[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

139033

 
 

909

 
 

112583

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 9081 Download | Alert*

The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in libtiff, which fails to handle unspecified vectors. Successful exploitation allows attackers to arbitrary code execution.

The host is installed with Office 2008 or 2011 for Mac or Open XML File Format Converter for Mac and is prone to a conditional expression parsing vulnerability. A flaw is present in the application, which fails to properly parse conditional expressions associated with formatting requirements. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Office 2008 for Mac or Open XML File Format Converter for Mac and is prone to a heap corruption vulnerability. A flaw is present in the application, which fails to properly parse records in Excel spreadsheets. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Office 2008, 2011 or Open XML File Format Converter for Mac and is prone to an array indexing vulnerability. A flaw is present in the application, which fails to handle crafted excel files. Successful exploitation could allow attackers to take complete control of the affected system.

The host is installed with Microsoft Office 2008 for Mac and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle specially crafted PowerPoint files. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Illustrator before CS6 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to execute arbitrary code.

The host is installed with Google Chrome before 19.0.1084.52 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle vectors that trigger type corruption. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 19.0.1084.52 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to vectors that trigger unknown function calls. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 19.0.1084.52 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly perform a cast of an unspecified variable during handling of color spaces. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 19.0.1084.52 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle an invalid encrypted document. Successful exploitation could allow attackers to crash the service.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   908

© SecPod Technologies