[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Microsoft Windows Vista SP2, Server 2008 SP2, Windows 7 SP1 or Server 2008 R2 SP1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle Windows Kernel API. An attacker who successfully exploited the vulnerabilities could gain access to information that is not intended for the user.

The host is installed with 3S CoDeSys 3.0 before 3.5 or before 2.3.9.32 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to handle a specially-crafted HTTP GET request. Successful exploitation allows remote attackers to traverse directories on the system, to create arbitrary directories under the web root.

The host is installed with 360zip 1.93beta and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows remote attackers to execute arbitrary code via vectors related to file browsing and file extraction.

The host is installed with IBM DB2 9.5 before FP9 and is prone to insecure file-permissions vulnerability. A flaw is present in the application, which uses world-writable permissions for nodes.reg. Successful exploitation has unspecified impact and attack vectors.

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scrip ...

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scrip ...

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scrip ...

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scrip ...

The host is installed with Quest Toad for Data Analysts 3.0.1 and is prone to privilege escalation vulnerability. A flaw is present in the application, which fails to set proper permissions on the %COMMONPROGRAMFILES%\Quest Shared directory. Successful exploitation could allow local users to gain privileges.

The host is installed with Qbik WinGate 6.x through 6.5.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle the HTTP Host header. Successful exploitation could allow remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites.


Pages:      Start    1425    1426    1427    1428    1429    1430    1431    1432    1433    1434    1435    1436    1437    1438    ..   1516

© SecPod Technologies