[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Symantec LiveUpdate Administrator before 2.3.1 and is prone to privilege-escalation vulnerability. A flaw is present in the application, which uses weak permissions for the installation directory. Successful exploitation allows local users to gain privileges via a Trojan horse file.

The host is installed with PrivaWall Antivirus before 5.6 Build 2354 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted file embedded in a WordML document. Successful exploitation could allow attackers to bypass malware detection.

The host is installed with WellinTech KingSCADA 3.0 and is prone to information disclosure vulnerability. A flaw is present in the application, which uses a cleartext base64 format for storage of passwords in user.db. Successful exploitation allows context-dependent attackers to obtain sensitive information by reading this file.

The host is installed with Microsoft SharePoint Foundation 2010 and is prone to elevation of privilege vulnerability. A flaw is present in the applications, which fail to properly validate user input. Successful exploitation allows attackers to read unauthorized content.

Microsoft Windows Vista uses insecure default permissions for unspecified "local user information data stores" in the registry and the file system, which allows local users to obtain sensitive information such as administrative passwords, aka "Permissive User Information Store ACLs Information Disclosure Vulnerability."

Unspecified vulnerability in the Windows Advanced Local Procedure Call (ALPC) in the kernel in Microsoft Windows Vista allows local users to gain privileges via unspecified vectors involving "legacy reply paths."

The host is installed with Microsoft SharePoint Server 2013 and is prone to information disclosure vulnerability. A flaw is present in the application, which is caused by the way that SharePoint, by default, applies access controls to a SharePoint list. Successful exploitation allows attackers to gain access to documents to which the attacker would not otherwise have access.

The host is installed with EMC NetWorker 6.0 before 7.6.5.3 or 8.x before 8.0.1.4 and is prone to elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle file permissions. Successful exploitation allows attackers to manipulate scripts and execute malicious code as the root on the local system.

The host is installed with ViPNet Client 3.2.10 (15632) or earlier, ViPNet Coordinator 3.2.10 (15632) or earlier or ViPNet SafeDisk 4.1 (0.5643) or earlier and is prone to a local privilege escalation vulnerability. A flaw is present in the applications, which fail to handle a crafted request. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Safari before 3.1.1 and is prone to a phishing attacks vulnerability. A flaw is present in the application, which fails to properly handle a timing issue. Successful exploitation allows remote attackers to spoof the contents of a legitimate site.


Pages:      Start    1426    1427    1428    1429    1430    1431    1432    1433    1434    1435    1436    1437    1438    1439    ..   1516

© SecPod Technologies