[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Opera before 9.63 and is prone to cross-site scripting vulnerability. A flaw is present in the application, which fails to handle built-in XSLT templates. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is installed with Opera before 9.61 and is prone to cross-site scripting vulnerability. A flaw is present in the application, which a page is located in a frame, executes a javascript: URL in the context of the outermost page instead of the page that contains this URL. Successful exploitation allows remote attackers to conduct cross-site scripting (XSS) attacks.

The host is installed with Opera before 9.61 and is prone to cross-site scripting vulnerability. A flaw is present in the application, which fails to properly escape before storage in the History Search database (aka md.dat). Successful exploitation allows remote attackers to inject arbitrary web script or HTML via the anchor identifier (aka the "optional fragment").

The host is installed with Opera before 9.52 and is prone to cross-site scripting vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is installed with Opera before 9.26 and is prone to cross-site scripting vulnerability. A flaw is present in the application, which fails to handle crafted attribute values in an XML document. Successful exploitation allows remote attackers to "bypass sanitization filters" and conduct cross-site scripting (XSS) attacks via crafted attribute values in an XML document, which are not properl ...

The host is installed with Opera before 11.50 and is prone to cross-site scripting vulnerability. A flaw is present in the application which fails to restrict data: URIs. Successful exploitation allow remote attackers to conduct cross-site scripting.

The host is installed with Opera before 11.60 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle certificate revocation. Successful exploitation could allow attackers to produce unknown impacts.

The host is installed with Opera browser before 11.0 and is prone to a X509 spoofing vulnerability. A flaw is present in the application, which gives improper information of X.509 certificates on https web sites when Opera Turbo is enabled. Successful exploitation could allow a remote attacker to redirect users to malicious web sites.

The host is installed with Microsoft OneNote and is prone to remote code execution vulnerability. A flaw is present in application, which parses specially crafted files. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new accounts with full user rights."

The host is installed with Microsoft Office Compatibility Pack SP3, SharePoint Server 2010, SharePoint Server 2013, Word 2007, Word 2010, Word 2013, Word Viewer, Web Apps 2010 or Web Apps 2013 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle objects in memory. An attacker who successfully exploited these vulnerabilities could run arbitr ...


Pages:      Start    1333    1334    1335    1336    1337    1338    1339    1340    1341    1342    1343    1344    1345    1346    ..   1502

© SecPod Technologies