[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256488

 
 

909

 
 

199193

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26532 Download | Alert*

The host is installed with Symantec N360 1.0 and 2.0, Norton Internet Security, AntiVirus 2006 through 2008, Symantec Client Security 3.0.x before 3.1 MR9 or 3.1.x before MR9 and is prone to a stack based buffer overflow vulnerability. A flaw is present in the applications, which fail to handle event manipulation. Successful exploitation could allow attackers to execute arbitrary code or crash the ...

The host is installed with Symantec Scan Engine before 5.1.4.24, Symantec Antivirus before 9.0 MR6-MP1, 10.x before 10.1 MR5 MP1 or Symantec Client Security before 2.0 MR6-MP1 or 3.x before 3.1 MR5 MP1 and is prone to heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle multiple crafted CAB archives. Successful exploitation could allow attackers to ...

The host is installed with Symantec Scan Engine before 5.1.6.31 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a malformed RAR file to the Internet Content Adaptation Protocol (ICAP) port. Successful exploitation could allow attackers to crash the service.

The host is installed with Firebird 2.1.3 through 2.1.5 before 18514 or 2.5.1 through 2.5.3 before 26623 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle crafted packet to TCP port 3050. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with BigAntSoft BigAnt IM Message Server and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly authenticate for file uploading. Successful exploitation allows remote attackers to create arbitrary files under AntServer\DocData\Public via unspecified vectors.

The host is installed with Apple QuickTime 6.x or 7.x before 7.6.8 and is prone to remote code execution vulnerability. The flaw is present in IPersistPropertyBag2::Read function in QTPlugin.ocx, which fails to properly handle the _Marshaled_pUnk attribute. Successful exploitation allows attackers to execute arbitrary code via the _Marshaled_pUnk attribute, which triggers unmarshaling of an untrus ...

The host is installed with .NET Framework 2.0, 3.5, 3.5.1, 4.0 or 4.5 and is prone to spoofing vulnerability. A flaw is present in the application, which fails to check signatures in XML file. Successful exploitation allows attackers to make undetected changes to signed XML documents via unspecified vectors that preserve signature validity.

The host is installed with .NET Framework 4.5 and is prone to authentication bypass vulnerability. A flaw is present in the application, which fails to create policy requirements for custom Windows Communication Foundation (WCF) endpoint authentication in certain situations involving passwords over HTTPS. Successful exploitation allows attackers to bypass authentication by sending queries to an en ...

The host is installed with Apple Safari before 3.1 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle crafted certificates. Successful exploitation allows remote attackers to spoof trusted SSL certificates.

The host is installed with Apple Safari before 3.2.2 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle a 3xx HTTP CONNECT response before a successful SSL handshake. Successful exploitation could allow attackers to execute arbitrary web script.


Pages:      Start    2639    2640    2641    2642    2643    2644    2645    2646    2647    2648    2649    2650    2651    2652    ..   2653

© SecPod Technologies