[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78764

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8086 Download | Alert*

The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the GSM CBCH dissector, which uses the wrong variable to index an array. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds access and application crash).

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow local users to gain privileges.

The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 18.0.0.366 or 19.x, 21.x through 22.x before 22.0.0.209 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause code execution or other unspecified impact.

The host is installed with Adobe Reader or Adobe Acrobat before 11.0.18, Acrobat or Acrobat Reader DC Classic before 15.006.30243 or Acrobat or Acrobat Reader DC Continuous before 15.020.20039 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers that could lead to code execution

The host is installed with Mozilla Firefox 48.x through 48.0.2 or 49.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to reveal some visited URLs and the contents of those pages.

The host is installed with Word for Mac 2011 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user.

The host is installed with Adobe Flash Player before 23.0.0.207 and is prone to a type confusion vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to code execution.

The host is installed with Mozilla Firefox before 50.0 and is prone to a memory corruption vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation allows remote attackers to run arbitrary code.

The host is installed with Wireshark 2.0.x before 2.0.11 or 2.2.x before 2.2.5 and is prone to a denial of service vulnerability. A flaw is present in the RTMPT dissector, which fails to properly handle packet injection or a malformed capture file. Successful exploitation could allow remote attackers to cause RTMPT dissector infinite loop.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   808

© 2013 SecPod Technologies