[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

95906

 
 

909

 
 

77986

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11793 Download | Alert*

The host is installed with Novell File Reporter 1.0.4.2 or earlier and is prone to arbitrary files deletion vulnerability. A flaw is present in the application which is caused due to an error in the NFR Agent (NFRAgent.exe) when handling "OPERATION " and "CMD" commands in the "SRS" tag. Successful exploitation allows remote attacker to delete arbitrary files.

The host is installed with Novell File Reporter before 1.0.2.53 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application when parsing tags inside the <RECORD> element, the application lacks a size check before pushing strings to a memory. Successful exploitation allows remote attacker to execute arbitrary code on the target system.

The host is installed with Novell File Reporter 1.0.2 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to handle requests on "/FSF/CMD" for records with NAME "FSFUI" and UICMD "130". Successful exploitation allows remote attackers to upload and execute files via a 130 /FSF/CMD request with a .. (dot dot) in a FILE element of an FSFUI record.

The host is installed with Novell File Reporter 1.0.2 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to handle requests on "/FSF/CMD" for records with NAME "FSFUI" and UICMD "126". Successful exploitation allows remote attackers to read arbitrary files via a 126 /FSF/CMD request with a .. (dot dot) in a FILE element of an FSFUI record.

The host is installed with Novell File Reporter 1.0.2 and is prone to absolute path traversal vulnerability. A flaw is present in the application, which fails to handle requests on "/FSF/CMD" for records with NAME "SRS", OPERATION "4" and CMD "103". Successful exploitation allows remote attackers to read arbitrary files via a /FSF/CMD request with a full pathname in a PATH element of an SRS record ...

The host is installed with Novell File Reporter 1.0.2 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to generate a response in a secure way when handling requests of name "SRS". Successful exploitation allows remote attackers to execute arbitrary code via a large number of VOL elements in an SRS record.

The host is installed with Apple iTunes before 12.3 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly track directionally isolated pieces of text. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple iTunes before 12.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple iTunes before 12.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple iTunes before 12.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    1159    1160    1161    1162    1163    1164    1165    1166    1167    1168    1169    1170    1171    1172    ..   1179

© 2013 SecPod Technologies