[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14865 Download | Alert*

The host is installed with Citrix Receiver through 3.2 along with Citrix Receiver Online plug-in through 12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted malicious file from an SMB or WebDAV fileserver. Successful exploitation allows an attacker to execute arbitrary code on the client device in the conte ...

The host is installed with Piriform CCleaner 3.26.0.1988 through 5.02.5101 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unallocated disk space. Successful exploitation could allow remote attackers to disclose sensitive information.

The host is installed with Audacity version 2.1.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Evernote through 6.15 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to handle crafted javascript code. Successful exploitation could allow remote attackers to read the victim's files and achieve remote execution command on the victim's computer.

The host is installed with Evernote before 6.3 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle a Trojan horse dll file in an unspecified directory. Successful exploitation could allow remote attackers to gain privileges in an unspecified directory.

The host is installed with FlashGet 1.9.0 and is prone to buffer overflow vulnerability. The flaws present in the application fails to validate the "PWD" response in FTP connections before copying it into an insufficiently sized buffer. Successful exploitation allows attackers to execute arbitrary code within the context of the affected application, or cause a denial-of-service condition.

The host is installed with LAN Messenger 1.2.28 or earlier and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service.

The host is installed with Lenovo System Update before 5.07.0088 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly unspecified vectors. Successful exploitation could allow configuration files to be written to non-standard locations.

The host is installed with Lenovo System Update before 5.07.0072 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle very large user ID or password. Successful exploitation could allow attackers to cause undefined behaviors such as arbitrary code execution.

The host is installed with Lenovo System Update before 5.06.0034 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly generate security tokens. Successful exploitation could allow local users to gain privileges.


Pages:      Start    1346    1347    1348    1349    1350    1351    1352    1353    1354    1355    1356    1357    1358    1359    ..   1486

© SecPod Technologies