[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with Symantec Scan Engine before 5.1.4.24, Symantec Antivirus before 9.0 MR6-MP1, 10.x before 10.1 MR5 MP1 or Symantec Client Security before 2.0 MR6-MP1 or 3.x before 3.1 MR5 MP1 and is prone to heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle multiple crafted CAB archives. Successful exploitation could allow attackers to ...

The host is installed with Firebird 2.1.3 through 2.1.5 before 18514 or 2.5.1 through 2.5.3 before 26623 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle crafted packet to TCP port 3050. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with BigAntSoft BigAnt IM Message Server and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly authenticate for file uploading. Successful exploitation allows remote attackers to create arbitrary files under AntServer\DocData\Public via unspecified vectors.

The host is installed with Apple QuickTime 6.x or 7.x before 7.6.8 and is prone to remote code execution vulnerability. The flaw is present in IPersistPropertyBag2::Read function in QTPlugin.ocx, which fails to properly handle the _Marshaled_pUnk attribute. Successful exploitation allows attackers to execute arbitrary code via the _Marshaled_pUnk attribute, which triggers unmarshaling of an untrus ...

The host is installed with .NET Framework 2.0, 3.5, 3.5.1, 4.0 or 4.5 and is prone to spoofing vulnerability. A flaw is present in the application, which fails to check signatures in XML file. Successful exploitation allows attackers to make undetected changes to signed XML documents via unspecified vectors that preserve signature validity.

The host is installed with IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.3-TIV-ITDS-IF0004 and is prone to an information disclosure vulnerability. A flaw is present in the web administration tool, which fails to restrict access to certain log files. Successful exploitation could allow an attacker to disclose sensitive information.

The host is installed with Symantec Antivirus Corporate Edition (SAVCE) 10.x before 10.1 MR10 or Symantec System Center (SSC) 10.x or Symantec Quarantine Server 3.5 or 3.6 and is prone to a remote code execution vulnerability. A flaw is present in the applications, which fail to sanitize user supplied input to 38292 port. Successful exploitation could allow an attacker to execute arbitrary code.

The host is installed with Apple Safari before 3.1 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle crafted certificates. Successful exploitation allows remote attackers to spoof trusted SSL certificates.

The host is installed with Apple Safari before 3.2.2 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle a 3xx HTTP CONNECT response before a successful SSL handshake. Successful exploitation could allow attackers to execute arbitrary web script.

The host is installed with Progea Movicon 11.2 before Build 1084 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to enforce authentication for critical functions. Successful exploitation could allow attackers to obtain sensitive information, delete files, execute arbitrary programs, or crash the service.


Pages:      Start    1411    1412    1413    1414    1415    1416    1417    1418    1419    1420    1421    1422    1423    1424    ..   1429

© SecPod Technologies