[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14857 Download | Alert*

The host is installed with Google Chrome through 22 or Apple Safari 5.1.7 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly handle the html/parser/XSSAuditor.cpp in WebCore in WebKit. Successful exploitation allows remote attackers to bypass a cross-site scripting (XSS) protection mechanism via a crafted string.

The host is installed with Apache Tomcat 6.x before 6.0.36 or 7.x before 7.0.28 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly restrict the request-header size. Successful exploitation allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.

The host is installed with AOL Instant Messenger (AIM) 1.0.1.2 and is prone to SSL spoofing vulnerability. A flaw is present in the application, which fails to verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate. Successful exploitation allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid ...

The host is installed with RealNetworks RealPlayer 15.0.5.109 or earlier and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted ZIP file that triggers incorrect processing of long pathnames by the Watch Folders feature. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Apache Tomcat through 7.0.x and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the partial HTTP requests. Successful exploitation allows remote attackers to cause a denial of service (daemon outage).

The host is installed with the VMware Workstation 8.x before 8.0.5 or VMware Player 4.x before 4.0.5 on Windows and is prone to privilege escalation vulnerability. A flaw is present in the application, which fails to assign strong security permissions for unspecified process threads. Successful exploitation allows host OS users to gain host OS privileges via a crafted application.

The host is installed with the VMware Workstation 8.x before 8.0.5 or VMware Player 4.x before 4.0.5 on Windows and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle system folder. Successful exploitation allows host OS users to gain host OS privileges.

The host is installed with the VMware OVF Tool 2.1 or VMware Workstation 8.x before 8.0.5 or VMware Player 4.x before 4.0.5 on Windows and is prone to format string vulnerability. A flaw is present in the application, which fails to properly handle a crafted OVF file. Successful exploitation allows user-assisted remote attackers to execute arbitrary code.

The host is installed with Google Chrome before 23.0.1271.91 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly perform read operations. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.

The host is installed with Google Chrome before 23.0.1271.91 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a response with chunked transfer coding. Successful exploitation allows remote attackers to cause a denial of service (application crash).


Pages:      Start    1268    1269    1270    1271    1272    1273    1274    1275    1276    1277    1278    1279    1280    1281    ..   1485

© SecPod Technologies