[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80171

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11718 Download | Alert*

The host is installed with Apache Tomcat 6.0.0 through 6.0.20 or 5.5.0 through 5.5.28 and is prone to insecure default administrative password vulnerability. A flaw is present in the application, where the Windows installer creates a blank password by default for the administrative user. Successful exploitation allows remote attackers to gain privileges.

The host is installed with Apache Tomcat 6.x before 6.0.36 or 7.x before 7.0.28 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly restrict the request-header size. Successful exploitation allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.

The host is installed with Google Chrome through 22 or Apple Safari 5.1.7 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly handle the html/parser/XSSAuditor.cpp in WebCore in WebKit. Successful exploitation allows remote attackers to bypass a cross-site scripting (XSS) protection mechanism via a crafted string.

The host is installed with M-Player 0.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted MP3 file. Successful exploitation allows attackers to crash the affected application, denying service to legitimate users.

The host is installed with VideoLAN VLC media player 2.0.3 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted PNG file. Successful exploitation allows remote attackers to cause an application crash.

The host is installed with LibreOffice 3.5.x before 3.5.7.2 or 3.6.x before 3.6.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted odt file to vcllo.dll, ODG (Drawing document) file to svxcorelo.dll, PolyPolygon record in a .wmf (Window Meta File) file embedded in a ppt (PowerPoint) file to tllo.dll, or xls (Excel) file to scfil ...

The host is installed with Quest InTrust 10.0 through 10.4.0.853 and is prone to multiple insecure-method vulnerabilities. The flaws are present in the application, which fails to properly implement the SaveToFile method. Successful exploitation allows remote attackers to write or overwrite arbitrary files via the bstrFileName argument.

The host is installed with Quest InTrust 10.0 through 10.4.0.853 and is prone to remote code-execution vulnerability. A flaw is present in the application, which fails to properly implement the Add method. Successful exploitation allows remote attackers to execute arbitrary code via a memory address in the first argument.

The host is installed with Adobe Flash Player before 10.3.183.29 or 11.x before 11.4.402.287 or Adobe AIR 3.4.0.2540 or before and is prone to buffer overflow vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 10.3.183.29 or 11.x before 11.4.402.287 or Adobe AIR 3.4.0.2540 or before and is prone to buffer overflow vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1171

© 2013 SecPod Technologies