[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, or 7.x before 7.0.30 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle caches information in the HTTP Digest Access Authentication implementation. Successful exploitation allows remote attackers to bypass authentication via vectors related to the sessio ...

The host is installed with Quest InTrust 10.0 through 10.4.0.853 and is prone to remote code-execution vulnerability. A flaw is present in the application, which fails to properly implement the Add method. Successful exploitation allows remote attackers to execute arbitrary code via a memory address in the first argument.

The host is installed with Quest InTrust 10.0 through 10.4.0.853 and is prone to multiple insecure-method vulnerabilities. The flaws are present in the application, which fails to properly implement the SaveToFile method. Successful exploitation allows remote attackers to write or overwrite arbitrary files via the bstrFileName argument.

The host is installed with LibreOffice 3.5.x before 3.5.7.2 or 3.6.x before 3.6.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted odt file to vcllo.dll, ODG (Drawing document) file to svxcorelo.dll, PolyPolygon record in a .wmf (Window Meta File) file embedded in a ppt (PowerPoint) file to tllo.dll, or xls (Excel) file to scfil ...

The host is installed with VideoLAN VLC media player 2.0.3 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted PNG file. Successful exploitation allows remote attackers to cause an application crash.

The host is installed with M-Player 0.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted MP3 file. Successful exploitation allows attackers to crash the affected application, denying service to legitimate users.

The host is installed with Google Chrome through 22 or Apple Safari 5.1.7 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly handle the html/parser/XSSAuditor.cpp in WebCore in WebKit. Successful exploitation allows remote attackers to bypass a cross-site scripting (XSS) protection mechanism via a crafted string.

The host is installed with Apache Tomcat 6.x before 6.0.36 or 7.x before 7.0.28 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly restrict the request-header size. Successful exploitation allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.

The host is installed with Ipswitch WhatsUp Gold 15.02 and is prone to SQL injection vulnerability. A flaw is present in the application, which fails to handle a specially-crafted SQL statements to the WrVMwareHostList.asp script using the sGroupList parameter. Successful exploitation allows remote attackers to execute arbitrary SQL commands via the sGroupList parameter.

The host is installed with IBM DB2 9.7 before FP6 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle the XML files. Successful exploitation allows remote authenticated users to read arbitrary XML files via unknown vectors.


Pages:      Start    1277    1278    1279    1280    1281    1282    1283    1284    1285    1286    1287    1288    1289    1290    ..   1516

© SecPod Technologies