsing Type Error DoS
11295| [69389] MySQL CONVERT_TZ() Function Empty SET Column DoS
11296| [69388] MySQL InnoDB Storage Engine Table Handling Overflow
11297| [69387] MySQL LIKE Predicates Pre-Evaluation DoS
11298| [69001] MySQL PolyFromWKB() Function WKB Data Remote DoS
11299| [69000] MySQL HANDLER Interface Unspecified READ Request DoS
11300| [68997] MySQL Prepared-Statement Mode EXPLAIN DoS
11301| [68996] MySQL EXPLAIN EXTENDED Statement DoS
11302| [68995] MySQL GeometryCollection non-Geometry Value Assignment DoS
11303| [67488] phpMyAdmin libraries/dbi/mysqli.dbi.lib.php Unspecified Parameter XSS
11304| [67487] phpMyAdmin libraries/dbi/mysql.dbi.lib.php Unspecified Parameter XSS
11305| [67421] PHP Mysqlnd Extension mysqlnd_wireprotocol.c php_mysqlnd_rset_header_read Function Overflow
11306| [67420] PHP Mysqlnd Extension mysqlnd_wireprotocol.c php_mysqlnd_ok_read Function Arbitrary Memory Content Disclosure
11307| [67419] PHP Mysqlnd Extension php_mysqlnd_read_error_from_line Function Negative Buffer Length Value Overflow
11308| [67418] PHP Mysqlnd Extension php_mysqlnd_auth_write Function Multiple Overflows
11309| [67384] MySQL LOAD DATA INFILE Statement Incorrect OK Packet DoS
11310| [67383] MySQL EXPLAIN Statement Item_singlerow_subselect::store Function NULL Dereference DoS
11311| [67381] MySQL InnoDB Temporary Table Handling DoS
11312| [67380] MySQL BINLOG Statement Unspecified Argument DoS
11313| [67379] MySQL Multiple Operation NULL Argument Handling DoS
11314| [67378] MySQL Unique SET Column Join Statement Remote DoS
11315| [67377] MySQL DDL Statement Multiple Configuration Parameter DoS
11316| [66800] PHP Multiple mysqlnd_* Function Unspecified Overflow
11317| [66799] PHP mysqlnd Error Packet Handling Multiple Overflows
11318| [66731] PHP Bundled MySQL Library Unspecified Issue
11319| [66665] PHP MySQL LOAD DATA LOCAL open_basedir Bypass
11320| [65851] MySQL ALTER DATABASE #mysql50# Prefix Handling DoS
11321| [65450] phpGraphy mysql_cleanup.php include_path Parameter Remote File Inclusion
11322| [65085] MySQL Enterprise Monitor Unspecified CSRF
11323| [64843] MySQL DROP TABLE Command Symlink MyISAM Table Local Data Deletion
11324| [64588] MySQL sql/net_serv.cc my_net_skip_rest Function Large Packet Handling Remote DoS
11325| [64587] MySQL COM_FIELD_LIST Command Packet Table Name Argument Overflow
11326| [64586] MySQL COM_FIELD_LIST Command Packet Authentication Bypass
11327| [64524] Advanced Poll misc/get_admin.php mysql_host Parameter XSS
11328| [64447] Tirzen Framework (TZN) tzn_mysql.php Username Parameter SQL Injection Authentication Bypass
11329| [64320] ClanSphere MySQL Driver s_email Parameter SQL Injection
11330| [63903] MySQL sql/sql_plugin.cc mysql_uninstall_plugin Function UNINSTALL PLUGIN Command Privilege Check Weakness
11331| [63115] Quicksilver Forums mysqldump Process List Database Password Disclosure
11332| [62830] Employee Timeclock Software mysqldump Command-line Database Password Disclosure
11333| [62640] PHP mysqli_real_escape_string() Function Error Message Path Disclosure
11334| [62216] Flex MySQL Connector ActionScript SQL Query Arbitrary Code Execution
11335| [61752] kiddog_mysqldumper Extension for TYPO3 Unspecified Information Disclosure
11336| [61497] microTopic admin/mysql.php rating Parameter SQL Injection
11337| [60665] MySQL CREATE TABLE MyISAM Table mysql_unpacked_real_data_home Local Restriction Bypass
11338| [60664] MySQL sql/sql_table.cc Data Home Directory Symlink CREATE TABLE Access Restriction Bypass
11339| [60516] RADIO istek scripti estafresgaftesantusyan.inc Direct Request MySQL Database Credentials Disclosure
11340| [60489] MySQL GeomFromWKB() Function First Argument Geometry Value Handling DoS
11341| [60488] MySQL SELECT Statement WHERE Clause Sub-query DoS
11342| [60487] MySQL vio_verify_callback() Function Crafted Certificate MiTM Weakness
11343| [60356] MySql Client Library (libmysqlclient) mysql_real_connect Function Local Overflow
11344| [59907] MySQL on Windows bind-address Remote Connection Weakness
11345| [59906] MySQL on Windows Default Configuration Logging Weakness
11346| [59616] MySQL Hashed Password Weakness
11347| [59609] Suckbot mod_mysql_logger Shared Object Unspecified Remote DoS
11348| [59495] Cyrus SASL LDAP / MySQL Authentication Patch password Field SQL Injection Authentication Bypass
11349| [59062] phpMyAdmin Extension for TYPO3 MySQL Table Name Unspecified XSS
11350| [59045] phpMyAdmin Crafted MYSQL Table Name XSS
11351| [59030] mysql-ocaml for MySQL mysql_real_escape_string() Function Character Escaping Weakness
11352| [57587] Zmanda Recovery Manager for MySQL socket-server.pl system() Function Local Privilege Escalation
11353| [57586] Zmanda Recovery Manager for MySQL socket-server.pl system() Function Remote Shell Command Execution
11354| [56741] MySQL Connector/J Unicode w/ SJIS/Windows-31J Charset SQL Injection
11355| [56134] Virtualmin MySQL Module Execute SQL Feature Arbitrary File Access
11356| [55734] MySQL sql_parse.cc dispatch_command() Function Format String DoS
11357| [55566] MySQL Connector/NET SSL Certificate Verification Weakness
11358| [53525] MyBlog /config/mysqlconnection.inc Direct Request Information Disclosure
11359| [53524] blog+ includes/window_top.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
11360| [53523] blog+ includes/block_center_down.php row_mysql_blocks_center_down[file] Parameter Traversal Local File Inclusion
11361| [53522] blog+ includes/block_center_top.php row_mysql_blocks_center_top[file] Parameter Traversal Local File Inclusion
11362| [53521] blog+ includes/block_left.php row_mysql_blocks_left[file] Parameter Traversal Local File Inclusion
11363| [53520] blog+ includes/block_right.php row_mysql_blocks_right[file] Parameter Traversal Local File Inclusion
11364| [53519] blog+ includes/window_down.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
11365| [53366] GEDCOM_TO_MYSQL php/info.php Multiple Parameter XSS
11366| [53365] GEDCOM_TO_MYSQL php/index.php nom_branche Parameter XSS
11367| [53364] GEDCOM_TO_MYSQL php/prenom.php Multiple Parameter XSS
11368| [53360] Blogplus includes/window_top.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
11369| [53359] Blogplus includes/window_down.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
11370| [53358] Blogplus includes/block_right.php row_mysql_blocks_right[file] Parameter Traversal Local File Inclusion
11371| [53357] Blogplus includes/block_left.php row_mysql_blocks_left[file] Parameter Traversal Local File Inclusion
11372| [53356] Blogplus block_center_top.php row_mysql_blocks_center_top[file] Parameter Traversal Local File Inclusion
11373| [53355] Blogplus includes/block_center_down.php row_mysql_blocks_center_down[file] Parameter Traversal Local File Inclusion
11374| [53110] XOOPS Cube Legacy ErrorHandler::show() Function MySQL Error Message XSS
11375| [52729] Asterisk-addon cdr_addon_mysql.c Call Detail Record SQL Injection
11376| [52728] Tribox cdr_addon_mysql.c Call Detail Record XSS
11377| [52727] FreePBX cdr_addon_mysql.c Call Detail Record XSS
11378| [52726] Areski cdr_addon_mysql.c Call Detail Record XSS
11379| [52464] MySQL charset Column Truncation Weakness
11380| [52453] MySQL sql/item_xmlfunc.cc ExtractValue() / UpdateXML() Functions Scalar XPath DoS
11381| [52378] Cisco ANM MySQL root Account Default Password
11382| [52264] Broadcast Machine MySQLController.php controllers/baseDir Parameter Remote File Inclusion
11383| [51923] Apache HTTP Server mod-auth-mysql Module mod_auth_mysql.c Multibyte Character Encoding SQL Injection
11384| [51171] MySQL InnoDB convert_search_mode_to_innobase Function DoS
11385| [50892] MySQL Calendar index.php username Parameter SQL Injection
11386| [50827] Nodstrum MySQL Calendar nodstrumCalendarV2 Cookie Manipulation Admin Authentication Bypass
11387| [49875] PromoteWeb MySQL go.php id Parameter SQL Injection
11388| [48710] MySQL Command Line Client HTML Output XSS
11389| [48709] MySQL Quick Admin actions.php lang Parameter Traversal Local File Inclusion
11390| [48708] MySQL Quick Admin index.php language Cookie Traversal Local File Inclusion
11391| [48021] MySQL Empty Bit-String Literal Token SQL Statement DoS
11392| [47789] mysql-lists Unspecified XSS
11393| [47394] Keld PHP-MySQL News Script login.php username Parameter SQL Injection
11394| [45073] MySQLDumper Extension for TYPO3 Unspecified Authentication Bypass
11395| [44937] MySQL MyISAM Table CREATE TABLE Privilege Check Bypass
11396| [44138] Debian GNU/Linux libdspam7-drv-mysql Cron MySQL dspam Database Password Local Disclosure
11397| [44071] Phorum /include/db/mysql.php Unspecified Search SQL Injection
11398| [43180] MySQL sql_select.cc INFORMATION_SCHEMA Table Crafted Query Remote DoS
11399| [43179] MySQL Server BINLOG Statement Rights Checking Failure
11400| [42610] MySQL DEFINER View Value Crafted Statements Remote Privilege Escalation
11401| [42609] MySQL Federated Engine SHOW TABLE STATUS Query Remote DoS
11402| [42608] MySQL RENAME TABLE Symlink System Table Overwrite
11403| [42607] MySQL Multiple table-level DIRECTORY Remote Privilege Escalation
11404| [42460] MySQLDumper HTTP POST Request Remote Authentication Bypass
11405| [42423] AdventNet EventLog Analyzer MySQL Installation Default root Account
11406| [41861] Bacula make_catalog_backup Function MySQL Director Password Cleartext Disclosure
11407| [40232] PHP MySQL Banner Exchange inc/lib.inc Direct Request Database Disclosure
11408| [40188] Password Manager Pro (PMP) mysql Unspecified Remote Command Injection
11409| [39279] PHP mysql_error() Function XSS
11410| [39145] aurora framework db_mysql.lib pack_var() value Parameter SQL Injection
11411| [38567] NetClassifieds Mysql_db.php Halt_On_Error Setting Error Message Path Disclosure
11412| [38112] Excel Parser Pro sample/xls2mysql parser_path Parameter Remote File Inclusion
11413| [37880] Asterisk-Addons source/destination Numbers cdr_addon_mysql Module SQL Injection
11414| [37784] PHP MySQL Extension Multiple Function Security Restriction Bypass
11415| [37783] MySQL Community Server CREATE TABLE LIKE Table Structure Disclosure
11416| [37782] MySQL Community Server External Table View Privilege Escalation
11417| [37781] MySQL ALTER TABLE Information Disclosure
11418| [37539] GPL PHP Board db.mysql.inc.php root_path Parameter Remote File Inclusion
11419| [37195] Eve-Nuke Module for PHP-Nuke db/mysql.php phpbb_root_path
11420| [37015] paBugs class.mysql.php path_to_bt_dir Parameter Remote File Inclusion
11421| [36868] PHP MySQLi Extension LOCAL INFILE Operation Security Restriction Bypass
11422| [36867] PHP MySQL Extension LOCAL INFILE Operation Security Restriction Bypass
11423| [36771] InterWorx-CP SiteWorx mysql.php PATH_INFO Parameter XSS
11424| [36757] InterWorx-CP NodeWorx mysql.php PATH_INFO Parameter XSS
11425| [36732] MySQL Community Server Connection Protocol Malformed Password Packet Remote DoS
11426| [36251] Associated Press (AP) Newspower Default MySQL root Password
11427| [35168] Study Planner (Studiewijzer) db/mysql/db.inc.php SPL_CFG[dirroot] Parameter Remote File Inclusion
11428| [35037] Fantastico for cPanel includes/mysqlconfig.php fantasticopath Parameter Traversal Local File Inclusion
11429| [34780] Backup Manager Command Line Cleartext MySQL Password Disclosure
11430| [34766] MySQL RENAME TABLE Statement Arbitrary Table Name Modification
11431| [34765] MySQL mysql_change_db Function THD::db_access Privilege Escalation
11432| [34734] MySQL Crafted IF Clause Divide-by-zero NULL Dereference DoS
11433| [34038] MySQL Commander ressourcen/dbopen.php home Parameter Remote File Inclusion
11434| [33974] MySQL information_schema Table Subselect Single-Row DoS
11435| [33678] MySQLNewsEngine affichearticles.php3 newsenginedir Parameter Remote File Inclusion
11436| [33447] WGS-PPC (PPC Search Engine) config/mysql_config.php INC Parameter Remote File Inclusion
11437| [33372] deV!L'z Clanportal inc/filebrowser/browser.php MySQL Data Disclosure
11438| [33147] ActiveCalendar data/mysqlevents.php css Parameter XSS
11439| [32784] Storystream mysqli.php baseDir Parameter Remote File Inclusion
11440| [32783] Storystream mysql.php baseDir Parameter Remote File Inclusion
11441| [32421] Contenido CMS conlib/db_mysqli.inc Direct Request Path Disclosure
11442| [32272] JevonCMS /phplib/db_mysql.inc Direct Request Path Disclosure
11443| [32171] Blue Magic Board db_mysql_error.php Direct Request Path Disclosure
11444| [32056] BTSaveMySql Direct Request Config File Disclosure
11445| [32044] cPanel WebHost Manager (WHM) scripts/passwdmysql password Parameter XSS
11446| [32024] TikiWiki tiki-wiki_rss.php ver MySQL Credential Disclosure
11447| [31963] Agora MysqlfinderAdmin.php _SESSION[PATH_COMPOSANT] Parameter Remote File Inclusion
11448| [31431] ZoomStats libs/dbmax/mysql.php GLOBALS[lib][db][path] Parameter Remote File Inclusion
11449| [30172] TikiWiki Multiple Script Empty sort_mode Parameter MySQL Authentication Credential Disclosure
11450| [29696] MySQLDumper sql.php db Parameter XSS
11451| [29453] ConPresso CMS db_mysql.inc.php msg Parameter XSS
11452| [29122] cPanel mysqladmin/hooksadmin Unspecified Privilege Escalation
11453| [28296] MySQL Crafted multiupdate / subselects Query Local DoS
11454| [28288] MySQL Instance_options::complete_initialization Function Overflow
11455| [28030] Tutti Nova class.novaRead.mysql.php TNLIB_DIR Parameter Remote File Inclusion
11456| [28029] Tutti Nova class.novaAdmin.mysql.php TNLIB_DIR Parameter Remote File Inclusion
11457| [28028] Tutti Nova class.novaEdit.mysql.php TNLIB_DIR Parameter Remote File Inclusion
11458| [28013] MySQL SUID Routine Miscalculation Arbitrary DML Statement Execution
11459| [28012] MySQL Case Sensitivity Unauthorized Database Creation
11460| [27919] MySQL VIEW Access information_schema.views Information Disclosure
11461| [27703] MySQL MERGE Table Privilege Persistence
11462| [27593] Drupal database.mysqli.inc Multiple Parameter SQL Injection
11463| [27549] Opsware NAS /etc/init.d/mysqll MySQL root Cleartext Password Local Disclosure
11464| [27416] MySQL Server time.cc date_format Function Format String
11465| [27054] MySQL mysqld str_to_date Function NULL Argument DoS
11466| [26923] PHP/MySQL Classifieds (PHP Classifieds) search.php rate Parameter SQL Injection
11467| [26922] PHP/MySQL Classifieds (PHP Classifieds) AddAsset1.php Multiple Field XSS
11468| [26822] Bee-hive Lite include/listall.inc.php mysqlcall Parameter Remote File Inclusion
11469| [26821] Bee-hive Lite conad/include/mysqlCall.inc.php config Parameter Remote File Inclusion
11470| [26820] Bee-hive Lite conad/logout.inc.php mysqlCall Parameter Remote File Inclusion
11471| [26819] Bee-hive Lite conad/login.inc.php mysqlCall Parameter Remote File Inclusion
11472| [26818] Bee-hive Lite conad/checkPasswd.inc.php mysqlCall Parameter Remote File Inclusion
11473| [26817] Bee-hive Lite conad/changeUserDetails.inc.php mysqlCall Parameter Remote File Inclusion
11474| [26816] Bee-hive Lite conad/changeEmail.inc.php mysqlCall Parameter Remote File Inclusion
11475| [26125] Open Searchable Image Catalogue core.php do_mysql_query Function Error Message XSS
11476| [26123] Open Searchable Image Catalogue core.php do_mysql_query Function SQL Injection
11477| [25987] MySQL Multibyte Encoding SQL Injection Filter Bypass
11478| [25908] Drupal database.mysql.inc Multiple Parameter SQL Injection
11479| [25595] Apple Mac OS X MySQL Manager Blank root Password
11480| [25228] MySQL Crafted COM_TABLE_DUMP Request Arbitrary Memory Disclosure
11481| [25227] MySQL COM_TABLE_DUMP Packet Overflow
11482| [25226] MySQL Malformed Login Packet Remote Memory Disclosure
11483| [24245] Cholod Mysql Based Message Board Unspecified XSS
11484| [24244] Cholod Mysql Based Message Board mb.cgi showmessage Action SQL Injection
11485| [23963] WoltLab Burning Board class_db_mysql.php SQL Error Message XSS
11486| [23915] Netcool/NeuSecure MySQL Database Connection Restriction Bypass
11487| [23611] Aztek Forum index.php msg Variable Forced MySQL Error Information Disclosure
11488| [23526] MySQL Query NULL Charcter Logging Bypass
11489| [23157] PHP/MYSQL Timesheet changehrs.php Multiple Parameter SQL Injection
11490| [23156] PHP/MYSQL Timesheet index.php Multiple Parameter SQL Injection
11491| [22995] PAM-MySQL Authentication pam_get_item() Function Unspecified Privilege Escalation
11492| [22994] PAM-MySQL SQL Logging Facility Segfault DoS
11493| [22485] Recruitment Software admin/site.xml MySQL Authentication Credential Disclosure
11494| [22479] PHP mysqli Extension Error Message Format String
11495| [22232] PHP Pipe Variable mysql_connect() Function Overflow
11496| [21685] MySQL Auction Search Module keyword XSS
11497| [20698] Campsite notifyendsubs Cron MySQL Password Cleartext Remote Disclosure
11498| [20145] Proofpoint Protection Server Embedded MySQL Server Unpassworded root Account
11499| [19457] aMember Pro mysql.inc.php Remote File Inclusion
11500| [19377] MAXdev MD-Pro /MySQL_Tools/admin.php Path Disclosure
11501| [18899] MySQL UDF Library Arbitrary Function Load Privilege Escalation
11502| [18898] MySQL UDF LoadLibraryEx Function Nonexistent Library Load DoS
11503| [18897] MySQL on Windows UDF Create Function Traversal Privilege Escalation
11504| [18896] MySQL User-Defined Function init_syms() Function Overflow
11505| [18895] MySQL libmysqlclient.so host Parameter Remote Overflow
11506| [18894] MySQL drop database Request Remote Overflow
11507| [18622] FunkBoard mysql_install.php Email Field Arbitrary PHP Code Injection
11508| [18620] FunkBoard mysql_install.php Admin/Database Password Manipulation
11509| [18406] MySQL Eventum releases.php SQL Injection
11510| [18405] MySQL Eventum custom_fields_graph.php SQL Injection
11511| [18404] MySQL Eventum custom_fields.php SQL Injection
11512| [18403] MySQL Eventum login.php email Parameter SQL Injection Authentication Bypass
11513| [18402] MySQL Eventum get_jsrs_data.php F Parameter XSS
11514| [18401] MySQL Eventum list.php release Parameter XSS
11515| [18400] MySQL Eventum view.php id Parameter XSS
11516| [18173] MySQL on Windows USE Command MS-DOS Device Name DoS
11517| [17801] Bugzilla MySQL Replication Race Condition Information Disclosure
11518| [17223] xMySQLadmin Symlink Arbitrary File Deletion
11519| [16727] MySQL Nonexistent '--user' Error Incorrect Privilege Database Invocation
11520| [16689] MySQL mysql_install_db Symlink Arbitrary File Overwrite
11521| [16056] Plans Unspecified mySQL Remote Password Disclosure
11522| [15993] MySQL MaxDB Webtool Remote getIfHeader() WebDAV Function Remote Overflow
11523| [15817] MySQL MaxDB Web Tool getLockTokenHeader() Function Remote Overflow
11524| [15816] MySQL MaxDB Web Administration Service Malformed GET Request Overflow
11525| [15451] paNews auth.php mysql_prefix Parameter SQL Injection
11526| [14748] MySQL MS-DOS Device Names Request DoS
11527| [14678] MySQL CREATE FUNCTION Arbitrary libc Code Execution
11528| [14677] MySQL CREATE FUNCTION mysql.func Table Arbitrary Library Injection
11529| [14676] MySQL CREATE TEMPORARY TABLE Symlink Privilege Escalation
11530| [14386] phpMyAdmin mysqli.dbi.lib.php Path Disclosure
11531| [14052] Symantec Brightmail AntiSpam Multiple Default MySQL Accounts
11532| [13086] MySQL MaxDB Web Agent Malformed HTTP Header DoS
11533| [13085] MySQL MaxDB Web Agent WebDAV sapdbwa_GetUserData() Function Remote DoS
11534| [13013] MySQL mysqlaccess.sh Symlink Arbitrary File Manipulation
11535| [12919] MySQL MaxDB WebAgent websql Remote Overflow
11536| [12779] MySQL User Defined Function Privilege Escalation
11537| [12609] MySQL Eventum projects.php Multiple Parameter XSS
11538| [12608] MySQL Eventum preferences.php Multiple Parameter XSS
11539| [12607] MySQL Eventum forgot_password.php email Parameter XSS
11540| [12606] MySQL Eventum index.php email Parameter XSS
11541| [12605] MySQL Eventum Default Vendor Account
11542| [12275] MySQL MaxDB Web Tools wahttp Nonexistent File Request DoS
11543| [12274] MySQL MaxDB Web Tools WebDAV Handler Remote Overflow
11544| [11689] Roxen Web Server MySQL Socket Permission Weakness
11545| [10985] MySQL MATCH..AGAINST Query DoS
11546| [10959] MySQL GRANT ALL ON Privilege Escalation
11547| [10660] MySQL ALTER TABLE/RENAME Forces Old Permission Checks
11548| [10659] MySQL ALTER MERGE Tables to Change the UNION DoS
11549| [10658] MySQL mysql_real_connect() Function Remote Overflow
11550| [10532] MySQL MaxDB webdbm Server Field DoS
11551| [10491] AWS MySQLguest AWSguest.php Script Insertion
11552| [10244] MySQL libmysqlclient Prepared Statements API Overflow
11553| [10226] MySQLGuest AWSguest.php Multiple Field XSS
11554| [9912] PHP safe_mode MySQL Database Access Restriction Bypass
11555| [9911] Inter7 vpopmail MySQL Module Authentication Credential Disclosure
11556| [9910] MySQL mysql_change_user() Double-free Memory Pointer DoS
11557| [9909] MySQL datadir/my.cnf Modification Privilege Escalation
11558| [9908] MySQL my.ini Initialization File datadir Parameter Overflow
11559| [9907] MySQL SELECT Statement String Handling Overflow
11560| [9906] MySQL GRANT Privilege Arbitrary Password Modification
11561| [9509] teapop MySQL Authentication Module SQL Injection
11562| [9018] MySQL Backup Pro getbackup() Method Unspecified Issue
11563| [9015] MySQL mysqlhotcopy Insecure Temporary File Creation
11564| [8997] Cacti config.php MySQL Authentication Credential Cleartext Disclosure
11565| [8979] MySQL SHOW GRANTS Encrypted Password Disclosure
11566| [8889] MySQL COM_TABLE_DUMP Package Negative Integer DoS
11567| [8888] MySQL COM_CHANGE_USER Command Long Repsonse Overflow
11568| [8887] MySQL COM_CHANGE_USER Command One Character Password Brute Force
11569| [8886] MySQL libmysqlclient Library read_one_row Overflow
11570| [8885] MySQL libmysqlclient Library read_rows Overflow
11571| [7476] MySQL Protocol 4.1 Authentication Scramble String Overflow
11572| [7475] MySQL Zero-length Scrambled String Crafted Packet Authentication Bypass
11573| [7245] MySQL Pluggable Authentication Module (pam_mysql) Password Disclosure
11574| [7128] MySQL show database Database Name Exposure
11575| [6716] MySQL Database Engine Weak Authentication Information Disclosure
11576| [6605] MySQL mysqld Readable Log File Information Disclosure
11577| [6443] PowerPhlogger db_dump.php View Arbitrary mySQL Dump
11578| [6421] MySQL mysqld_multi Symlink Arbitrary File Overwrite
11579| [6420] MySQL mysqlbug Symlink Arbitrary File Overwrite
11580| [2537] MySQL sql_acl.cc get_salt_from_password Function Password Handling Remote Overflow
11581| [2144] WinMySQLadmin my.ini Cleartext Password Disclosure
11582| [653] PCCS-Linux MySQL Database Admin Tool Authentication Credential Disclosure
11583| [520] MySQL Database Name Traversal Arbitrary File Modification
11584| [380] MySQL Server on Windows Default Null Root Password
11585| [261] MySQL Short Check String Authentication Bypass
11586|_
115875900/tcp filtered vnc
1158816992/tcp filtered amt-soap-http
115891 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
11590SF-Port443-TCP:V=7.80%T=SSL%I=7%D=1/16%Time=5E20B69F%P=x86_64-pc-linux-gnu
11591SF:%r(GetRequest,140,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Thu,\x2016\x20Jan
11592SF:\x202020\x2019:16:43\x20GMT\r\nServer:\x20Apache/2\r\nUpgrade:\x20h2,h2
11593SF:c\r\nConnection:\x20Upgrade,\x20close\r\nLast-Modified:\x20Fri,\x2030\x
11594SF:20Aug\x202019\x2021:14:16\x20GMT\r\nETag:\x20\"2c-5915c1ac9ba00\"\r\nAc
11595SF:cept-Ranges:\x20bytes\r\nContent-Length:\x2044\r\nVary:\x20User-Agent\r
11596SF:\nContent-Type:\x20text/html\r\n\r\n<html>Apache\x20is\x20functioning\x
11597SF:20normally</html>\n")%r(HTTPOptions,D3,"HTTP/1\.1\x20200\x20OK\r\nDate:
11598SF:\x20Thu,\x2016\x20Jan\x202020\x2019:16:44\x20GMT\r\nServer:\x20Apache/2
11599SF:\r\nUpgrade:\x20h2,h2c\r\nConnection:\x20Upgrade,\x20close\r\nAllow:\x2
11600SF:0GET,POST,OPTIONS,HEAD\r\nVary:\x20User-Agent\r\nContent-Length:\x200\r
11601SF:\nContent-Type:\x20text/html\r\n\r\n")%r(FourOhFourRequest,1E1,"HTTP/1\
11602SF:.1\x20404\x20Not\x20Found\r\nDate:\x20Thu,\x2016\x20Jan\x202020\x2019:1
11603SF:6:45\x20GMT\r\nServer:\x20Apache/2\r\nContent-Length:\x20315\r\nConnect
11604SF:ion:\x20close\r\nContent-Type:\x20text/html;\x20charset=iso-8859-1\r\n\
11605SF:r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">
11606SF:\n<html><head>\n<title>404\x20Not\x20Found</title>\n</head><body>\n<h1>
11607SF:Not\x20Found</h1>\n<p>The\x20requested\x20URL\x20was\x20not\x20found\x2
11608SF:0on\x20this\x20server\.</p>\n<p>Additionally,\x20a\x20404\x20Not\x20Fou
11609SF:nd\nerror\x20was\x20encountered\x20while\x20trying\x20to\x20use\x20an\x
11610SF:20ErrorDocument\x20to\x20handle\x20the\x20request\.</p>\n</body></html>
11611SF:\n");
11612Device type: general purpose|storage-misc|broadband router|router|WAP|media device
11613Running (JUST GUESSING): Linux 2.6.X|3.X (95%), HP embedded (93%), MikroTik RouterOS 6.X (92%), Ubiquiti embedded (92%), Ubiquiti AirOS 5.X (92%), Infomir embedded (91%)
11614OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/h:hp:p2000_g3 cpe:/o:mikrotik:routeros:6.32.1 cpe:/h:ubnt:airmax_nanostation cpe:/o:ubnt:airos:5.5.9 cpe:/o:linux:linux_kernel:2.6 cpe:/h:infomir:mag-250
11615Aggressive OS guesses: Linux 2.6.32 (95%), Linux 2.6.32 - 3.1 (95%), Linux 2.6.32 - 3.13 (95%), Linux 2.6.32 - 2.6.39 (94%), Linux 2.6.39 (94%), Linux 3.10 (94%), Linux 3.2 (94%), HP P2000 G3 NAS device (93%), Linux 3.8 (93%), Linux 2.6.32 - 3.10 (92%)
11616No exact OS matches for host (test conditions non-ideal).
11617Uptime guess: 42.554 days (since Thu Dec 5 01:00:39 2019)
11618Network Distance: 17 hops
11619TCP Sequence Prediction: Difficulty=261 (Good luck!)
11620IP ID Sequence Generation: All zeros
11621Service Info: Host: erik.medyabim.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
11622
11623TRACEROUTE (using port 23/tcp)
11624HOP RTT ADDRESS
116251 132.53 ms 10.252.204.1
116262 61.26 ms 104.245.145.177
116273 71.99 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
116284 71.94 ms be3435.ccr31.yyz02.atlas.cogentco.com (154.54.85.57)
116295 72.00 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
116306 204.22 ms if-ae-2-2.tcore2.tnk-toronto.as6453.net (64.86.33.90)
116317 204.27 ms if-ae-2-2.tcore2.tnk-toronto.as6453.net (64.86.33.90)
116328 204.34 ms if-ae-26-2.tcore2.nto-new-york.as6453.net (216.6.81.28)
116339 203.70 ms if-ae-26-2.tcore2.nto-new-york.as6453.net (216.6.81.28)
1163410 212.32 ms if-ae-32-3.tcore2.ldn-london.as6453.net (80.231.20.106)
1163511 212.41 ms if-ae-15-2.tcore2.l78-london.as6453.net (80.231.131.117)
1163612 212.36 ms if-ae-6-3.tcore1.fnm-frankfurt.as6453.net (195.219.194.78)
1163713 212.39 ms if-ae-2-2.tcore1.av2-amsterdam.as6453.net (195.219.194.5)
1163814 212.31 ms if-ae-8-2.tcore1.it5-istanbul.as6453.net (195.219.156.22)
1163915 246.29 ms sol-gw-brs01.internetadresi.com (92.45.78.54)
1164016 212.44 ms 5.23.0.38
1164117 246.35 ms 93-89-20-20.static.internetadresi.com (93.89.20.20)
11642
11643NSE: Script Post-scanning.
11644Initiating NSE at 14:17
11645Completed NSE at 14:17, 0.00s elapsed
11646Initiating NSE at 14:17
11647Completed NSE at 14:17, 0.00s elapsed
11648#####################################################################################################################################
11649Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-16 14:17 EST
11650NSE: Loaded 47 scripts for scanning.
11651NSE: Script Pre-scanning.
11652Initiating NSE at 14:17
11653Completed NSE at 14:17, 0.00s elapsed
11654Initiating NSE at 14:17
11655Completed NSE at 14:17, 0.00s elapsed
11656Initiating Parallel DNS resolution of 1 host. at 14:17
11657Completed Parallel DNS resolution of 1 host. at 14:17, 0.02s elapsed
11658Initiating UDP Scan at 14:17
11659Scanning 93-89-20-20.static.internetadresi.com (93.89.20.20) [15 ports]
11660Discovered open port 53/udp on 93.89.20.20
11661Increasing send delay for 93.89.20.20 from 0 to 50 due to max_successful_tryno increase to 4
11662Increasing send delay for 93.89.20.20 from 50 to 100 due to max_successful_tryno increase to 5
11663Completed UDP Scan at 14:17, 7.40s elapsed (15 total ports)
11664Initiating Service scan at 14:17
11665Scanning 1 service on 93-89-20-20.static.internetadresi.com (93.89.20.20)
11666Completed Service scan at 14:17, 0.17s elapsed (1 service on 1 host)
11667Initiating OS detection (try #1) against 93-89-20-20.static.internetadresi.com (93.89.20.20)
11668Retrying OS detection (try #2) against 93-89-20-20.static.internetadresi.com (93.89.20.20)
11669Initiating Traceroute at 14:17
11670Completed Traceroute at 14:18, 7.06s elapsed
11671Initiating Parallel DNS resolution of 1 host. at 14:18
11672Completed Parallel DNS resolution of 1 host. at 14:18, 0.00s elapsed
11673NSE: Script scanning 93.89.20.20.
11674Initiating NSE at 14:18
11675Completed NSE at 14:18, 5.63s elapsed
11676Initiating NSE at 14:18
11677Completed NSE at 14:18, 0.00s elapsed
11678Nmap scan report for 93-89-20-20.static.internetadresi.com (93.89.20.20)
11679Host is up (0.20s latency).
11680
11681PORT STATE SERVICE VERSION
1168253/udp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
11683| vulners:
11684| cpe:/a:isc:bind:9.9.4:
11685| CVE-2015-4620 7.8 https://vulners.com/cve/CVE-2015-4620
11686| CVE-2014-8500 7.8 https://vulners.com/cve/CVE-2014-8500
11687| CVE-2017-3141 7.2 https://vulners.com/cve/CVE-2017-3141
11688| CVE-2015-8461 7.1 https://vulners.com/cve/CVE-2015-8461
11689| CVE-2013-6230 6.8 https://vulners.com/cve/CVE-2013-6230
11690| CVE-2015-1349 5.4 https://vulners.com/cve/CVE-2015-1349
11691| CVE-2018-5740 5.0 https://vulners.com/cve/CVE-2018-5740
11692| CVE-2017-3145 5.0 https://vulners.com/cve/CVE-2017-3145
11693| CVE-2016-9131 5.0 https://vulners.com/cve/CVE-2016-9131
11694| CVE-2016-8864 5.0 https://vulners.com/cve/CVE-2016-8864
11695| CVE-2016-1286 5.0 https://vulners.com/cve/CVE-2016-1286
11696| CVE-2015-8000 5.0 https://vulners.com/cve/CVE-2015-8000
11697| CVE-2019-6465 4.3 https://vulners.com/cve/CVE-2019-6465
11698| CVE-2018-5743 4.3 https://vulners.com/cve/CVE-2018-5743
11699| CVE-2018-5742 4.3 https://vulners.com/cve/CVE-2018-5742
11700| CVE-2017-3143 4.3 https://vulners.com/cve/CVE-2017-3143
11701| CVE-2017-3142 4.3 https://vulners.com/cve/CVE-2017-3142
11702| CVE-2017-3136 4.3 https://vulners.com/cve/CVE-2017-3136
11703| CVE-2016-2775 4.3 https://vulners.com/cve/CVE-2016-2775
11704| CVE-2016-1285 4.3 https://vulners.com/cve/CVE-2016-1285
11705| CVE-2018-5741 4.0 https://vulners.com/cve/CVE-2018-5741
11706| CVE-2016-6170 4.0 https://vulners.com/cve/CVE-2016-6170
11707| CVE-2018-5745 3.5 https://vulners.com/cve/CVE-2018-5745
11708|_ CVE-2014-0591 2.6 https://vulners.com/cve/CVE-2014-0591
11709| vulscan: VulDB - https://vuldb.com:
11710| [11804] ISC BIND up to 9.9.4 DNS Query bin/named/query.c query_findclosestnsec3 denial of service
11711| [11104] ISC BIND up to 9.9.4 WSAloctl Winsock API Bypass privilege escalation
11712| [9764] ISC BIND up to 9.9.4 RDATA rdata.c denial of service
11713| [119548] ISC BIND 9.9.12/9.10.7/9.11.3/9.12.1-P2 Recursion information disclosure
11714| [95202] ISC BIND up to 9.9.9-P4/9.10.4-P4/9.11.0-P1 DNSSEC denial of service
11715| [95201] ISC BIND up to 9.9.9-P4/9.10.4-P4/9.11.0-P1 DS Record Response denial of service
11716| [95200] ISC BIND up to 9.9.9-P4/9.10.4-P4/9.11.0-P1 ANY Query Response denial of service
11717| [89850] ISC BIND up to 9.9.9-P1/9.10.4-P1/9.11.0b1 Lightweight Resolution named.conf denial of service
11718| [81312] ISC BIND up to 9.9.8-P3/9.10.3-P3 named db.c/resolver.c Signature Record denial of service
11719| [81311] ISC BIND up to 9.9.8-P3/9.10.3-P3 named alist.c/sexpr.c denial of service
11720| [80787] ISC BIND up to 9.9.8-S4 Query rdataset.c denial of service
11721| [79802] ISC BIND 9.9.0/9.10.0/9.10.1-P1 Socket Error resolver.c denial of service
11722| [79801] ISC BIND 9.9.0/9.10.0/9.10.1-P1 Response db.c denial of service
11723| [76834] ISC BIND up to 9.9.7-P1/9.10.2-P2 TKEY Query Packet Crash denial of service
11724| [8108] ISC BIND up to 9.9.3 on Unix/Linux Regular Expression denial of service
11725| [7079] ISC BIND up to 9.9.1 DNS64 IPv6 Transition Mechanism denial of service
11726| [6295] ISC BIND up to 9.9.1-P2 Assertion Error Resource Record Parser RDATA Query denial of service
11727| [5875] ISC BIND 9.9.0/9.9.1 denial of service
11728| [5874] ISC BIND up to 9.9.1-P1 denial of service
11729| [5483] ISC BIND up to 9.9.1 DNS Resource Record information disclosure
11730|
11731| MITRE CVE - https://cve.mitre.org:
11732| [CVE-2013-4854] The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
11733| [CVE-2013-3919] resolver.c in ISC BIND 9.8.5 before 9.8.5-P1, 9.9.3 before 9.9.3-P1, and 9.6-ESV-R9 before 9.6-ESV-R9-P1, when a recursive resolver is configured, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a record in a malformed zone.
11734| [CVE-2013-2266] libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
11735| [CVE-2012-5689] ISC BIND 9.8.x through 9.8.4-P1 and 9.9.x through 9.9.2-P1, in certain configurations involving DNS64 with a Response Policy Zone that lacks an AAAA rewrite rule, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for an AAAA record.
11736| [CVE-2012-5688] ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
11737| [CVE-2012-5166] ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
11738| [CVE-2012-4244] ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P3 allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a long resource record.
11739| [CVE-2012-3868] Race condition in the ns_client structure management in ISC BIND 9.9.x before 9.9.1-P2 allows remote attackers to cause a denial of service (memory consumption or process exit) via a large volume of TCP queries.
11740| [CVE-2012-1667] ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record.
11741| [CVE-2011-4313] query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
11742| [CVE-2011-2465] Unspecified vulnerability in ISC BIND 9 9.8.0, 9.8.0-P1, 9.8.0-P2, and 9.8.1b1, when recursion is enabled and the Response Policy Zone (RPZ) contains DNAME or certain CNAME records, allows remote attackers to cause a denial of service (named daemon crash) via an unspecified query.
11743| [CVE-2011-2464] Unspecified vulnerability in ISC BIND 9 9.6.x before 9.6-ESV-R4-P3, 9.7.x before 9.7.3-P3, and 9.8.x before 9.8.0-P4 allows remote attackers to cause a denial of service (named daemon crash) via a crafted UPDATE request.
11744|
11745| SecurityFocus - https://www.securityfocus.com/bid/:
11746| [61774] ISC BIND 9 SRTT Algorithm Authoritative Server Selection Security Vulnerability
11747| [61479] ISC BIND 9 DNS RDATA Handling CVE-2013-4854 Remote Denial of Service Vulnerability
11748| [58736] ISC BIND 9 'libdns' Remote Denial of Service Vulnerability
11749| [57556] ISC BIND 9 DNS64 CVE-2012-5689 Remote Denial of Service Vulnerability
11750| [56817] ISC BIND 9 DNS64 Remote Denial of Service Vulnerability
11751| [55852] ISC BIND 9 DNS RDATA Handling CVE-2012-5166 Remote Denial of Service Vulnerability
11752| [55522] ISC BIND 9 DNS Resource Records Handling CVE-2012-4244 Remote Denial of Service Vulnerability
11753| [54659] ISC BIND 9 TCP Query Remote Denial of Service Vulnerability
11754| [54658] ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability
11755| [53772] ISC BIND 9 DNS Resource Records Handling Remote Denial of Service Vulnerability
11756| [50690] ISC BIND 9 Recursive Queries Remote Denial of Service Vulnerability
11757| [48566] ISC BIND 9 Unspecified Packet Processing Remote Denial of Service Vulnerability
11758| [48565] ISC BIND 9 RPZ Configurations Remote Denial of Service Vulnerabilities
11759| [48007] ISC BIND 9 Large RRSIG RRsets Remote Denial of Service Vulnerability
11760| [47734] ISC BIND 9 RRSIG Query Type Remote Denial of Service Vulnerability
11761| [46491] ISC BIND 9 IXFR Transfer/DDNS Update Remote Denial of Service Vulnerability
11762| [45385] ISC BIND 9 DNSSEC Validation Remote Denial of Service Vulnerability
11763| [45133] ISC BIND 9 'RRSIG' Record Type Negative Cache Remote Denial of Service Vulnerability
11764| [41730] ISC BIND 9 'RRSIG' Record Type Remote Denial of Service Vulnerability
11765| [37865] ISC BIND 9 DNSSEC Bogus NXDOMAIN Response Remote Cache Poisoning Vulnerability
11766| [37118] ISC BIND 9 DNSSEC Query Response Additional Section Remote Cache Poisoning Vulnerability
11767| [35848] ISC BIND 9 Remote Dynamic Update Message Denial of Service Vulnerability
11768| [25076] ISC BIND 9 Default ACL Settings Recursive Queries And Cached Content Security Bypass Vulnerability
11769| [25037] ISC BIND 9 Remote Cache Poisoning Vulnerability
11770| [4936] ISC BIND 9 Remote Denial Of Service Vulnerability
11771| [100656] Cisco ASR 920 Series Routers CVE-2017-6795 Local Arbitrary File Overwrite Vulnerability
11772| [97450] Cisco ASR 903 and ASR 920 Series CVE-2017-6603 Denial of Service Vulnerability
11773| [93415] Cisco Nexus 9000 Series Switches CVE-2016-1455 Remote Information Disclosure Vulnerability
11774| [82579] Cisco Nexus 9000 Series ACI Mode Switches CVE-2015-6398 Denial of Service Vulnerability
11775| [77686] Cisco Firepower 9000 Series CVE-2015-6380 Unspecified OS Command Injection Vulnerability
11776| [77635] Cisco Firepower 9000 Series CVE-2015-6371 Multiple Arbitrary File Read Vulnerabilities
11777| [77634] Cisco Firepower 9000 Series CVE-2015-6370 Local Command Injection Vulnerability
11778| [77633] Cisco Firepower 9000 Series Switches CVE-2015-6372 HTML Injection Vulnerability
11779| [77631] Cisco Firepower 9000 Series Switches CVE-2015-6374 Clickjacking Vulnerability
11780| [77629] Cisco Firepower 9000 Series CVE-2015-6369 Local Denial of Service Vulnerability
11781| [77628] Cisco Firepower 9000 CVE-2015-6373 Cross Site Request Forgery Vulnerability
11782| [77614] Cisco Firepower 9000 Series Switches CVE-2015-6368 Information Disclosure Vulnerability
11783| [76913] Cisco NX-OS Software for Nexus 9000 Series Switches CVE-2015-6308 Denial of Service Vulnerability
11784| [76791] Cisco ASR 9000 Series Aggregation Services Routers CVE-2015-6301 Denial of Service Vulnerability
11785| [76762] Cisco NX-OS Software for Nexus 9000 Series CVE-2015-6295 Denial of Service Vulnerability
11786| [76329] Cisco Nexus 9000 Series Software CVE-2015-4301 Remote Denial of Service Vulnerability
11787| [76057] Cisco Firepower 9000 Series Devices CVE-2015-4287 Information Disclosure Vulnerability
11788| [75471] Cisco Unified IP Phones 9900 Series CVE-2015-4226 Denial of Service Vulnerability
11789| [75378] Cisco NX-OS Software for Nexus 9000 Series CVE-2015-4213 Information Disclosure Vulnerability
11790| [74029] Cisco ASR 9000 Series Routers CVE-2015-0694 Remote Security Bypass Vulnerability
11791| [73895] Cisco NX-OS Software for Nexus 9000 Series CVE-2015-0686 Denial of Service Vulnerability
11792| [73470] Cisco ASR 9000 Series Routers CVE-2015-0685 Denial of Service Vulnerability
11793| [73318] Cisco ASR 9000 Series Aggregation Services Routers CVE-2015-0672 Denial of Service Vulnerability
11794| [72485] Cisco Unified IP Phones 9900 Series CVE-2015-0604 Arbitrary File Upload Vulnerability
11795| [72484] Cisco Unified IP Phones 9900 Series CVE-2015-0603 Local Denial of Service Vulnerability
11796| [72483] Cisco Unified IP Phones 9900 Series CVE-2015-0601 Local Denial of Service Vulnerability
11797| [72482] Cisco Unified IP Phones 9900 Series CVE-2015-0602 Information Disclosure Vulnerability
11798| [72481] Cisco Unified IP Phones 9900 Series CVE-2015-0600 Denial of Service Vulnerability
11799| [71979] Cisco MDS 9000 NX-OS Software CVE-2015-0582 Denial of Service Vulnerability
11800| [70744] Cisco ASR 901 Series Routers CVE-2014-3293 Denial of Service Vulnerability
11801| [70658] ZTE ZXDSL 931VII 'manager_dev_config_t.gch' Information Disclosure Vulnerability
11802| [69057] Cisco Nexus 9000 Series Switches CVE-2014-3330 Access List Security Bypass Vulnerability
11803| [64770] Cisco Unified IP Phones 9900 Series Crafted Header Unregister Denial of Service Vulnerability
11804| [63564] Cisco MDS 9000 NX-OS Software VRRP Frames Denial of Service Vulnerability
11805| [62944] Cisco Unified IP Phones 9900 Series CVE-2013-5532 Buffer Overflow Vulnerability
11806| [62943] Cisco Unified IP Phones 9900 Series CVE-2013-5533 Local Command Injection Vulnerability
11807| [62905] Cisco Unified IP Phones 9900 Series CVE-2013-5526 Denial of Service Vulnerability
11808| [61330] Cisco Unified IP Phones 9900 Series CVE-2013-3426 Arbitrary File Download Vulnerability
11809| [49633] Oracle Application Server 9i 'httpd.conf' Information Disclosure Vulnerability
11810| [48811] Cisco ASR 9000 Series Routers IP Version 4 Denial of Service Vulnerability
11811| [48264] Aastra 9480i CT Multiple Information Disclosure Vulnerabilities
11812| [15542] NetObjects Fusion 9 Information Disclosure Vulnerability
11813| [6556] Oracle 9i Application Server Sample Scripts Information Disclosure Vulnerability
11814| [6459] Oracle 9i Application Server Java Server Page Source Code Disclosure Vulnerability
11815| [5335] Multiple Lucent Router UDP Port 9 Information Disclosure Vulnerability
11816| [4290] Oracle 9i Default Configuration File Information Disclosure Vulnerability
11817| [4034] Oracle 9IAS OracleJSP Information Disclosure Vulnerability
11818| [3848] Mandrake Bind 9 Package Insecure File Permissions Vulnerability
11819| [2516] Microsoft Plus! 98 Windows ME Password Disclosure Vulnerability
11820|
11821| IBM X-Force - https://exchange.xforce.ibmcloud.com:
11822| [85799] Cisco Unified IP Phones 9900 Series directory traversal
11823| [75412] Cisco Unified IP Phones 9900 series RT privilege escalation
11824| [68733] Cisco 9000 Series Aggregation Service Router IPv4 packet denial of service
11825| [9704] Multiple Lucent router UDP port 9 could disclose sensitive information
11826| [9250] BIND 9 dns_message_findtype() denial of service
11827| [1852] BIND prior to 4.9.7 buffer overflow affects Digital Firewall 97 users
11828| [539] Microsoft Windows 95 and Internet Explorer password disclosure
11829| [86004] ISC BIND RDATA denial of service
11830| [84767] ISC BIND denial of service
11831| [83066] ISC BIND denial of service
11832| [81504] ISC BIND AAAA denial of service
11833| [80510] ISC BIND DNS64 denial of service
11834| [79121] ISC BIND queries denial of service
11835| [78479] ISC BIND RDATA denial of service
11836| [77185] ISC BIND TCP queries denial of service
11837| [77184] ISC BIND bad cache denial of service
11838| [76034] ISC BIND rdata denial of service
11839| [73053] ISC BIND cache update policy security bypass
11840| [71332] ISC BIND recursive queries denial of service
11841| [68375] ISC BIND UPDATE denial of service
11842| [68374] ISC BIND Response Policy Zones denial of service
11843| [67665] ISC BIND RRSIG Rrsets denial of service
11844| [67297] ISC BIND RRSIG denial of service
11845| [65554] ISC BIND IXFR transfer denial of service
11846| [63602] ISC BIND allow-query security bypass
11847| [63596] ISC BIND zone data security bypass
11848| [63595] ISC BIND RRSIG denial of service
11849| [62072] ISC BIND DNSSEC query denial of service
11850| [62071] ISC BIND ACL security bypass
11851| [61871] ISC BIND anchors denial of service
11852| [60421] ISC BIND RRSIG denial of service
11853| [56049] ISC BIND out-of-bailiwick weak security
11854| [55937] ISC Bind unspecified cache poisoning
11855| [55753] ISC BIND DNSSEC NSEC/NSEC3 cache poisoning
11856| [54416] ISC BIND DNSSEC cache poisoning
11857| [52073] ISC BIND dns_db_findrdataset() denial of service
11858| [47409] Multiple Mozilla products XBL loadBindingDocument information disclosure
11859| [45234] ISC BIND UDP denial of service
11860| [39670] ISC BIND inet_network buffer overflow
11861| [37233] libgssapi ISC BIND Novell SUSE Linux Enterprise Server GSS-TSIG request denial of service
11862| [37128] RHSA update for ISC BIND RRset denial of service not installed
11863| [37127] RHSA update for ISC BIND named service denial of service not installed
11864| [36275] ISC BIND DNS query spoofing
11865| [35575] ISC BIND query ID cache poisoning
11866| [35571] ISC BIND ACL security bypass
11867| [31838] ISC BIND RRset denial of service
11868| [31799] ISC BIND named service denial of service
11869| [29876] HP Tru64 ypbind core dump information disclosure
11870| [28745] ISC BIND DNSSEC RRset denial of service
11871| [28744] ISC BIND recursive INSIST denial of service
11872| [22041] BEA WebLogic Server and Express LDAP anonymous bind information disclosure
11873| [18836] BIND hostname disclosure
11874| [10624] ISC BIND DNS stub resolver library (libresolv.a) stack buffer overflows
11875| [10333] ISC BIND SIG null pointer dereference denial of service
11876| [10332] ISC BIND OPT resource record (RR) denial of service
11877| [10304] ISC BIND SIG cached resource records (RR) heap buffer overflow
11878| [7027] Cisco CBOS Web-based configuration utility binds to port 80 by default
11879| [5814] ISC BIND "
11880| [5540] ISC BIND can be remotely crashed by issuing ZXFR requests
11881| [5462] ISC BIND AXFR host command remote buffer overflow
11882|
11883| Exploit-DB - https://www.exploit-db.com:
11884| [24689] cPanel 9.9.1 -R3 Front Page Extension Installation Information Disclosure
11885| [23059] Netbula Anyboard 9.9.5 6 Information Disclosure Vulnerability
11886| [9300] ISC BIND 9 Remote Dynamic Update Message Denial of Service PoC
11887|
11888| OpenVAS (Nessus) - http://www.openvas.org:
11889| [103090] ISC BIND 9 IXFR Transfer/DDNS Update Remote Denial of Service Vulnerability
11890| [103031] ISC BIND 9 < 9.7.2-P2 Multiple Vulnerabilities
11891| [103030] ISC BIND 9 'RRSIG' Record Type Negative Cache Remote Denial of Service Vulnerability
11892| [100717] ISC BIND 9 'RRSIG' Record Type Remote Denial of Service Vulnerability
11893| [100458] ISC BIND 9 DNSSEC Bogus NXDOMAIN Response Remote Cache Poisoning Vulnerability
11894| [100362] ISC BIND 9 DNSSEC Query Response Additional Section Remote Cache Poisoning Vulnerability
11895| [100251] ISC BIND 9 Remote Dynamic Update Message Denial of Service Vulnerability
11896| [63208] Fedora Core 9 FEDORA-2009-0350 (bind)
11897| [11226] Oracle 9iAS default error information disclosure
11898|
11899| SecurityTracker - https://www.securitytracker.com:
11900| [1025811] Cisco ASR 9000 Series Router IPv4 Packet Processing Flaw Lets Remote Users Deny Service
11901| [1012995] BIND 9 Validator Assumption Error May Let Remote Users Deny Service
11902| [1005048] Oracle Enterprise Manager Web Service Component of Oracle 9i Application Server Discloses the Web Cache Administrator Password to Local Users
11903| [1003675] Oracle 9iAS Application Server Discloses CGI-BIN Script Source Code to Remote Users
11904| [1001186] Microsoft Windows Me Operating System and Windows 98 with the Plus! 98 Package Disclose Data Compression Passwords
11905| [1028901] (McAfee Issues Advisory for McAfee Email Gateway) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
11906| [1028900] (McAfee Issues Advisory for McAfee Email and Web Security Appliance) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
11907| [1028899] (McAfee Issues Fix for McAfee Web Gateway) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
11908| [1028866] (McAfee Issues Fix for McAfee Firewall Enterprise) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
11909| [1028854] (NetBSD Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
11910| [1028849] (Red Hat Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
11911| [1028848] (Red Hat Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
11912| [1028839] (FreeBSD Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
11913| [1028838] ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
11914| [1028632] ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against Recursive Resolvers
11915| [1028046] ISC BIND DNS64 and Response Policy Zones (RPZ) Bug Lets Remote Users Deny Service
11916| [1027835] ISC BIND DNS64 Bug Lets Remote Users Deny Service
11917| [1027642] ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service
11918| [1027529] ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service
11919| [1026647] ISC BIND Cache Update Policy Can Be Bypassed to Allow Revoked Domain Names to Remain Resolvable
11920| [1026335] ISC BIND Invalid Record Caching Flaw Lets Remote Users Deny Service
11921| [1025743] ISC BIND Response Policy Zones DNAME/CNAME Processing Flaw Lets Remote Users Deny Service
11922| [1025742] ISC BIND Packet Processing Flaw Lets Remote Users Deny Service
11923| [1015850] Samba winbindd Daemon Discloses Server Password to Local Users
11924| [1003359] BindView NETinventory Discloses Password to Local Users During Auditing
11925| [1001721] BIND Domain Name System Software May Disclose DNS Transactional Signature (TSIG) Keys to Local Users
11926|
11927| OSVDB - http://www.osvdb.org:
11928| [86219] Cardiac Science G3 Plus 9390A-501 AED AEDUpdate Cleartext Password Local Disclosure
11929| [22517] MPN HP-180W Wireless IP Phone UDP Port 9090 Information Disclosure
11930| [22516] ZyXEL P-2000W_v2 VoIP Wi-Fi Phone UDP Port 9090 Information Disclosure
11931| [21292] ZyXEL P2000W UDP 9090 Remote Information Disclosure
11932|_
1193367/udp closed dhcps
1193468/udp closed dhcpc
1193569/udp closed tftp
1193688/udp closed kerberos-sec
11937123/udp closed ntp
11938137/udp filtered netbios-ns
11939138/udp filtered netbios-dgm
11940139/udp closed netbios-ssn
11941161/udp closed snmp
11942162/udp closed snmptrap
11943389/udp closed ldap
11944500/udp closed isakmp
11945520/udp closed route
119462049/udp closed nfs
11947Too many fingerprints match this host to give specific OS details
11948Network Distance: 17 hops
11949Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
11950
11951TRACEROUTE (using port 137/udp)
11952HOP RTT ADDRESS
119531 ... 7
119548 30.73 ms 10.252.204.1
119559 ... 10
1195611 30.39 ms 10.252.204.1
1195712 90.06 ms 10.252.204.1
1195813 90.06 ms 10.252.204.1
1195914 90.05 ms 10.252.204.1
1196015 90.02 ms 10.252.204.1
1196116 60.31 ms 10.252.204.1
1196217 30.58 ms 10.252.204.1
1196318 ...
1196419 29.89 ms 10.252.204.1
1196520 29.85 ms 10.252.204.1
1196621 ... 27
1196728 31.34 ms 10.252.204.1
1196829 ...
1196930 29.78 ms 10.252.204.1
11970
11971NSE: Script Post-scanning.
11972Initiating NSE at 14:18
11973Completed NSE at 14:18, 0.00s elapsed
11974Initiating NSE at 14:18
11975Completed NSE at 14:18, 0.00s elapsed
11976######################################################################################################################################
11977[+] URL: http://tevhididavet.com/
11978[+] Started: Thu Jan 16 13:21:40 2020
11979
11980Interesting Finding(s):
11981
11982[+] http://tevhididavet.com/
11983 | Interesting Entries:
11984 | - Server: Apache/2
11985 | - Upgrade: h2,h2c
11986 | Found By: Headers (Passive Detection)
11987 | Confidence: 100%
11988
11989[+] http://tevhididavet.com/robots.txt
11990 | Interesting Entries:
11991 | - /wp-admin/
11992 | - /wp-admin/admin-ajax.php
11993 | Found By: Robots Txt (Aggressive Detection)
11994 | Confidence: 100%
11995
11996[+] http://tevhididavet.com/readme.html
11997 | Found By: Direct Access (Aggressive Detection)
11998 | Confidence: 100%
11999
12000[+] http://tevhididavet.com/wp-cron.php
12001 | Found By: Direct Access (Aggressive Detection)
12002 | Confidence: 60%
12003 | References:
12004 | - https://www.iplocation.net/defend-wordpress-from-ddos
12005 | - https://github.com/wpscanteam/wpscan/issues/1299
12006
12007[+] WordPress version 5.3.2 identified (Latest, released on 2019-12-18).
12008 | Found By: Query Parameter In Install Page (Aggressive Detection)
12009 | - http://tevhididavet.com/wp-includes/css/dashicons.min.css?ver=5.3.2
12010 | - http://tevhididavet.com/wp-includes/css/buttons.min.css?ver=5.3.2
12011 | - http://tevhididavet.com/wp-admin/css/install.min.css?ver=5.3.2
12012 | Confirmed By: Query Parameter In Upgrade Page (Aggressive Detection)
12013 | - http://tevhididavet.com/wp-includes/css/buttons.min.css?ver=5.3.2
12014 | - http://tevhididavet.com/wp-admin/css/install.min.css?ver=5.3.2
12015
12016[+] WordPress theme in use: spixer
12017 | Location: http://tevhididavet.com/wp-content/themes/spixer/
12018 | Style URL: http://tevhididavet.com/wp-content/themes/spixer/style.css?ver=5909dc377c0db2c82490b845ea0493fc
12019 | Style Name: Spixer
12020 | Style URI: https://www.kanthemes.com/landing/spixer
12021 | Description: Premium Wordpress Multipurpose Theme for Food, Magazine, Blog, Finance, Crypto Currency Fashion and ...
12022 | Author: Kan Themes
12023 | Author URI: https://www.kanthemes.com
12024 |
12025 | Found By: Css Style In Homepage (Passive Detection)
12026 | Confirmed By: Css Style In 404 Page (Passive Detection)
12027 |
12028 | Version: 1.4.4 (80% confidence)
12029 | Found By: Style (Passive Detection)
12030 | - http://tevhididavet.com/wp-content/themes/spixer/style.css?ver=5909dc377c0db2c82490b845ea0493fc, Match: 'Version: 1.4.4'
12031
12032[+] Enumerating All Plugins (via Passive Methods)
12033[+] Checking Plugin Versions (via Passive and Aggressive Methods)
12034
12035[i] Plugin(s) Identified:
12036
12037[+] all-in-one-seo-pack
12038 | Location: http://tevhididavet.com/wp-content/plugins/all-in-one-seo-pack/
12039 | Last Updated: 2019-12-20T15:24:00.000Z
12040 | [!] The version is out of date, the latest version is 3.3.4
12041 |
12042 | Found By: Comment (Passive Detection)
12043 |
12044 | Version: 3.3.3 (100% confidence)
12045 | Found By: Comment (Passive Detection)
12046 | - http://tevhididavet.com/, Match: 'All in One SEO Pack 3.3.3 by'
12047 | Confirmed By: Readme - Stable Tag (Aggressive Detection)
12048 | - http://tevhididavet.com/wp-content/plugins/all-in-one-seo-pack/readme.txt
12049
12050[+] Enumerating Config Backups (via Passive and Aggressive Methods)
12051 Checking Config Backups - Time: 00:00:05 <=============> (21 / 21) 100.00% Time: 00:00:05
12052
12053[i] No Config Backups Found.
12054
12055[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
12056[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up
12057
12058[+] Finished: Thu Jan 16 13:22:22 2020
12059[+] Requests Done: 64
12060[+] Cached Requests: 7
12061[+] Data Sent: 15.051 KB
12062[+] Data Received: 1.109 MB
12063[+] Memory used: 174.176 MB
12064[+] Elapsed time: 00:00:42
12065#####################################################################################################################################
12066[+] URL: http://tevhididavet.com/
12067[+] Started: Thu Jan 16 13:21:46 2020
12068
12069Interesting Finding(s):
12070
12071[+] http://tevhididavet.com/
12072 | Interesting Entries:
12073 | - Server: Apache/2
12074 | - Upgrade: h2,h2c
12075 | Found By: Headers (Passive Detection)
12076 | Confidence: 100%
12077
12078[+] http://tevhididavet.com/robots.txt
12079 | Interesting Entries:
12080 | - /wp-admin/
12081 | - /wp-admin/admin-ajax.php
12082 | Found By: Robots Txt (Aggressive Detection)
12083 | Confidence: 100%
12084
12085[+] http://tevhididavet.com/readme.html
12086 | Found By: Direct Access (Aggressive Detection)
12087 | Confidence: 100%
12088
12089[+] http://tevhididavet.com/wp-cron.php
12090 | Found By: Direct Access (Aggressive Detection)
12091 | Confidence: 60%
12092 | References:
12093 | - https://www.iplocation.net/defend-wordpress-from-ddos
12094 | - https://github.com/wpscanteam/wpscan/issues/1299
12095
12096[+] WordPress version 5.3.2 identified (Latest, released on 2019-12-18).
12097 | Found By: Query Parameter In Install Page (Aggressive Detection)
12098 | - http://tevhididavet.com/wp-includes/css/dashicons.min.css?ver=5.3.2
12099 | - http://tevhididavet.com/wp-includes/css/buttons.min.css?ver=5.3.2
12100 | - http://tevhididavet.com/wp-admin/css/install.min.css?ver=5.3.2
12101 | Confirmed By: Query Parameter In Upgrade Page (Aggressive Detection)
12102 | - http://tevhididavet.com/wp-includes/css/buttons.min.css?ver=5.3.2
12103 | - http://tevhididavet.com/wp-admin/css/install.min.css?ver=5.3.2
12104
12105[+] WordPress theme in use: spixer
12106 | Location: http://tevhididavet.com/wp-content/themes/spixer/
12107 | Style URL: http://tevhididavet.com/wp-content/themes/spixer/style.css?ver=5909dc377c0db2c82490b845ea0493fc
12108 | Style Name: Spixer
12109 | Style URI: https://www.kanthemes.com/landing/spixer
12110 | Description: Premium Wordpress Multipurpose Theme for Food, Magazine, Blog, Finance, Crypto Currency Fashion and ...
12111 | Author: Kan Themes
12112 | Author URI: https://www.kanthemes.com
12113 |
12114 | Found By: Css Style In Homepage (Passive Detection)
12115 | Confirmed By: Css Style In 404 Page (Passive Detection)
12116 |
12117 | Version: 1.4.4 (80% confidence)
12118 | Found By: Style (Passive Detection)
12119 | - http://tevhididavet.com/wp-content/themes/spixer/style.css?ver=5909dc377c0db2c82490b845ea0493fc, Match: 'Version: 1.4.4'
12120
12121[+] Enumerating Users (via Passive and Aggressive Methods)
12122 Brute Forcing Author IDs - Time: 00:00:11 <==> (10 / 10) 100.00% Time: 00:00:11
12123
12124[i] User(s) Identified:
12125
12126[+] abdullahsaid
12127 | Found By: Author Posts - Author Pattern (Passive Detection)
12128 | Confirmed By:
12129 | Wp Json Api (Aggressive Detection)
12130 | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
12131 | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
12132
12133[+] tevhididavet
12134 | Found By: Author Posts - Author Pattern (Passive Detection)
12135 | Confirmed By:
12136 | Wp Json Api (Aggressive Detection)
12137 | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
12138 | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
12139
12140[+] esedullahsaid
12141 | Found By: Author Posts - Author Pattern (Passive Detection)
12142 | Confirmed By:
12143 | Wp Json Api (Aggressive Detection)
12144 | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
12145 | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
12146
12147[+] eneslutfu
12148 | Found By: Wp Json Api (Aggressive Detection)
12149 | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
12150
12151[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
12152[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up
12153
12154[+] Finished: Thu Jan 16 13:22:33 2020
12155[+] Requests Done: 50
12156[+] Cached Requests: 22
12157[+] Data Sent: 13.334 KB
12158[+] Data Received: 1.259 MB
12159[+] Memory used: 138.914 MB
12160[+] Elapsed time: 00:00:46
12161#####################################################################################################################################
12162[+] URL: http://tevhididavet.com/
12163[+] Started: Thu Jan 16 13:25:22 2020
12164
12165Interesting Finding(s):
12166
12167[+] http://tevhididavet.com/
12168 | Interesting Entries:
12169 | - Server: Apache/2
12170 | - Upgrade: h2,h2c
12171 | Found By: Headers (Passive Detection)
12172 | Confidence: 100%
12173
12174[+] http://tevhididavet.com/robots.txt
12175 | Interesting Entries:
12176 | - /wp-admin/
12177 | - /wp-admin/admin-ajax.php
12178 | Found By: Robots Txt (Aggressive Detection)
12179 | Confidence: 100%
12180
12181[+] http://tevhididavet.com/readme.html
12182 | Found By: Direct Access (Aggressive Detection)
12183 | Confidence: 100%
12184
12185[+] http://tevhididavet.com/wp-cron.php
12186 | Found By: Direct Access (Aggressive Detection)
12187 | Confidence: 60%
12188 | References:
12189 | - https://www.iplocation.net/defend-wordpress-from-ddos
12190 | - https://github.com/wpscanteam/wpscan/issues/1299
12191
12192[+] WordPress version 5.3.2 identified (Latest, released on 2019-12-18).
12193 | Found By: Query Parameter In Install Page (Aggressive Detection)
12194 | - http://tevhididavet.com/wp-includes/css/dashicons.min.css?ver=5.3.2
12195 | - http://tevhididavet.com/wp-includes/css/buttons.min.css?ver=5.3.2
12196 | - http://tevhididavet.com/wp-admin/css/install.min.css?ver=5.3.2
12197 | Confirmed By: Query Parameter In Upgrade Page (Aggressive Detection)
12198 | - http://tevhididavet.com/wp-includes/css/buttons.min.css?ver=5.3.2
12199 | - http://tevhididavet.com/wp-admin/css/install.min.css?ver=5.3.2
12200
12201[+] WordPress theme in use: spixer
12202 | Location: http://tevhididavet.com/wp-content/themes/spixer/
12203 | Style URL: http://tevhididavet.com/wp-content/themes/spixer/style.css?ver=5909dc377c0db2c82490b845ea0493fc
12204 | Style Name: Spixer
12205 | Style URI: https://www.kanthemes.com/landing/spixer
12206 | Description: Premium Wordpress Multipurpose Theme for Food, Magazine, Blog, Finance, Crypto Currency Fashion and ...
12207 | Author: Kan Themes
12208 | Author URI: https://www.kanthemes.com
12209 |
12210 | Found By: Css Style In Homepage (Passive Detection)
12211 | Confirmed By: Css Style In 404 Page (Passive Detection)
12212 |
12213 | Version: 1.4.4 (80% confidence)
12214 | Found By: Style (Passive Detection)
12215 | - http://tevhididavet.com/wp-content/themes/spixer/style.css?ver=5909dc377c0db2c82490b845ea0493fc, Match: 'Version: 1.4.4'
12216
12217[+] Enumerating Users (via Passive and Aggressive Methods)
12218 Brute Forcing Author IDs - Time: 00:00:02 <============> (10 / 10) 100.00% Time: 00:00:02
12219
12220[i] User(s) Identified:
12221
12222[+] abdullahsaid
12223 | Found By: Author Posts - Author Pattern (Passive Detection)
12224 | Confirmed By:
12225 | Wp Json Api (Aggressive Detection)
12226 | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
12227 | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
12228
12229[+] tevhididavet
12230 | Found By: Author Posts - Author Pattern (Passive Detection)
12231 | Confirmed By:
12232 | Wp Json Api (Aggressive Detection)
12233 | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
12234 | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
12235
12236[+] esedullahsaid
12237 | Found By: Author Posts - Author Pattern (Passive Detection)
12238 | Confirmed By:
12239 | Wp Json Api (Aggressive Detection)
12240 | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
12241 | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
12242
12243[+] eneslutfu
12244 | Found By: Wp Json Api (Aggressive Detection)
12245 | - http://tevhididavet.com/wp-json/wp/v2/users/?per_page=100&page=1
12246
12247[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
12248[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up
12249
12250[+] Finished: Thu Jan 16 13:25:30 2020
12251[+] Requests Done: 14
12252[+] Cached Requests: 55
12253[+] Data Sent: 3.248 KB
12254[+] Data Received: 57.572 KB
12255[+] Memory used: 137.402 MB
12256[+] Elapsed time: 00:00:08
12257######################################################################################################################################
12258INFO] ------TARGET info------
12259[*] TARGET: http://tevhididavet.com/
12260[*] TARGET IP: 93.89.20.20
12261[INFO] NO load balancer detected for tevhididavet.com...
12262[*] DNS servers: ns1.medyabim.com.
12263[*] TARGET server: Apache/2
12264[*] CC: TR
12265[*] Country: Turkey
12266[*] RegionCode: 16
12267[*] RegionName: Bursa
12268[*] City: Bursa
12269[*] ASN: AS44922
12270[*] BGP_PREFIX: 93.89.20.0/24
12271[*] ISP: MEDYABIM-AS MEDYABIM INTERNET HIZMETLERI, TR
12272[INFO] DNS enumeration:
12273[*] ftp.tevhididavet.com 93.89.20.20
12274[*] mail.tevhididavet.com 93.89.20.20
12275[INFO] Possible abuse mails are:
12276[*] abuse@internetadresi.com
12277[*] abuse@tevhididavet.com
12278[INFO] NO PAC (Proxy Auto Configuration) file FOUND
12279[ALERT] robots.txt file FOUND in http://tevhididavet.com/robots.txt
12280[INFO] Checking for HTTP status codes recursively from http://tevhididavet.com/robots.txt
12281[INFO] Status code Folders
12282[INFO] Starting FUZZing in http://tevhididavet.com/FUzZzZzZzZz...
12283[INFO] Status code Folders
12284[*] 200 http://tevhididavet.com/images
12285[ALERT] Look in the source code. It may contain passwords
12286[INFO] Links found from http://tevhididavet.com/ http://93.89.20.20/:
12287[*] https://www.facebook.com/Tevhididavetcom
12288[*] https://www.instagram.com/tevhididavetcom/
12289[*] https://www.youtube.com/watch?v=4D_FHbtKhOU&t=4s
12290[*] http://tevhididavet.com/
12291[*] http://tevhididavet.com/adet-muhakkemdir-العادة-محكمة/
12292[*] http://tevhididavet.com/allah-iyilik-ve-kotulukleri-takdir-edip-yazdi/
12293[*] http://tevhididavet.com/author/abdullahsaid/
12294[*] http://tevhididavet.com/author/esedullahsaid/
12295[*] http://tevhididavet.com/author/tevhididavet/
12296[*] http://tevhididavet.com/bu-gun-peygamberimiz-olsaydi-ne-derdi/
12297[*] http://tevhididavet.com/comments/feed/
12298[*] http://tevhididavet.com/darul-kufurde-kafirlerin-cani-ve-mali-helal-midir/
12299[*] http://tevhididavet.com/ehveni-serreyn-nerede-gecerlidir/
12300[*] http://tevhididavet.com/el-varakat-muhtasari-مختصر-الورقات/
12301[*] http://tevhididavet.com/emir-fiil-%d9%81%d8%b9%d9%84-%d8%a7%d9%84%d8%a3%d9%85%d8%b1/
12302[*] http://tevhididavet.com/emir-fiil-فعل-الأمر/
12303[*] http://tevhididavet.com/fatihadan-sonra-amin-demekle-alakali-hukumler-nelerdir/
12304[*] http://tevhididavet.com/feed/
12305[*] http://tevhididavet.com/gunluk-zikirler/
12306[*] http://tevhididavet.com/gunluk-zikirler-estagfirullahe-ve-etubu-ileyh/
12307[*] http://tevhididavet.com/gunluk-zikirler-la-ilahe-illallahu-vahdehu-la-serike-leh/
12308[*] http://tevhididavet.com/gunluk-zikirler-subhanallahi-ve-bihamdihi-subhanallahil-azim/
12309[*] http://tevhididavet.com/hacet-umumi-olsun-hususi-olsun-zaruret-menzilesine-indirilir-الحاجة-تنزل-منزلة-الضرورة/
12310[*] http://tevhididavet.com/haramlar-allaha-sirk-kosmak/
12311[*] http://tevhididavet.com/her-kim-islam-dininin-yukselmesi-icin-savasirsa-iste-o-allah-yolundadir/
12312[*] http://tevhididavet.com/iletisim/
12313[*] http://tevhididavet.com/ittiba-risalesi/
12314[*] http://tevhididavet.com/iztirar-baskasinin-hakkini-ibtal-etmez-الاضطرار-لا-يبطل-حق-الغير/
12315[*] http://tevhididavet.com/kadinin-kocasindan-izin-almadan-evden-disari-cikmasi-caiz-midir/
12316[*] http://tevhididavet.com/kategori/ahlak/
12317[*] http://tevhididavet.com/kategori/akaid/
12318[*] http://tevhididavet.com/kategori/arabca/
12319[*] http://tevhididavet.com/kategori/edebiyat/
12320[*] http://tevhididavet.com/kategori/fikih/
12321[*] http://tevhididavet.com/kategori/kuran/
12322[*] http://tevhididavet.com/kategori/makaleler/
12323[*] http://tevhididavet.com/kategori/onsayfa/
12324[*] http://tevhididavet.com/kategori/sohbetler/
12325[*] http://tevhididavet.com/kategori/sorucevab/
12326[*] http://tevhididavet.com/kategori/sorucevab/akaid-sorulari/
12327[*] http://tevhididavet.com/kategori/sorucevab/fikih-sorulari/
12328[*] http://tevhididavet.com/kategori/sunnet/
12329[*] http://tevhididavet.com/kelime-i-tevhidin-faziletleri/
12330[*] http://tevhididavet.com/koklerimiz/
12331[*] http://tevhididavet.com/mahkemede-savunma-yapmak-kufur-mudur/
12332[*] http://tevhididavet.com/mazi-fiil-%d8%a7%d9%84%d9%81%d8%b9%d9%84-%d8%a7%d9%84%d9%85%d8%a7%d8%b6%d9%8a/
12333[*] http://tevhididavet.com/mazi-fiil-الفعل-الماضي/
12334[*] http://tevhididavet.com/muzari-fiil-%d8%a7%d9%84%d9%81%d8%b9%d9%84-%d8%a7%d9%84%d9%85%d8%b6%d8%a7%d8%b1%d9%90%d8%b9/
12335[*] http://tevhididavet.com/muzari-fiil-الفعل-المضارِع/
12336[*] http://tevhididavet.com/namazda-fatiha-suresini-okumanin-hukmu-nedir/
12337[*] http://tevhididavet.com/page/2/
12338[*] http://tevhididavet.com/sahabe-hakkindaki-akidemiz/
12339[*] http://tevhididavet.com/subhanallahi-ve-bihamdihi-zikrinin-fazileti/
12340[*] http://tevhididavet.com/su-i-zan-nedir-bunun-hakkinda-bilgi-verir-misiniz/
12341[*] http://tevhididavet.com/taguta-muhakeme-olmaya-fetva-veren-yahut-bunu-dinin-aslindan-gormeyen-bir-alim-var-midir/
12342[*] http://tevhididavet.com/tekfir-dinin-aslindan-degildir-diyenler-tekfir-edilir-mi/
12343[*] http://tevhididavet.com/tevhid-daveti/
12344[*] http://tevhididavet.com/uyusturucu-belasi/
12345[*] http://tevhididavet.com/velisiz-kiyilan-nikah-gecerli-midir/
12346[*] http://tevhididavet.com/zarar-izale-olunur-الضّرر-يزال/
12347[*] http://tevhididavet.com/zinaya-yaklasmayin/
12348[*] http://twitter.com/tevhididavetcom
12349[*] http://www.tevhididavet.com/
12350[*] http://www.youtube.com/tevhididavet
12351cut: intervalle de champ incorrecte
12352Saisissez « cut --help » pour plus d'informations.
12353[INFO] BING shows 93.89.20.20 is shared with 10,500 hosts/vhosts
12354[INFO] Shodan detected the following opened ports on 93.89.20.20:
12355[*] 1
12356[*] 143
12357[*] 4
12358[*] 443
12359[*] 53
12360[*] 587
12361[*] 80
12362[INFO] ------VirusTotal SECTION------
12363[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
12364[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
12365[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
12366[INFO] ------Alexa Rank SECTION------
12367[INFO] Percent of Visitors Rank in Country:
12368[INFO] Percent of Search Traffic:
12369[INFO] Percent of Unique Visits:
12370[INFO] Total Sites Linking In:
12371[*] Total Sites
12372[INFO] Useful links related to tevhididavet.com - 93.89.20.20:
12373[*] https://www.virustotal.com/pt/ip-address/93.89.20.20/information/
12374[*] https://www.hybrid-analysis.com/search?host=93.89.20.20
12375[*] https://www.shodan.io/host/93.89.20.20
12376[*] https://www.senderbase.org/lookup/?search_string=93.89.20.20
12377[*] https://www.alienvault.com/open-threat-exchange/ip/93.89.20.20
12378[*] http://pastebin.com/search?q=93.89.20.20
12379[*] http://urlquery.net/search.php?q=93.89.20.20
12380[*] http://www.alexa.com/siteinfo/tevhididavet.com
12381[*] http://www.google.com/safebrowsing/diagnostic?site=tevhididavet.com
12382[*] https://censys.io/ipv4/93.89.20.20
12383[*] https://www.abuseipdb.com/check/93.89.20.20
12384[*] https://urlscan.io/search/#93.89.20.20
12385[*] https://github.com/search?q=93.89.20.20&type=Code
12386[INFO] Useful links related to AS44922 - 93.89.20.0/24:
12387[*] http://www.google.com/safebrowsing/diagnostic?site=AS:44922
12388[*] https://www.senderbase.org/lookup/?search_string=93.89.20.0/24
12389[*] http://bgp.he.net/AS44922
12390[*] https://stat.ripe.net/AS44922
12391[INFO] Date: 16/01/20 | Time: 13:26:47
12392[INFO] Total time: 1 minute(s) and 23 second(s)
12393#####################################################################################################################################
12394[-] Target: http://tevhididavet.com (93.89.20.20)
12395[M] Website Not in HTTPS: http://tevhididavet.com
12396[I] Server: Apache/2
12397[L] X-Frame-Options: Not Enforced
12398[I] Strict-Transport-Security: Not Enforced
12399[I] X-Content-Security-Policy: Not Enforced
12400[I] X-Content-Type-Options: Not Enforced
12401[L] Robots.txt Found: http://tevhididavet.com/robots.txt
12402[I] CMS Detection: WordPress
12403[I] Wordpress Theme: spixer
12404[-] WordPress usernames identified:
12405[M] abdullahsaid
12406[M] bdullâh Saîd el-Müderris
12407[M] eneslutfu
12408[M] esedullahsaid
12409[M] spixerthemes
12410[M] tevhididavet
12411[M] XML-RPC services are enabled
12412[I] Autocomplete Off Not Found: http://tevhididavet.com/wp-login.php
12413[-] Default WordPress Files:
12414[I] http://tevhididavet.com/license.txt
12415[I] http://tevhididavet.com/readme.html
12416[I] http://tevhididavet.com/wp-content/themes/twentynineteen/readme.txt
12417[I] http://tevhididavet.com/wp-content/themes/twentytwenty/readme.txt
12418[I] http://tevhididavet.com/wp-includes/ID3/license.commercial.txt
12419[I] http://tevhididavet.com/wp-includes/ID3/license.txt
12420[I] http://tevhididavet.com/wp-includes/ID3/readme.txt
12421[I] http://tevhididavet.com/wp-includes/images/crystal/license.txt
12422[I] http://tevhididavet.com/wp-includes/js/plupload/license.txt
12423[I] http://tevhididavet.com/wp-includes/js/swfupload/license.txt
12424[I] http://tevhididavet.com/wp-includes/js/tinymce/license.txt
12425[-] Searching Wordpress Plugins ...
12426[I] all-in-one-wp-security-and-firewall
12427[M] EDB-ID: 34854 "WordPress Plugin All In One WP Security & Firewall 3.8.3 - Persistent Cross-Site Scripting"
12428[I] feed
12429[M] EDB-ID: 38624 "WordPress Plugin WP Feed - 'nid' SQL Injection"
12430[I] Checking for Directory Listing Enabled ...
12431[-] Date & Time: 16/01/2020 13:29:45
12432[-] Completed in: 0:07:52
12433######################################################################################################################################
12434 Anonymous JTSEC #OpISIS Full Recon #31