[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with EMC NetWorker 6.0 before 7.6.5.3 or 8.x before 8.0.1.4 and is prone to elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle file permissions. Successful exploitation allows attackers to manipulate scripts and execute malicious code as the root on the local system.

The host is installed with Lexmark Markvision Enterprise before 1.8 and is prone to unauthorized access vulnerability. A flaw is present in the application, which fails to block unauthorized access to port 9789. Successful exploitation allows attackers to to execute arbitrary code, change the configuration, or obtain sensitive fleet-management information.

The host is installed with ViPNet Client 3.2.10 (15632) or earlier, ViPNet Coordinator 3.2.10 (15632) or earlier or ViPNet SafeDisk 4.1 (0.5643) or earlier and is prone to a local privilege escalation vulnerability. A flaw is present in the applications, which fail to handle a crafted request. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Safari before 3.1.1 and is prone to a phishing attacks vulnerability. A flaw is present in the application, which fails to properly handle a timing issue. Successful exploitation allows remote attackers to spoof the contents of a legitimate site.

The host is installed with Apple Safari before 3.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly interpret the URLACTION_SHELL_EXECUTE_HIGHRISK Internet Explorer zone setting. Successful exploitation could allow attackers to bypass intended access restrictions, and force a client system to download and execute arbitrary f ...

The host is installed with Apple Safari before 3.1.2 and is prone to a unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors involving JavaScript arrays. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Safari before 4.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle vectors related to an unspecified compression method. Successful exploitation could allow local users to gain privileges.

The host is installed with JRE or JDK 6 Update 4 or earlier, 5.0 Update 14 or earlier or 1.4.2_16 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle an untrusted application or applet. Successful exploitation could allow attackers to gain privileges.

The host is installed with JRE or JDK 5.0 Update 13 or earlier or 1.4.2_16 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle an untrusted application or applet. Successful exploitation could allow attackers to gain privileges.

The host is installed with JRE or JDK 6 Update 4 or earlier, 5.0 Update 14 or earlier or 1.4.2_16 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to XSLT transforms. Successful exploitation could allow attackers to cause a denial of service (JRE crash).


Pages:      Start    1313    1314    1315    1316    1317    1318    1319    1320    1321    1322    1323    1324    1325    1326    ..   1429

© SecPod Technologies