[Forgot Password]
Login  Register Subscribe

23631

 
 

122183

 
 

98060

 
 

909

 
 

79198

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 14273 Download | Alert*

The host is installed with Novell iPrint Client and is prone to Heap-based buffer overflow vulnerability. A flaw is present in nipplib.dll, when handling the uri parameter from the user specified printer-url the process blindly copies user supplied data into a fixed-length buffer on the heap. Successful exploitation allows remote attacker to execute arbitrary code under the context of the browser.

The host is installed with Novell iPrint client before 5.72 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the GetDriverSettings function, which fails to properly validate user supplied data. Successful exploitation allows remote attackers to execute arbitrary code under the context of the browser.

The host is installed with Novell iPrint client before 5.78 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long realm field. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Novell iPrint client before 5.78 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted client-file-name parameter in a printer-url. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Novell iPrint client before 5.78 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Novell iPrint Client before 5.82 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle an op-client-interface-version action. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Novell iPrint Client before 5.90 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle specially crafted data. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Axigen Free Mail Server and is prone to multiple directory traversal vulnerabilities. The flaws are present in the application, which fails to handle the View Log Files component. Successful exploitation allows attackers to read or delete arbitrary files via a .. (dot dot) in the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileN ...

The host is installed with PHP and is prone to integer overflow vulnerability. A flaw is present in the numfmt_get_symbol function, which fails to handle invalid arguments. Successful exploitation could allow remote attacker to cause denial of service.

The host is installed with PHP and is prone to information disclosure vulnerability. A flaw is present in the mb_strcut() function, which fails to handle overly large value passed to the length parameter. Successful exploitation could allow remote attackers to obtain sensitive information.


Pages:      Start    1377    1378    1379    1380    1381    1382    1383    1384    1385    1386    1387    1388    1389    1390    ..   1427

© 2013 SecPod Technologies