[Forgot Password]
Login  Register Subscribe

23631

 
 

122183

 
 

98060

 
 

909

 
 

79198

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8407 Download | Alert*

The host is installed with Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, or SeaMonkey before 2.10 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the applications, which fail to handle nsHTMLReflowState::CalculateHypotheticalBox function. Successful exploitation could allow attacker ...

The host is installed with Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5 or 3.2.x before 3.2.4 and is prone to SQL-injection vulnerability. A flaw is present in the application, which fails to properly implement the passing of request data to a where method in an ActiveRecord class. Successful exploitation allows attackers to compromise the application, access or modify data.

The host is installed with Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, or SeaMonkey before 2.11 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to handle a crafted javascript: URL. Successful exploitation could allow attackers to execute arbitrary cod ...

The host is installed with Google Chrome before 21.0.1180.89 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle vectors that trigger a "stale buffer". Successful exploitation could allow attackers to crash the service.

The host is installed with Adobe Reader 9.x through 9.5.1 or Adobe Reader or Acrobat 10.x through 10.1.3 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is installed with Google Chrome before 22.0.1229.79 and is prone to double free vulnerability. A flaw is present in the application, which fails to properly handle vectors related to XSL transforms. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related Swing. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.

The host is installed with Adobe Flash Player before 10.3.183.29 or 11.x before 11.4.402.287 or Adobe AIR 3.4.0.2540 or before and is prone to buffer overflow vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with IBM Tivoli Storage Manager 5.3.x before 5.3.6.10, 5.4.x before 5.4.3.4, 5.5.x before 5.5.2.10 or 6.1.x before 6.1.3.1 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to prevent specifying a long LANG environment variable, and then sending a request over a pipe. Successful exploitation allows local users to gain ...

The host is installed with IBM Tivoli Storage Manager (TSM) 5.3.x before 5.3.6.10, 5.4.x before 5.4.3.4, 5.5.x before 5.5.3, 6.1.x before 6.1.4 or 6.2.x before 6.2.2 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle certain unknown vectors. Successful exploitation allows local users to overwrite arbitrary files.


Pages:      Start    791    792    793    794    795    796    797    798    799    800    801    802    803    804    ..   840

© 2013 SecPod Technologies