[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26884 Download | Alert*

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scrip ...

The host is installed with Quest Toad for Data Analysts 3.0.1 and is prone to privilege escalation vulnerability. A flaw is present in the application, which fails to set proper permissions on the %COMMONPROGRAMFILES%\Quest Shared directory. Successful exploitation could allow local users to gain privileges.

An elevation of privilege vulnerability exists in Microsoft SharePoint. An attacker who successfully exploited this vulnerability could attempt to impersonate another user of the SharePoint server. To exploit this vulnerability, an authenticated attacker would send a specially crafted request to an affected server, thereby allowing the impersonation of another SharePoint user. The security update ...

The host is installed with Apache CouchDB version 2.0.0 and is prone to a local privilege escalation vulnerability. A flaw is present in the application, which fails to handle a issue in file permissions of the parent directory. Successful exploitation could allow attackers to substitute any executable for the nssm.exe service launcher, or CouchDB batch or binary files.

The host is installed with Qbik WinGate 6.x through 6.5.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle the HTTP Host header. Successful exploitation could allow remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites.

The host is installed with Symantec LiveUpdate Administrator before 2.3.1 and is prone to privilege-escalation vulnerability. A flaw is present in the application, which uses weak permissions for the installation directory. Successful exploitation allows local users to gain privileges via a Trojan horse file.

The host is installed with PrivaWall Antivirus before 5.6 Build 2354 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a crafted file embedded in a WordML document. Successful exploitation could allow attackers to bypass malware detection.

The host is installed with WellinTech KingSCADA 3.0 and is prone to information disclosure vulnerability. A flaw is present in the application, which uses a cleartext base64 format for storage of passwords in user.db. Successful exploitation allows context-dependent attackers to obtain sensitive information by reading this file.

The host is installed with OpenSSH 6.2 or 6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle an issue in mm_newkeys_from_blob function in monitor_wrap.c in sshd. Successful exploitation could allow remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted cal ...

The host is installed with Microsoft .NET Framework 4.6 or .NET Framework 4.6.1 on Microsoft Windows Vista SP2, Server 2008 SP2, Windows 7 SP1 or Server 2008 R2 SP1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly validate input before loading libraries. An attacker who successfully exploited this vulnerability could take control ...


Pages:      Start    2600    2601    2602    2603    2604    2605    2606    2607    2608    2609    2610    2611    2612    2613    ..   2688

© SecPod Technologies