[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Adobe Reader and Acrobat and is prone to input validation vulnerability. A flaw is present in the applications, which fails to properly perform input validation. Successful exploitation allows attackers to execute arbitrary code using unknown vectors.

The host is installed with Symantec IM Manager before 8.4.17 and is prone to SQL injection vulnerability. A flaw is present in the application which fails to sufficiently validate user-supplied data before using it in an SQL query. Successful exploitation allows remote attackers to execute arbitrary SQL commands.

The host is installed with Symantec IM Manager before 8.4.17 and is prone to code injection vulnerability. A flaw is present in the application which fails to properly handle code injection issue. Successful exploitation allows remote attackers to execute arbitrary code via unspecified vectors.

The host is installed with NetSaro Enterprise Messenger Server 2.0 or before and is prone to weak cryptographic password storage vulnerability. A flaw is present in the application which fails to clear the cleartext console credentials. Successful exploitation allows local users to obtain sensitive information.

The host is installed with NetSaro Enterprise Messenger Server 2.0 or before and is prone to plaintext password storage vulnerability. A flaw is present in the application which fails to properly handle NetSaro.fdb file. Successful exploitation allows local users to discover cleartext server credentials.

The host is installed with NetSaro Enterprise Messenger Server 2.0 or before and is prone to source code disclosure vulnerability. A flaw is present in the application which fails to prevent unauthenticated access to the applications source code. Successful exploitation allows remote attackers to read application source code by appending a \%00 character to a URL.

The host is installed with Adobe Reader and Acrobat and is prone to remote code execution vulnerability. A flaw is present in the applications, which cause memory corruptions while parsing images. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service using a crafted image.

The host is installed with Adobe Reader and Acrobat and is prone to remote code execution vulnerability. A flaw is present in the applications, which cause memory corruptions while parsing images. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service using a crafted image.

The host is installed with Adobe Reader and Acrobat and is prone to library-loading vulnerability. A flaw is present in the applications, which fail to directly specify a fully qualified path to a dynamic-linked library (DLL). Successful exploitation allows attackers to execute arbitrary code on the system using a specially-crafted library.

The host is installed with Adobe Reader and Acrobat and is prone to unspecified vulnerability. A flaw is present in the applications, which fail to properly process malformed contents within a PDF document. Successful exploitation allows attackers to cause a denial of service or possibly execute arbitrary code using unknown vectors.


Pages:      Start    1180    1181    1182    1183    1184    1185    1186    1187    1188    1189    1190    1191    1192    1193    ..   1502

© SecPod Technologies