[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80167

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8352 Download | Alert*

The host is installed with Mac OS X 10.6.8 or 10.7 before 10.7.5 or 10.8.x before 10.8.2 and is prone to a SQL injection vulnerability. A flaw is present in the application, which fails to properly perform a temporary change to the magic_quotes_gpc directive during the importing of environment variables. Successful exploitation could allow attackers to conduct SQL injection attacks.

The host is installed with Adobe Flash Player 11.x through 11.1.102.55 or before 10.3.183.15 versions and is prone to cross-site scripting vulnerability. A flaw is present in the application, which fails to properly validate user supplied input. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

The host is installed with Adobe Reader 9.x before 9.5.1, Adobe Reader or Acrobat 10.x before 10.1.3 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted TrueType font. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Reader 9.x before 9.5.1, Adobe Reader or Acrobat 10.x before 10.1.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to crash the service.

The host is installed with Adobe Reader 9.x before 9.5.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to crash the service.

The host is installed with Adobe Flash Player 11.x through 11.1.102.55 or before 10.3.183.15 versions and is prone to type confusion memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Flash Player 11.x through 11.1.102.55 or before 10.3.183.15 versions and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted MP4 data. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Flash Player 11.x through 11.1.102.55 or before 10.3.183.15 versions and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Flash Player 11.x through 11.1.102.55 or before 10.3.183.15 versions and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly validate user inputs. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Flash Player 11.x through 11.1.102.55 or before 10.3.183.15 versions and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly validate user inputs. Successful exploitation allows attackers to execute arbitrary code.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   835

© 2013 SecPod Technologies