[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 10935 Download | Alert*

The host is installed with IBM Lotus Sametime 8.0.1 and is prone to multiple cross site scripting vulnerabilities. The flaws are present in the application, which fails to sufficiently sanitize user-supplied data. Successful exploitation could allow attackers to inject arbitrary code.

The host is installed with kibana before 5.6.15 or 6.x before 6.6.1 and is prone to a cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle a issue in unspecified vectors. Successful exploitation allows attackers to obtain sensitive information from or perform destructive actions on behalf of other kibana users.

The host is installed with kibana before 5.6.15 or 6.x before 6.6.1 and is prone to a cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle a issue in unspecified vectors. Successful exploitation allows attackers to obtain sensitive information from or perform destructive actions on behalf of other kibana users.

The host is installed with IBM DB2 11.1 before 11.1.4FP6 or 11.5 before 11.5.5FP1 and is prone to a denial of service vulnerability. A flaw is present in the application which fails to handle a specifically crafted select statement. Successful exploitation allows an attacker to terminate the server abnormally.

The host is installed with Adobe Flash Player 9.x through 9.0.151.0 or 10.0.12.36 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a maliciously crafted SWF file. Successful exploitation could allow remote to take complete control of the affected system.

The host is installed with Adobe Flash Player 9.x through 9.0.151.0 or 10.0.12.36 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a maliciously crafted SWF file. Successful exploitation could allow remote to take complete control of the affected system.

The host is installed with IBM Lotus Domino 8.5.x through 8.5.3 and is prone to cross-site scripting vulnerability. A flaw is present in the application, which fails to sufficiently sanitize user-supplied input. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

The host is installed with EMC NetWorker 7.5.x or 7.6.x before 7.6.5 or 8.x before 8.0.0.6 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle crafted SunRPC data. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Novell File Reporter before 1.0.2.53 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application when parsing tags inside the <RECORD> element, the application lacks a size check before pushing strings to a memory. Successful exploitation allows remote attacker to execute arbitrary code on the target system.

An issue was discovered in vcSetXCutTextProc in VNConsole.c in LinuxVNC and VNCommand from the LibVNC/vncterm distribution through 0.9.10. Missing sanitization of the client-specified message length may cause integer overflow or possibly have unspecified other impact via a specially crafted VNC packet.


Pages:      Start    1082    1083    1084    1085    1086    1087    1088    1089    1090    1091    1092    1093    ..   1093

© SecPod Technologies