[Forgot Password]
Login  Register Subscribe

23631

 
 

122241

 
 

98250

 
 

909

 
 

79281

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 12056 Download | Alert*

The host is installed with Novell iPrint Client and is prone to heap-based buffer overflow vulnerability. A flaw is present in nipplib.dll, when handling the profile-time parameter from the user specified printer-url the process blindly copies user supplied data into a fixed-length buffer on the heap Successful exploitation allows remote attacker to execute arbitrary code under the context of the ...

The host is installed with Novell iPrint Client and is prone to Heap-based buffer overflow vulnerability. A flaw is present in nipplib.dll, when handling the uri parameter from the user specified printer-url the process blindly copies user supplied data into a fixed-length buffer on the heap. Successful exploitation allows remote attacker to execute arbitrary code under the context of the browser.

The host is installed with Novell iPrint client before 5.72 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the GetDriverSettings function, which fails to properly validate user supplied data. Successful exploitation allows remote attackers to execute arbitrary code under the context of the browser.

The host is installed with Novell iPrint client before 5.78 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long realm field. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Novell iPrint client before 5.78 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted client-file-name parameter in a printer-url. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Novell iPrint client before 5.78 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Novell iPrint Client before 5.82 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle an op-client-interface-version action. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Novell iPrint Client before 5.90 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle specially crafted data. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Axigen Free Mail Server and is prone to multiple directory traversal vulnerabilities. The flaws are present in the application, which fails to handle the View Log Files component. Successful exploitation allows attackers to read or delete arbitrary files via a .. (dot dot) in the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileN ...

The host is installed with PHP and is prone to integer overflow vulnerability. A flaw is present in the numfmt_get_symbol function, which fails to handle invalid arguments. Successful exploitation could allow remote attacker to cause denial of service.


Pages:      Start    1161    1162    1163    1164    1165    1166    1167    1168    1169    1170    1171    1172    1173    1174    ..   1205

© 2013 SecPod Technologies