[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110507

 
 

909

 
 

86504

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 12319 Download | Alert*

The host is installed with Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, or SeaMonkey before 2.9 and is prone to use-after-free vulnerability. A flaw is present in the applications, which fail to handle vectors related to crafted IndexedDB data. Successful exploitation could allow attackers to execute arbitrary c ...

The host is installed with Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, or SeaMonkey before 2.9 and is prone to multiple unspecified vulnerabilities. The flaws are present in the applications, which fail to handle vectors related to jsval.h and the js::array_shift function. Successful exploitation could allow attackers to cause a denial of service or assertion failure and memory ...

The host is installed with Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, or SeaMonkey before 2.9 and is prone to multiple unspecified vulnerabilities. The flaws are present in the applications, which fail to handle the browser engine. Successful exploitation could allow attackers to cause a denial of service or m ...

The host is installed with CA Internet Security Suite (ISS) or CA Host-Based Intrusion Prevention System (HIPS) and is prone to remote code execution vulnerability. A flaw is present in XMLSecDB ActiveX control in CA HIPS components and products which fails to implement the method securely. Successful exploitation allows remote attacker to potentially execute arbitrary code if the attacker can tri ...

The host is installed with PHP and is prone to format string vulnerability. A flaw in present in phar_object.c, which improperly calls zend_throw_exception_ex() function when format string specifiers are passed in an argument to a class method. Successful exploitation could allow remote attackers to execute arbitrary code, obtain sensitive information or cause a denial of service.

The host is installed with IBM DB2 and is prone to security bypass vulnerability. A flaw is present in the application which is caused due to an error in the application while revoking "DBADM" privileges which can lead to users still being able to execute non-DDL statements. Successful exploitation allows remote attackers to bypass certain security restrictions.

The host is installed with IBM DB2 and is prone to buffer overflow vulnerability. A flaw is present in DB2 Administration Server in the application, which is caused due to a boundary error in the "receiveDASMessage()" function in db2dasrrm. Successful exploitation allows remote attackers a trap in DAS, causing a denial of service, or execution of abritrary code.

The host is installed with Microsoft Windows Fax Services Cover Page Editor and is prone to heap-based buffer overflow vulnerability. The flaw is present in the CDrawPoly::Serialize function in fxscover.exe. Successful exploitation allows remote attackers to execute arbitrary code via a long record in a Fax Cover Page (.cov) file.

The host is installed with IBM Rational ClearQuest 7.1.1 before 7.1.1.9 or 7.1.2 before 7.1.2.6 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which is caused by a function prototype mismatch in the RegisterSchemaRepoFromFileByDbSet() function. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with HP System Management Homepage (SMH) before 7.0 and is prone to unspecified vulnerability. A flaw is present in the application, which is caused due to an unspecified error. Successful exploitation allows local users to modify data or obtain sensitive information via unknown vectors.


Pages:      Start    1106    1107    1108    1109    1110    1111    1112    1113    1114    1115    1116    1117    1118    1119    ..   1231

© SecPod Technologies