[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 14064 Download | Alert*

The host is installed with NetIQ Privileged User Manager 2.3.x before 2.3.1 HF2 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to handle directory traversal sequences in a log pathname. Successful exploitation allows remote authenticated users to create or overwrite arbitrary files.

The host is installed with NetIQ Privileged User Manager 2.3.x before 2.3.1 HF2 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle a crafted application/x-amf request that does not require authentication for the modifyAccounts method. Successful exploitation allows remote attackers to change the passwords of administrative accounts.

The host is installed with Novell File Reporter 1.0.4.2 or earlier and is prone to arbitrary files deletion vulnerability. A flaw is present in the application which is caused due to an error in the NFR Agent (NFRAgent.exe) when handling "OPERATION " and "CMD" commands in the "SRS" tag. Successful exploitation allows remote attacker to delete arbitrary files.

The host is installed with Novell File Reporter before 1.0.2.53 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application when parsing tags inside the <RECORD> element, the application lacks a size check before pushing strings to a memory. Successful exploitation allows remote attacker to execute arbitrary code on the target system.

The host is installed with Novell File Reporter 1.0.2 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to handle requests on "/FSF/CMD" for records with NAME "FSFUI" and UICMD "130". Successful exploitation allows remote attackers to upload and execute files via a 130 /FSF/CMD request with a .. (dot dot) in a FILE element of an FSFUI record.

The host is installed with Novell File Reporter 1.0.2 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to handle requests on "/FSF/CMD" for records with NAME "FSFUI" and UICMD "126". Successful exploitation allows remote attackers to read arbitrary files via a 126 /FSF/CMD request with a .. (dot dot) in a FILE element of an FSFUI record.

The host is installed with Novell File Reporter 1.0.2 and is prone to absolute path traversal vulnerability. A flaw is present in the application, which fails to handle requests on "/FSF/CMD" for records with NAME "SRS", OPERATION "4" and CMD "103". Successful exploitation allows remote attackers to read arbitrary files via a /FSF/CMD request with a full pathname in a PATH element of an SRS record ...

The host is installed with Novell File Reporter 1.0.2 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to generate a response in a secure way when handling requests of name "SRS". Successful exploitation allows remote attackers to execute arbitrary code via a large number of VOL elements in an SRS record.

The host is installed with Apple iTunes before 12.3 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly track directionally isolated pieces of text. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple iTunes before 12.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    1382    1383    1384    1385    1386    1387    1388    1389    1390    1391    1392    1393    1394    1395    ..   1406

© 2013 SecPod Technologies