[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14858 Download | Alert*

The host is installed with Adobe Media Encoder through 14.0 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with ImageMagick 7.0.8-43 and is prone to an information disclosure vulnerability. The flaws are present in the coders/dot.c file, which fails to handle unspecified vectors. Successful exploitation could allow a memory leak.

The host is installed with ImageMagick 7.0.8-43 and is prone to an information disclosure vulnerability. The flaws are present in the coders/ps3.c file, which fails to handle Huffman2DEncodeImage. Successful exploitation could allow a memory leak.

The host is installed with ImageMagick 7.0.8-40 and is prone to an information disclosure vulnerability. The flaws are present in the coders/ps2.c file, which fails to handle Huffman2DEncodeImage. Successful exploitation could allow a memory leak.

The host is installed with ImageMagick 7.0.8-35 and is prone to an information disclosure vulnerability. The flaws are present in the coders/dot.c file, which fails to handle unspecified vectors. Successful exploitation could allow a memory leak.

The host is installed with ImageMagick 7.0.8-35 and is prone to an information disclosure vulnerability. The flaws are present in the coders/dps.c file, which fails to handle unspecified vectors. Successful exploitation could allow a memory leak.

The host is installed with ImageMagick 7.0.8-35 and is prone to an information disclosure vulnerability. The flaws are present in the coders/dps.c file, which fails to handle unspecified vectors. Successful exploitation could allow a memory leak.

The host is installed with ImageMagick 7.0.8-43 Q16 and is prone to a use after free vulnerability. The flaws are present in the MagickCore/constitute.c, which fails to handle Matlab image file that is mishandled in ReadImage. Successful exploitation could allows an attackers to cause a denial-of-service.

The host is installed with ImageMagick 7.0.8-43 Q16 and is prone to an out-of-bounds read vulnerability. The flaws are present in the function WriteTIFFImage of coders/tiff.c, which fails to handle crafted image file. Successful exploitation could allows an attackers to cause a denial of service or possibly information disclosure.

The host is installed with ImageMagick 7.0.8-41 Q16 and is prone to an out-of-bounds read vulnerability. The flaws are present in the ReadXWDImage in coders/xwd.c, which fails to handle corrupted XWD image file. Successful exploitation could allows an attackers to cause a denial of service.


Pages:      Start    1084    1085    1086    1087    1088    1089    1090    1091    1092    1093    1094    1095    1096    1097    ..   1485

© SecPod Technologies