[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Adobe Presenter 6 or 7 before 7.0.1 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to handle vectors involving viewer.swf and loadflash.js. Successful exploitation allows attackers to inject arbitrary web script or HTML.

The host is installed with Adobe Presenter 6 or 7 before 7.0.1 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to handle vectors involving viewer.swf and loadflash.js. Successful exploitation allows attackers to inject arbitrary web script or HTML.

The host is installed with Citrix Receiver through 3.2 along with Citrix Receiver Online plug-in through 12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted malicious file from an SMB or WebDAV fileserver. Successful exploitation allows an attacker to execute arbitrary code on the client device in the conte ...

The host is installed with Piriform CCleaner 3.26.0.1988 through 5.02.5101 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unallocated disk space. Successful exploitation could allow remote attackers to disclose sensitive information.

The host is installed with Audacity version 2.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Evernote through 6.15 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to handle crafted javascript code. Successful exploitation could allow remote attackers to read the victim's files and achieve remote execution command on the victim's computer.

The host is installed with Evernote before 6.3 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle a Trojan horse dll file in an unspecified directory. Successful exploitation could allow remote attackers to gain privileges in an unspecified directory.

The host is installed with FlashGet 1.9.0 and is prone to buffer overflow vulnerability. The flaws present in the application fails to validate the "PWD" response in FTP connections before copying it into an insufficiently sized buffer. Successful exploitation allows attackers to execute arbitrary code within the context of the affected application, or cause a denial-of-service condition.

The host is installed with LAN Messenger 1.2.28 or earlier and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service.

The host is installed with Malwarebytes Anti-Malware (MBAM) consumer before 2.2.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle encryption and permission implementation issues. Successful exploitation could attackers to permit execution of unauthorized applications including malware and malicious websites.


Pages:      Start    1362    1363    1364    1365    1366    1367    1368    1369    1370    1371    1372    1373    1374    1375    ..   1516

© SecPod Technologies