[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97147

 
 

909

 
 

78730

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 5689 Download | Alert*

The host is installed with Kerio Connect 7.1.4 build 2985 or MailServer 6.x and is prone to denial of service vulnerability. A flaw is present in STARTTLS implementation in the application which does not properly restrict I/O buffering. Successful exploitation allow man-in-the-middle attackers to insert commands into encrypted SMTP sessions.

The host is installed with Opera web browser and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle some web page content being displayed on top of dialog boxes. Successful exploitation allows an attacker to gain sensitive information.

The host is installed with Opera web browser and is prone to an information disclosure vulnerability. A flaw is present in the browser, it fails to handle Wireless Application Protocol (WAP) sessions due to form fields not being cleared when a new session is started. Successful exploitation could allow a remote attacker to obtain sensitive information like form data of other sites.

The host is installed with Opera before 11.0 and is prone to an information disclosure vulnerability. A flaw is present in the browser. Specific details regarding the vulnerability have not been made public. Successful exploitation could allow a remote attacker to cause unknown impact.

The host is installed with Opera before 11.0 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to handle security policies during updates to extensions. Successful exploitation could allow an attacker to bypass intended access restrictions.

The host is installed with Opera before 11.0 and is prone to an indication spoofing vulnerability. A flaw is present in the application, which fails to display a page's security indication when Opera Turbo is enabled. Successful exploitation could allow a remote attacker to redirect a user to a malicious website.

The host is installed with Opera before 11.0 and is prone to a X509 spoofing vulnerability. A flaw is present in the application, which gives improper information of X.509 certificates on https web sites when Opera Turbo is enabled. Successful exploitation could allow a remote attacker to redirect users to malicious web sites.

The host is installed with Opera before 11.0 and is prone to an autoupdate denial of service vulnerability. A flaw is present in the autoupdate functionality of the application. Specific details regarding the flaw have not been made public. Successful exploitation could allow an attacker to crash the application.

The host is installed with Opera before 11.0 and is prone to an unspecified vulnerability. A flaw is present in the application. Specific details regarding the vulnerability have not been made public. Successful exploitation could allow an attacker to produce unknown impacts.

The host is installed with Opera before 10.54 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to handle the address bar when requesting to open a URL. Successful exploitation could allow a remote attacker to perform spoofing attack via crafted html document.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   568

© 2013 SecPod Technologies