[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14858 Download | Alert*

The host is installed with Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, or 7.x before 7.0.30 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle caches information in the HTTP Digest Access Authentication implementation. Successful exploitation allows remote attackers to bypass authentication via vectors related to the sessio ...

The host is installed with LibreOffice 3.5.x before 3.5.7.2 or 3.6.x before 3.6.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted odt file to vcllo.dll, ODG (Drawing document) file to svxcorelo.dll, PolyPolygon record in a .wmf (Window Meta File) file embedded in a ppt (PowerPoint) file to tllo.dll, or xls (Excel) file to scfil ...

The host is installed with VideoLAN VLC media player 2.0.3 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted PNG file. Successful exploitation allows remote attackers to cause an application crash.

The host is installed with Google Chrome through 22 or Apple Safari 5.1.7 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to properly handle the html/parser/XSSAuditor.cpp in WebCore in WebKit. Successful exploitation allows remote attackers to bypass a cross-site scripting (XSS) protection mechanism via a crafted string.

The host is installed with Apache Tomcat 6.x before 6.0.36 or 7.x before 7.0.28 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly restrict the request-header size. Successful exploitation allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.

The host is installed with AOL Instant Messenger (AIM) 1.0.1.2 and is prone to SSL spoofing vulnerability. A flaw is present in the application, which fails to verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate. Successful exploitation allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid ...

The host is installed with RealNetworks RealPlayer 15.0.5.109 or earlier and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted ZIP file that triggers incorrect processing of long pathnames by the Watch Folders feature. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Apache Tomcat through 7.0.x and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the partial HTTP requests. Successful exploitation allows remote attackers to cause a denial of service (daemon outage).

The host is installed with the VMware Workstation 8.x before 8.0.5 or VMware Player 4.x before 4.0.5 on Windows and is prone to privilege escalation vulnerability. A flaw is present in the application, which fails to assign strong security permissions for unspecified process threads. Successful exploitation allows host OS users to gain host OS privileges via a crafted application.

The host is installed with the VMware Workstation 8.x before 8.0.5 or VMware Player 4.x before 4.0.5 on Windows and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle system folder. Successful exploitation allows host OS users to gain host OS privileges.


Pages:      Start    1268    1269    1270    1271    1272    1273    1274    1275    1276    1277    1278    1279    1280    1281    ..   1485

© SecPod Technologies