[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with Evernote through 6.15 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to handle crafted javascript code. Successful exploitation could allow remote attackers to read the victim's files and achieve remote execution command on the victim's computer.

The host is installed with Evernote before 6.3 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle a Trojan horse dll file in an unspecified directory. Successful exploitation could allow remote attackers to gain privileges in an unspecified directory.

The host is installed with FlashGet 1.9.0 and is prone to buffer overflow vulnerability. The flaws present in the application fails to validate the "PWD" response in FTP connections before copying it into an insufficiently sized buffer. Successful exploitation allows attackers to execute arbitrary code within the context of the affected application, or cause a denial-of-service condition.

The host is installed with LAN Messenger 1.2.28 or earlier and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service.

The host is installed with Malwarebytes Anti-Malware (MBAM) consumer before 2.2.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle encryption and permission implementation issues. Successful exploitation could attackers to permit execution of unauthorized applications including malware and malicious websites.

The host is installed with Notepad++ before 4.8.1 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle a trojan horse update. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with Notepad++ 6.6.9 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a long time attribute in an event element in an XML file. Successful exploitation could allow remote attackers to have unspecified impact.

The host is installed with Notepad++ 7.3.3 with Hex Editor Plugin v0.95 and is prone to a code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted file. Successful exploitation could allow remote attackers to execute user-defined code.

Buffer overflow in the Server Service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers, including anonymous users, to execute arbitrary code via a crafted RPC message, a different vulnerability than CVE-2006-1314.

Stack-based buffer overflow in the NetpManageIPCConnect function in the Workstation service (wkssvc.dll) in Microsoft Windows 2000 SP4 and XP SP2 allows remote attackers to execute arbitrary code via NetrJoinDomain2 RPC messages with a long hostname.


Pages:      Start    1250    1251    1252    1253    1254    1255    1256    1257    1258    1259    1260    1261    1262    1263    ..   1429

© SecPod Technologies