[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254802

 
 

909

 
 

198617

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197732 Download | Alert*

The host is installed with PHP 5.3.x through 5.3.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted filename length. Successful exploitation could allow attackers to bypass security.

The host is installed Quicklook in Apple Mac OS X 10.6 through 10.6.6 and is prone to a denial of service vulnerability. A flaw is present in the application, that fials to handle an Excel spreadsheet with a crafted formula that uses unspecified opcodes. Successful exploitation could allow attackers to crash the service.

The host is installed with QuickTime in Apple Mac OS X 10.6 through 10.6.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted JPEG2000 image. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple QuickTime and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted movie file. Successful exploitation allow remote attackers to execute arbitrary code or cause a denial of service (application crash).

The host is installed with Apple QuickTime and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted flashpix file. Successful exploitation allow remote attackers to execute arbitrary code or cause a denial of service (application crash).

The host is installed with Apple QuickTime and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted QTVR (QuickTime Virtual Reality) movie file. Successful exploitation allow remote attackers to execute arbitrary code or cause a denial of service (application crash).

The host is installed with Ruby 1.9.2-p136 and earlier and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to crash the service.

The host is installed with Apache HTTP Server as distributed in Apache Subversion 1.5.x before 1.5.8 and 1.6.x before 1.6.13 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a named repository as a rule scope. Successful exploitation could allow an attacker to crash the service.

The host is installed with Apple Mac OS X 10.6 through 10.6.6 and is prone to man-in-the-middle attack. A flaw is present in the application, which fails to prevent leveraging protocol vulnerabilities. Successful exploitation could allow attackers to spoof SSH servers.

The host is installed with Mac OS X 10.5.8 or 10.6 through 10.6.6 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted SHZ bytecode instruction. Successful exploitation could allow attackers to crash the service.


Pages:      Start    8182    8183    8184    8185    8186    8187    8188    8189    8190    8191    8192    8193    8194    8195    ..   19773

© SecPod Technologies