[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15192 Download | Alert*

The host is installed with IBM Lotus Domino 8.5.x through 8.5.3 and is prone to cross-site scripting vulnerability. A flaw is present in the application, which fails to sufficiently sanitize user-supplied input. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

The host is installed with EMC NetWorker 7.5.x or 7.6.x before 7.6.5 or 8.x before 8.0.0.6 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle crafted SunRPC data. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with tcptrack before 1.4.2 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long command line argument. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with tcptrack before 1.4.2 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long command line argument. Successful exploitation could allow attackers to execute arbitrary code.

ihex.c in GNU Binutils before 2.26 contains a stack buffer overflow when printing bad bytes in Intel Hex objects.

The host is installed with EMC AutoStart 5.3.x or 5.4.x before 5.4.3 and is prone to Multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle malicious packets. Successful exploitation allows remote attackers to cause a denial of service (agent crash) or possibly execute arbitrary code via crafted packets.

The host is installed with Novell File Reporter before 1.0.2.53 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application when parsing tags inside the <RECORD> element, the application lacks a size check before pushing strings to a memory. Successful exploitation allows remote attacker to execute arbitrary code on the target system.

The dex_parse_debug_item function in libr/bin/p/bin_dex.c in radare2 1.2.1allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted DEX file.

dhcpcd before 6.10.0 allows remote attackers to cause a denial of service via vectors related to the option length.

dhcpcd before 6.10.0, as used in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 and other products, mismanages option lengths, which allows remote attackers to execute arbitrary code or cause a denial of service via a malformed DHCP response, aka internal bug 26461634.


Pages:      Start    1497    1498    1499    1500    1501    1502    1503    1504    1505    1506    1507    1508    1509    1510    ..   1519

© SecPod Technologies