[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80130

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 6927 Download | Alert*

The host is installed with Pro-face WinGP PC Runtime 3.01.100 or earlier and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet that triggers a certain Find Node check attempt. Successful exploitation could allow remote attackers to cause a denial of service or out-of-bounds read operation.

The host is installed with Pro-face WinGP PC Runtime 3.01.100 or earlier and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet with a certain opcode and a large value in a size field. Successful exploitation could allow remote attackers to cause a denial of service or daemon crash.

The host is installed with Pro-face WinGP PC Runtime 3.01.100 or earlier and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to handle a crafted packet with a certain opcode. Successful exploitation could allow remote attackers to obtain sensitive information from daemon memory crash.

The host is installed with Symantec Altiris WISE Package Studio before 8.0MR1 and is prone to multiple sql injection vulnerabilities. The flaws are present in the application, which fails to handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary SQL commands.

The host is installed with Microsoft Internet Explorer and is prone to security-bypass vulnerability. A flaw is present in the application which fails to properly restrict modifications to cookies established in HTTPS sessions. Successful exploitation allows attackers to bypass security features provided by secure cookies.

Cross-site scripting vulnerability in Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows remote attackers to execute arbitrary script as other users via an HTTP error page.

'mozilla.org has launched and delivered SeaMonkey, a community effort to deliver production-quality releases of code derived from the \"Mozilla Application Suite\". This equates to a cessation in software and security patches for that baseline. Using an unsupported software represents a high security risk because no fixes or patches will be made available in response to new vulnerabilities.'


Pages:      Start    683    684    685    686    687    688    689    690    691    692    ..   692

© 2013 SecPod Technologies