Page 4 of 22 results (0.003 seconds)

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

Buffer overflow in the DBD::mysql module before 4.037 for Perl allows context-dependent attackers to cause a denial of service (crash) via vectors related to an error message. Desbordamiento de búfer en el módulo DBD::mysql en versiones anteriores a 4.037 para Perl permite a atacantes dependientes del contexto provocar una denegación de servicio (caída) a través de vectores relacionados con un mensaje de error. • http://blogs.perl.org/users/mike_b/2016/10/security-release---buffer-overflow-in-dbdmysql-perl-library.html http://www.debian.org/security/2016/dsa-3684 http://www.securityfocus.com/bid/93337 https://github.com/perl5-dbi/DBD-mysql/commit/7c164a0c86cec6ee95df1d141e67b0e85dfdefd2 https://security.gentoo.org/glsa/201701-51 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

Use-after-free vulnerability in the my_login function in DBD::mysql before 4.033_01 allows attackers to have unspecified impact by leveraging a call to mysql_errno after a failure of my_login. Vulnerabilidad de uso después de liberación de memoria en la función my_login en DBD::mysql en versiones anteriores a 4.033_01 permite a atacantes tener impacto no especificado aprovechando una llamada a mysql_errno despúes de un fallo de my_login. • http://www.debian.org/security/2016/dsa-3635 http://www.openwall.com/lists/oss-security/2016/07/25/13 http://www.openwall.com/lists/oss-security/2016/07/27/1 http://www.securityfocus.com/bid/92118 https://blog.fuzzing-project.org/50-Use-after-free-in-my_login-function-of-DBDmysql-Perl-module.html https://github.com/perl5-dbi/DBD-mysql/blob/4.033_01/Changes https://github.com/perl5-dbi/DBD-mysql/commit/cf0aa7751f6ef8445e9310a64b14dc81460ca156 https://github.com/perl5-dbi&# • CWE-416: Use After Free •

CVSS: 10.0EPSS: 1%CPEs: 2EXPL: 0

Use-after-free vulnerability in DBD::mysql before 4.029 allows attackers to cause a denial of service (program crash) or possibly execute arbitrary code via vectors related to a lost server connection. Vulnerabilidad de uso después de liberación de memoria en DBD::mysql en versiones anteriores a 4.029 permite a atacantes provocar una denegación de servicio (caída del programa) o posiblemente ejecutar código arbitrario a través de vectores relacionados con una conexión de servidor perdida. • http://cpansearch.perl.org/src/CAPTTOFU/DBD-mysql-4.029/ChangeLog http://www.debian.org/security/2016/dsa-3635 http://www.openwall.com/lists/oss-security/2016/07/27/5 http://www.openwall.com/lists/oss-security/2016/07/27/6 http://www.securityfocus.com/bid/92149 https://github.com/perl5-dbi/DBD-mysql/commit/a56ae87a4c1c1fead7d09c3653905841ccccf1cc https://rt.cpan.org/Public/Bug/Display.html?id=97625 • CWE-416: Use After Free •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 2

Cross-site scripting (XSS) vulnerability in JSP/MySQL Administrador Web 1 allows remote attackers to inject arbitrary web script or HTML via the bd parameter to sys/sys/listaBD2.jsp. Vulnerabilidad de XSS en JSP/MySQL Administrador Web 1, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del parámetro bd en sys/sys/listaBD2.jsp. JSPMySQL Administrador version 1 suffers from cross site request forgery and cross site scripting vulnerabilities. • https://www.exploit-db.com/exploits/38098 http://hyp3rlinx.altervista.org/advisories/AS-JSPMYSQLADMINISTRADOR-0904.txt http://packetstormsecurity.com/files/133466/JSPMySQL-Administrador-1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html http://www.securityfocus.com/archive/1/536406/100/0/threaded • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 2

Cross-site request forgery (CSRF) vulnerability in JSP/MySQL Administrador Web 1 allows remote attackers to hijack the authentication of users for requests that execute arbitrary SQL commands via the cmd parameter to sys/sys/listaBD2.jsp. Vulnerabilidad CSRF en JSP/MySQL Administrador Web 1, permite a atacantes remotos secuestrar la autenticación de usuarios para peticiones que ejecutan comandos SQL arbitrarios a través del parámetro cmd en sys/sys/listaBD2.jsp. JSPMySQL Administrador version 1 suffers from cross site request forgery and cross site scripting vulnerabilities. • https://www.exploit-db.com/exploits/38098 http://hyp3rlinx.altervista.org/advisories/AS-JSPMYSQLADMINISTRADOR-0904.txt http://packetstormsecurity.com/files/133466/JSPMySQL-Administrador-1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html http://www.securityfocus.com/archive/1/536406/100/0/threaded • CWE-352: Cross-Site Request Forgery (CSRF) •