[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with IBM Rational ClearQuest 7.1.2.x before 7.1.2.9 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle a FRAME element. Successful exploitation allows remote attackers to conduct phishing attacks.

The host is installed with Novell iPrint Client before 5.82 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle an op-client-interface-version action. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Symantec Enterprise Security Manager (ESM) before 11.0 and is prone to multiple unquoted Windows search path vulnerabilities. The flaws are present in the application, which fails to properly handle memory. Successful exploitation allows an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system.

The host is installed with Cerberus FTP Server before 5.0.6.0 and is prone to multiple cross site scripting vulnerabilities. The flaws are present in the application, which fails to handle a crafted log file. Successful exploitation could allow attackers to inject arbitrary web script.

The host is installed with Opera before 11.67 or 12.x before 12.02 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted web site. Successful exploitation allow remote attackers to cause truncation of a dialog, and possibly trigger downloading and execution of arbitrary programs.

The host is installed with Opera before 12.10 and is prone to unauthorized access vulnerability. A flaw is present in the application, which fails to handle the X.509 certificate-validation functionality in the https implementation. Successful exploitation could allow a remote attacker to trigger a false indication of successful revocation-status checking by causing a failure of a single checking ...

The host is installed with Opera before 12.10 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to handle the Cross-Origin Resource Sharing (CORS) specification. Successful exploitation could allow a remote attacker to bypass intended page-content restrictions.

The host is installed with Opera before 12.10 and is prone to cross-site scripting vulnerability. A flaw is present in the application, which fails to handle the vectors related sequence of loading of documents and loading of data: URLs. Successful exploitation could allow a remote attacker to inject arbitrary web script or HTML.

The host is installed with Opera before 12.10 and is prone to cross-site scripting vulnerability. A flaw is present in the application, which fails to handle the crafted JavaScript code that overrides methods of unspecified native objects in documents that have different origins. Successful exploitation could allow a remote attacker to inject arbitrary web script or HTML.

The host is installed with Opera before 12.10 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed SVG image. Successful exploitation could allow a remote attacker to execute arbitrary code or cause a denial of service (application crash).


Pages:      Start    1238    1239    1240    1241    1242    1243    1244    1245    1246    1247    1248    1249    1250    1251    ..   1502

© SecPod Technologies