Page 9 of 116 results (0.005 seconds)

CVSS: 5.0EPSS: 3%CPEs: 5EXPL: 0

Adobe (formerly Macromedia) ColdFusion MX 6.0, 6.1, 6.1 with JRun, and 7.0 allows remote attackers to attach arbitrary files and send mail via a crafted Subject field, which is not properly handled by the CFMAIL tag in applications that use ColdFusion, aka "CFMAIL injection Vulnerability". Adobe (antes Macromedia) ColdFusion MX 6.0, 6.1, 6.1 con JRun, y 7.0 permiten a atacantes remotos adjuntar ficheros de su elección y enviar correo mediante un un campo "Subject" artesanal, que no es manejado adecuadamente por la etiqueta CFMAIL en aplicaciones que usan ColdFurion, tcc "Vulnerabilidad de inyección CFMAIL". • http://secunia.com/advisories/18078 http://securitytracker.com/id?1015369 http://www.macromedia.com/devnet/security/security_zone/mpsb05-12.html http://www.macromedia.com/devnet/security/security_zone/mpsb05-14.html http://www.securityfocus.com/bid/15904 http://www.vupen.com/english/advisories/2005/2948 •

CVSS: 7.8EPSS: 39%CPEs: 5EXPL: 3

The Administration Service (FMSAdmin.exe) in Macromedia Flash Media Server 2.0 r1145 allows remote attackers to cause a denial of service (application crash) via a malformed request with a single character to port 1111. El Servicio de Administración (FMSAdmin.exe) en Macromedia Flash Media Server 2.0 r1145 permite a atacantes remotos causar una denegación de servicio (caída de aplicación) mediante una petición mal formada con un sólo carácter al puerto 1111. • https://www.exploit-db.com/exploits/1371 http://secunia.com/advisories/17978 http://securitytracker.com/id?1015346 http://www.ipomonis.com/advisories/Flash_media_server_2.txt http://www.macromedia.com/devnet/security/security_zone/mpsb05-11.html http://www.securityfocus.com/bid/15822 http://www.vupen.com/english/advisories/2005/2865 https://exchange.xforce.ibmcloud.com/vulnerabilities/23563 •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

Macromedia Breeze Communication Server and Breeze Live Server does 5.1 and earlier not sufficiently validate certain RTMP data, which allows attackers to cause a denial of service (instability or crash), as demonstrated using an alpha release build of Flash Player 8.5 (build 133). • http://secunia.com/advisories/17611 http://securitytracker.com/id?1015220 http://www.macromedia.com/devnet/security/security_zone/mpsb05-10.html http://www.macromedia.com/support/breeze/licensed_support.html#item-2 http://www.osvdb.org/20869 http://www.securityfocus.com/bid/15434 http://www.vupen.com/english/advisories/2005/2442 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Macromedia Flash Communication Server MX 1.0 and 1.5 does not sufficiently validate certain RTMP data, which allows attackers to cause a denial of service (instability or crash), as demonstrated using an alpha release build of Flash Player 8.5 (build 133). • http://secunia.com/advisories/17612 http://securitytracker.com/id?1015219 http://www.macromedia.com/devnet/security/security_zone/mpsb05-09.html http://www.osvdb.org/20869 http://www.securityfocus.com/bid/15437 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Macromedia Contribute Publishing Server (CPS) before 1.11 uses a weak algorithm to encrypt user password in connection keys that use shared FTP login credentials, which allows attackers to obtain sensitive information. Macromedia Contribute Publishing Server (CPS) anteriores a 1.11 usa un algoritmo de cifrado débil para cifrar contraseñas de usuario en claves de conexión que usan credenciales de inicio de sesión FTP compartido, lo que permite a atacantes obtener información sensible. • http://secunia.com/advisories/17613 http://securitytracker.com/id?1015221 http://www.macromedia.com/devnet/security/security_zone/mpsb05-08.html http://www.securityfocus.com/bid/15438 http://www.vupen.com/english/advisories/2005/2440 https://exchange.xforce.ibmcloud.com/vulnerabilities/23081 •