[Forgot Password]
Login  Register Subscribe

23631

 
 

126998

 
 

102010

 
 

909

 
 

80911

 
 

121

 
 
Paid content will be excluded from the download.

Filter
Matches : 8434 Download | Alert*

The host is installed with Google Chrome before 41.0.2272.76 and is prone to an array index error vulnerability. A flaw is present in the MidiManagerUsb::DispatchSendMidiData function in media/midi/midi_manager_usb.cc in Google Chrome, which does not properly handle unknown vectors. Successful exploitation allows remote attackers to cause a denial of service or possibly have other impact.

The host is installed with Adobe Reader or Acrobat 10.x before 10.1.14 or 11.x before 11.0.11 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Google Chrome before 44.0.2403.89 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly choose a truncation function. Successful exploitation could allow attackers to disclose sensitive information.

The host is installed with VideoLAN VLC Media Player 2.1.5 or earlier and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause unknown impact.

The host is installed with VideoLAN VLC Media Player 2.1.5 or earlier and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to cause unknown impact.

The host is installed with Microsoft Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a truetype font parsing vulnerability. A flaw is present in the applications, which fail to handle a crafted TrueType fonts. Successful exploitation could allow attackers to take complete control of the affected system.

The host is installed with Microsoft Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a truetype font parsing vulnerability. A flaw is present in the applications, which fail to handle a crafted TrueType fonts. Successful exploitation could allow attackers to take complete control of the affected system.

The host is installed with Google Chrome before 42.0.2311.90 and is prone to multiple unspecifies vulnerabilities. The flaws are present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to cause a denial of service or possibly have other impact.

The host is installed with Google Chrome before 46.0.2490.71 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to crash the service.

The host is installed with Adobe Reader or Acrobat 10.x before 10.1.15, 11.x before 11.0.12, Acrobat Reader DC Classic before 2015.006.30060, Acrobat Reader DC Continuous before 2015.008.20082, Acrobat DC Classic before 2015.006.30060 or Acrobat DC Continuous before 2015.008.20082 and is prone to an use-after-free vulnerability. A flaw is present in the applications, which fail to handle unspecifi ...


Pages:      Start    776    777    778    779    780    781    782    783    784    785    786    787    788    789    ..   843

© 2013 SecPod Technologies