[Forgot Password]
Login  Register Subscribe

23631

 
 

126998

 
 

101924

 
 

909

 
 

80911

 
 

121

 
 
Paid content will be excluded from the download.

Filter
Matches : 11083 Download | Alert*

The host is installed with Microsoft Internet Explorer 6, 7, 8, 9, 10 or 11 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle the access of an object in memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is installed with .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4.0, 4.5 or 4.5.1 and is prone to privilege escalation vulnerability. A flaw is present in the application, which fails to handles TypeFilterLevel checks for some malformed objects. Successful exploitation allows attacker to execute arbitrary code.

The host is installed with zFTPServer Suite 6.0.0.52 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle a a crafted RMD (aka rmdir) command. Successful exploitation could allow attackers to to delete arbitrary directories.

The host is installed with Mozilla Firefox before 4.0 and is prone to security-bypass vulnerability. A flaw is present in the application which fails to properly restrict modifications to cookies established in HTTPS sessions. Successful exploitation allows attackers to bypass security features provided by secure cookies.

The host is installed with ERDAS APOLLO ECWP plugin before 13.00.0001 for Internet Explorer, Firefox, and Chrome and is prone to multiple stack-based buffer overflow vulnerability. The flaw is present in the application, which fails to handle a crafted application. Successful exploitation could allow attackers to execute arbitrary code via a long property value.

The host is installed with Mozilla Firefox before 24.0 and is prone to a same-origin bypass vulnerability. A flaw is present in the application, which fails to handle a symlink in conjunction with a file: URL for a local file. Successful exploitation could allow attackers to bypass the Same Origin Policy.

The host is installed with Mozilla Firefox before 24.0 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle Trojan horse .so file in a world-writable directory. Successful exploitation could allow attackers to execute arbitrary code.

Mozilla Firefox before 26.0 does not properly remove the Application Installation doorhanger, which makes it easier for remote attackers to spoof a Web App installation site by controlling the timing of page navigation.

Mozilla Firefox before 28.0 on Android allows remote attackers to bypass the Same Origin Policy and access arbitrary file: URLs via vectors involving the Open Link in New Tab menu selection.

Directory traversal vulnerability in Android Crash Reporter in Mozilla Firefox before 28.0 on Android allows attackers to trigger the transmission of local files to arbitrary servers, or cause a denial of service (application crash), via a crafted application that specifies Android Crash Reporter arguments.


Pages:      Start    1050    1051    1052    1053    1054    1055    1056    1057    1058    1059    1060    1061    1062    1063    ..   1108

© 2013 SecPod Technologies