[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31505 Download | Alert*

The host is installed with EMC AutoStart 5.3.x or 5.4.x before 5.4.3 and is prone to Multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle malicious packets. Successful exploitation allows remote attackers to cause a denial of service (agent crash) or possibly execute arbitrary code via crafted packets.

The host is installed with Telegram Desktop before 1.5.12 and is prone to an IDN homograph attack vulnerability. A flaw is present in the application, which fails to handle issues in character representation in fonts. Successful exploitation allows attackers to cause script spoofing attacks.

The host is installed with Apache CouchDB 1.x before 2.2.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle the validation issue in administrator-supplied configuration settings. Successful exploitation could allow attackers to escalate their privileges to that of the operating system's user under which CouchDB runs, by bypassing the ...

The host is installed with BSplayer Free 2.51 Build 1022 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle the skin parameter in the options section of a skins file (.bsi). Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with BSplayer Free 2.32 Build 975 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the boundary checks issue on user-supplied input. Successful exploitation could allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long hostname in a .bsl playlist file.

The host is installed with Firebird 2.5.0 or 2.5.1 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle an empty dynamic SQL query. Successful exploitation could allow remote authenticated users to cause a denial of service.

The host is installed with GoodTech SSH Server 6.4 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in the SFTP subsystem. Successful exploitation could allow remote authenticated users to execute arbitrary code.

The host is installed with Qbik WinGate through 6.2.2.1137 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a issue in the IMAP service. Successful exploitation could allow remote attackers to cause a denial of service (resource exhaustion) or possibly execute arbitrary code via a long argument to the LIST command.

The host is installed with Sielco Sistemi Winlog or Sielco Sistemi Winlog Pro 2.07.16 or earlier and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a specially-crafted request to port 46824. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Irfanview Plugins version 4.33 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a specially crafted JLS compressed image file. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    3115    3116    3117    3118    3119    3120    3121    3122    3123    3124    3125    3126    3127    3128    ..   3150

© SecPod Technologies