[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80167

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 14467 Download | Alert*

The host is installed with Opera before 9.64 and is prone to unspecified vulnerability. A flaw is present in the application, which is related to a moderately severe issue. Successful exploitation allows unknown impact and attack vectors.

The host is installed with Opera before 10.62 and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to handle a Trojan horse dwmapi.dll file in the current working directory. Successful exploitation allows allows local users to gain privileges via a Trojan horse dwmapi.dll file.

The host is installed with NJStar Communicator version 3.0.11818 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation could allow attackers to overflow the buffer.

Cross-site scripting vulnerability in Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows remote attackers to execute arbitrary script as other users via an HTTP error page.

The w3svc.dll ISAPI filter in Front Page Server Extensions and ASP.NET for Internet Information Server (IIS) 4.0, 5.0, and 5.1 does not properly handle the error condition when a long URL is provided, which allows remote attackers to cause a denial of service (crash) when the URL parser accesses a null pointer.

The host is installed with Foxit Reader before 5.3 on Windows XP and Windows 7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a PDF document with a crafted attachment. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Internet Explorer 6 or 7 or 8 or 9 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle UNC share pathname in the SRC attribute of a SCRIPT element. Successful exploitation allows attackers to obtain sensitive information about the existence of files, and read certain data from files.

The host is installed with PlotSoft PDFill PDF Editor 8.0 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to prevent local users from gaining privileges. Successful exploitation could allow attackers to gain privileges.

The host is installed with Microsys Promotic before 8.1.5 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted request. Successful exploitation could allow attackers to cause a denial of service.

The host is installed with Microsys Promotic before 8.1.5 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted request. Successful exploitation could allow attackers to cause a denial of service.


Pages:      Start    1401    1402    1403    1404    1405    1406    1407    1408    1409    1410    1411    1412    1413    1414    ..   1446

© 2013 SecPod Technologies