[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with AOL Instant Messenger (AIM) 1.0.1.2 and is prone to SSL spoofing vulnerability. A flaw is present in the application, which fails to verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate. Successful exploitation allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid ...

The host is installed with Stunnel 4.40 or 4.41 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with RealNetworks RealPlayer 15.0.5.109 or earlier and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted ZIP file that triggers incorrect processing of long pathnames by the Watch Folders feature. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Apache Tomcat through 7.0.x and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the partial HTTP requests. Successful exploitation allows remote attackers to cause a denial of service (daemon outage).

The host is installed with IBM Rational Business Developer 8.x before 8.0.1.4 and is prone to information disclosure vulnerability. A flaw is present in the application, which is due to an related to Web services. Successful exploitation allows remote attackers to obtain potentially sensitive information via a connection to a web service created with the Rational Business Developer product.

The host is installed with the VMware Workstation 8.x before 8.0.5 or VMware Player 4.x before 4.0.5 on Windows and is prone to privilege escalation vulnerability. A flaw is present in the application, which fails to assign strong security permissions for unspecified process threads. Successful exploitation allows host OS users to gain host OS privileges via a crafted application.

The host is installed with the VMware Workstation 8.x before 8.0.5 or VMware Player 4.x before 4.0.5 on Windows and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle system folder. Successful exploitation allows host OS users to gain host OS privileges.

The host is installed with the VMware OVF Tool 2.1 or VMware Workstation 8.x before 8.0.5 or VMware Player 4.x before 4.0.5 on Windows and is prone to format string vulnerability. A flaw is present in the application, which fails to properly handle a crafted OVF file. Successful exploitation allows user-assisted remote attackers to execute arbitrary code.

The host is installed with Google Chrome before 23.0.1271.91 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly perform read operations. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.

The host is installed with Google Chrome before 23.0.1271.91 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a response with chunked transfer coding. Successful exploitation allows remote attackers to cause a denial of service (application crash).


Pages:      Start    1278    1279    1280    1281    1282    1283    1284    1285    1286    1287    1288    1289    1290    1291    ..   1516

© SecPod Technologies