[Forgot Password]
Login  Register Subscribe

24002

 
 

127027

 
 

102010

 
 

909

 
 

81374

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 8452 Download | Alert*

The host is installed with Google Chrome before 49.0.2623.75 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted JavaScript code. Successful exploitation allows attackers to cause a denial of service (incorrect cast and assertion failure) or possibly have unspecified other impact.

The host is installed with Adobe Reader or Adobe Acrobat before 11.0.16, Acrobat or Acrobat Reader DC Classic before 15.006.30172 or Acrobat or Acrobat Reader DC Continuous before 15.016.20039 and is prone to an use-after-free vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with LibreOffice before 5.1.4002 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted RTF file, related to stylesheet and supercript tokens. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with Xcode before 8.1 on Apple Mac OS X 10.11.5 or later and is prone to an arbitrary code execution vulnerability. A flaw is present in the Node.js, which fails to handle unknown vectors. Successful exploitation allows attackers to cause unexpected application termination or arbitrary code execution.

The host is installed with Apple iTunes before 12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted XML data. Successful exploitation could allow allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code.

The host is installed with Adobe Reader or Adobe Acrobat before 11.0.20, Acrobat or Acrobat Reader DC Classic before 15.006.30306 or Acrobat or Acrobat Reader DC Continuous before 17.009.20044 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Google Chrome before 57.0.2987.98 and is prone to a multiple out of bounds writes vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in the browser, which fails to handle SVG documents. Successful exploitation could allow remote attackers to execute remote code or cause denial of service.

The host is installed with Google Chrome before 13.0.782.107 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle re-entrancy issues associated with the GPU lock. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 13.0.782.215 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle user supplied input. Successful exploitation could allow attackers to crash the service.


Pages:      Start    778    779    780    781    782    783    784    785    786    787    788    789    790    791    ..   845

© 2013 SecPod Technologies