[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108741

 
 

909

 
 

85467

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 15380 Download | Alert*

The host is installed with Sielco Sistemi Winlog or Sielco Sistemi Winlog Pro 2.07.16 or earlier and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a specially-crafted request to port 46824. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with IBM DB2 9.7 before FP6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted request. Successful exploitation allows remote attackers to cause NULL pointer dereference, and resource consumption or daemon crash.

The host is installed with Symantec LiveUpdate Administrator before 2.3.1 and is prone to privilege-escalation vulnerability. A flaw is present in the application, which uses weak permissions for the installation directory. Successful exploitation allows local users to gain privileges via a Trojan horse file.

The host is installed with Google Chrome before 10.0.648.204 and is prone to use-after-free vulnerability. A flaw is present in the frame-loader implementation in the application which does not properly handle frame-loader. Successful exploitation allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

The host is installed with IBM Lotus Notes 8.x before 8.5.3 FP2 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly validate user supplied input. Successful exploitation allows attackers to execute arbitrary code via a crafted notes:// URL.

The host is installed with Google Chrome before 10.0.648.204 and is prone to buffer overflow vulnerability. A flaw is present in the application which does not properly handle base strings. Successful exploitation allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

The host is installed with Oracle Java SE 7 update 4 or earlier or 6 update 32 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Web Container or Deployment. Successful exploitation allows remote attackers to affect confidentiality and integrity.

The host is installed with Oracle Java SE 7 update 4 or earlier, 6 update 32 or earlier, 5 update 35 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Hotspot. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 7 update 4 or earlier, 6 update 32 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to JAXP. Successful exploitation allows remote attackers to affect availability.

The host is installed with Oracle Java SE 7 update 4 or earlier, 6 update 32 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Deployment. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.


Pages:      Start    1375    1376    1377    1378    1379    1380    1381    1382    1383    1384    1385    1386    1387    1388    ..   1537

© SecPod Technologies