[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 7345 Download | Alert*

The host is installed with XnView before 1.99 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted PCT image. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with XnView before 1.99 and is prone to multiple heap-based buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a SGI32LogLum compressed TIFF image or SGI32LogLum compressed TIFF image with the PhotometricInterpretation encoding set to LogL. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with Winlog Lite SCADA or Winlog Pro SCADA before 2.07.17 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle an incorrect file-open attempt by the _TCPIPS_BinOpenFileFP function. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with GOM Player 2.1.33.5071 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a .ASX file with a long URI in the "ref href" tag. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with FlashFXP 4.0 through 4.1.9.1726 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a long unicode string. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

Microsoft Windows 2000 SP4 does not properly validate an RPC server during mutual authentication over SSL, which allows remote attackers to spoof an RPC server, aka the "RPC Mutual Authentication Vulnerability."

Heap-based buffer overflow in the SvrAppendReceivedChunk function in xlsasink.dll in the SMTP service of Exchange Server 2000 and 2003 allows remote attackers to execute arbitrary code via a crafted X-LINK2STATE extended verb request to the SMTP port.

The host is installed with Apple QuickTime 6.x or 7.x before 7.6.8 and is prone to remote code execution vulnerability. The flaw is present in IPersistPropertyBag2::Read function in QTPlugin.ocx, which fails to properly handle the _Marshaled_pUnk attribute. Successful exploitation allows attackers to execute arbitrary code via the _Marshaled_pUnk attribute, which triggers unmarshaling of an untrus ...

The host is installed with IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.3-TIV-ITDS-IF0004 and is prone to an information disclosure vulnerability. A flaw is present in the web administration tool, which fails to restrict access to certain log files. Successful exploitation could allow an attacker to disclose sensitive information.

The host is installed with Symantec Antivirus Corporate Edition (SAVCE) 10.x before 10.1 MR10 or Symantec System Center (SSC) 10.x or Symantec Quarantine Server 3.5 or 3.6 and is prone to a remote code execution vulnerability. A flaw is present in the applications, which fail to sanitize user supplied input to 38292 port. Successful exploitation could allow an attacker to execute arbitrary code.


Pages:      Start    712    713    714    715    716    717    718    719    720    721    722    723    724    725    ..   734

© SecPod Technologies