[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253562

 
 

909

 
 

197267

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8286 Download | Alert*

The host is installed with Google Chrome before 71.0.3578.80 and is prone to an inappropriate implementation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Wireshark 0.99.7 through 1.0.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a malformed NetScreen snoop file. Successful exploitation allows user-assisted remote attackers to cause a denial of service (application crash).

The host is installed with Wireshark 0.99.6 through 1.0.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted Tektronix K12 text capture file. Successful exploitation allows user-assisted remote attackers to cause a denial of service (application crash).

The host is installed with Wireshark 0.99.8 through 1.0.5 and is prone to a format string vulnerability. A flaw is present in the application, which fails to properly handle format string specifiers. Successful exploitation allows remote attackers to cause a denial of service (application crash).

The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle the dir and prefix arguments. Successful exploitation could allow context-dependent attackers to bypass safe_mode restrictions,.

The host is installed with Apple Mac OS X 10.5.8 or 10.6 before 10.6.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly recognize the safe_mode_include_dir directive. Successful exploitation could allow attackers bypass open_basedir restrictions.

The host is installed with Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 or iWorks 9.0 through 9.0.5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted office document. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X 10.6.x before 10.6.5 or iWork 9.0 through 9.0.5 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to prevent memory corruption. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 or Apple Mac OS X 10.5.8 or 10.6 through 10.6.4 and is prone to buffer overflow vulnerability. A flaw is present in the application which fails to handle a PNG image that triggers an additional data row. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with Apple iTunes before 10.2 or Apple Safari 5.0.4 or Apple Mac OS X 10.6.0 through 10.6.4 and is prone to memory leak vulnerability. A flaw is present in the application which fails to handle a PNG image containing malformed Physical Scale (aka sCAL) chunks. Successful exploitation could allow remote attackers to execute arbitrary code.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   828

© SecPod Technologies