[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Google Chrome through 22 or Apple Safari 5.1.7 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly handle the html/parser/XSSAuditor.cpp in WebCore in WebKit. Successful exploitation allows remote attackers to bypass a cross-site scripting (XSS) protection mechanism via a crafted string.

The host is installed with Apache Tomcat 6.x before 6.0.36 or 7.x before 7.0.28 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly restrict the request-header size. Successful exploitation allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.

The host is installed with Ipswitch WhatsUp Gold 15.02 and is prone to SQL injection vulnerability. A flaw is present in the application, which fails to handle a specially-crafted SQL statements to the WrVMwareHostList.asp script using the sGroupList parameter. Successful exploitation allows remote attackers to execute arbitrary SQL commands via the sGroupList parameter.

The host is installed with IBM DB2 9.7 before FP6 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle the XML files. Successful exploitation allows remote authenticated users to read arbitrary XML files via unknown vectors.

The host is installed with AOL Instant Messenger (AIM) 1.0.1.2 and is prone to SSL spoofing vulnerability. A flaw is present in the application, which fails to verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate. Successful exploitation allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid ...

The host is installed with Stunnel 4.40 or 4.41 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with RealNetworks RealPlayer 15.0.5.109 or earlier and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted ZIP file that triggers incorrect processing of long pathnames by the Watch Folders feature. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Apache Tomcat through 7.0.x and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the partial HTTP requests. Successful exploitation allows remote attackers to cause a denial of service (daemon outage).

The host is installed with IBM Rational Business Developer 8.x before 8.0.1.4 and is prone to information disclosure vulnerability. A flaw is present in the application, which is due to an related to Web services. Successful exploitation allows remote attackers to obtain potentially sensitive information via a connection to a web service created with the Rational Business Developer product.

The host is installed with the VMware Workstation 8.x before 8.0.5 or VMware Player 4.x before 4.0.5 on Windows and is prone to privilege escalation vulnerability. A flaw is present in the application, which fails to assign strong security permissions for unspecified process threads. Successful exploitation allows host OS users to gain host OS privileges via a crafted application.


Pages:      Start    1232    1233    1234    1235    1236    1237    1238    1239    1240    1241    1242    1243    1244    1245    ..   1502

© SecPod Technologies