[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

95906

 
 

909

 
 

77986

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 10317 Download | Alert*

The host is installed with cygwin before 4.1.13 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle crafted variables. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with cygwin before 4.1.13 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle crafted variables. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 13.0.0.250, 14.x or 15.x before 15.0.0.189 or Adobe AIR before 15.0.0.293 and is prone to a arbitrary code execution vulnerability. A flaw is present in the applications, which fail to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Google Chrome before 14.0.835.163 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly perform garbage collection during the processing of PDF documents. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

Heap-based buffer overflow in Microsoft Office PowerPoint 2002 SP3 and 2003 SP3, and PowerPoint in Microsoft Office 2004 for Mac, allows remote attackers to execute arbitrary code via a crafted structure in a Notes container in a PowerPoint file that causes PowerPoint to read more data than was allocated when creating a C++ object, leading to an overwrite of a function pointer, aka "Heap Corruptio ...

The host is installed with RealNetworks RealPlayer 10/10.5, RealOne Player or RealPlayer Enterprise and is prone to stack buffer overflow vulnerability. A flaw is present in the application due to an error in the SmilTimeValue::parseWallClockValue function in smlprstime.cpp. Successful exploitation allows remote attackers to execute arbitrary code via an SMIL (SMIL2) file with a long wallclock val ...

Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, and 2003 Viewer allows user-assisted remote attackers to execute arbitrary code via a malformed Excel file involving the "denoting [of] the start of a Workspace designation", which results in memory corruption, aka the "Workbook Memory Corruption Vulnerability".

The host is installed with RealNetworks RealPlayer 10.5/10.0, RealOne Player V2 or RealPlayer Enterprise and is prone to heap buffer overflow vulnerability. A flaw is present in the application due to improper bounds checking of SWF files. Successful exploitation allows remote attackers to execute arbitrary code via an SWF file with malformed record headers.

The host is installed with RealNetworks RealPlayer 8/10/10.5, RealOne Player or RealPlayer Enterprise and is prone to heap buffer overflow vulnerability. A flaw is present in the application due to improper bounds checking of RA and RAM files. Successful exploitation allows remote attackers to execute arbitrary code via a .ra or .ram file with a large size value in the RA header.

Microsoft XML Core Services (MSXML) 3.0 through 6.0 allows remote attackers to execute arbitrary code via the substringData method on a (1) TextNode or (2) XMLDOM object, which causes an integer overflow that leads to a buffer overflow.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1031

© 2013 SecPod Technologies