[Forgot Password]
Login  Register Subscribe

24547

 
 

132804

 
 

129694

 
 

909

 
 

106691

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 7221 Download | Alert*

The host is installed with Apache Tomcat 6.0.0 through 6.0.20 or 5.5.0 through 5.5.28 and is prone to insecure default administrative password vulnerability. A flaw is present in the application, where the Windows installer creates a blank password by default for the administrative user. Successful exploitation allows remote attackers to gain privileges.

The host is installed with GnuPG 1.x before 1.4.16 and Gpg4win and is prone to information disclosure vulnerability. A flaws is present in the application, which is caused by generation of RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically-proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptana ...

The host is installed with Apache Subversion 1.0.0 through 1.7.x before 1.7.18 or 1.8.x before 1.8.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted authentication realm. Successful exploitation could allow remote servers to obtain the credentials.

The host is installed with Opera before 9.52 and is prone to unspecified vulnerability. A flaw is present in the application, which does not check the CRL override upon encountering a certificate that lacks a CRL. Successful exploitation allows unknown impact and attack vectors.

The host is installed with Calibre version before 2.75 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted epub file with javaScript. Successful exploitation could allow remote attackers to to read arbitrary files.

The host is installed with Calibre version 3.18 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted .pickle file. Successful exploitation could allow remote attackers to execute arbitrary code via a crafted .pickle file.

The host is installed with Apple QuickTime before 7.6.8 and is prone to remote code execution vulnerability. The flaw is present in the Picture Viewer in Apple QuickTime, which fails to handle the trojan horse (1) CoreVideo.dll, (2) CoreGraphics.dll, or (3) CoreAudioToolbox.dll that is located in the same folder as a .pic image file. Successful exploitation allows attackers to execute arbitrary co ...

The host is installed with Apple QuickTime 6.x or 7.x before 7.6.8 and is prone to remote code execution vulnerability. The flaw is present in IPersistPropertyBag2::Read function in QTPlugin.ocx, which fails to properly handle the _Marshaled_pUnk attribute. Successful exploitation allows attackers to execute arbitrary code via the _Marshaled_pUnk attribute, which triggers unmarshaling of an untrus ...

Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 do not properly initialize memory for GIF rendering, which allows remote attackers to obtain sensitive information from process memory via crafted web script that interacts with a CANVAS element associated with a malformed GIF image.

The host is installed with Foxit Reader 9.0.1.1049 and is prone to an uninitialized pointer vulnerability. A flaw is present in the application which fails to properly handle a malicious file. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   722

© SecPod Technologies