[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31600 Download | Alert*

The host is installed with FactoryTalk Linx 6.00, 6.10 or 6.11 and is prone to a path traversal vulnerability. A flaw is present in application, which fails to properly handle an exposed API call. Successful exploitation may allow an attacker to use specially crafted requests to traverse the file system and expose sensitive data on the local hard drive.

The host is installed with Apache CouchDB before 1.0.4, 1.1.x before 1.1.2 or 1.2.x before 1.2.1 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle the partition2 function in mochiweb_util.erl. Successful exploitation could allow remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the default URI.

The host is installed with WellinTech KingView 6.53 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to properly handle a crafted HTTP request. Successful exploitation allows remote attackers to read arbitrary files.

The host is installed with Sybase EAServer 6.3.1 Developer Edition and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle a particular sequence in a path. Successful exploitation could allow attackers to traverse directories and read arbitrary files.

The host is installed with Microsoft Server 2008, Server 2008 R2, Windows Vista, Windows 7, Server 2012, Server 2012 R2 or Windows 8.1 and is prone to an OLE Remote code execution vulnerability. A flaw is present in the application, which fails to properly validate user input. An attacker who successfully exploited this vulnerability could execute malicious code.

The host is installed with Microsoft Active Directory and is prone to a denial of service vulnerability. A flaw is present in Active Directory, which fails to handle multiple machine accounts created by an authenticated attacker. An attacker who successfully exploited this vulnerability could cause the Active Directory service to become non-responsive.

The host is installed with Serv-U FTP Server before 11.1.0.5 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to properly validate the given input. Successful exploitation allows remote attackers to disclose potentially sensitive information and manipulate certain data.

The host is installed with zFTPServer Suite 6.0.0.52 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle a a crafted RMD (aka rmdir) command. Successful exploitation could allow attackers to to delete arbitrary directories.

The host is installed with the VMware Workstation 11.x before 11.1.2 or VMware Player 7.x before 7.1.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows Windows guest OS users to gain guest OS privileges or cause a denial of service (guest OS kernel memory corruption).

The host is installed with VMware Workstation 5.5.4, 6.0.2, VMware Player 1.0.4 or 2.0.2 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle a crafted VMCI calls that trigger memory. Successful exploitation allows attackers to allows guest OS users to read and write arbitrary files on the host OS string that produces a wide character str ...


Pages:      Start    3061    3062    3063    3064    3065    3066    3067    3068    3069    3070    3071    3072    3073    3074    ..   3159

© SecPod Technologies