[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78764

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8059 Download | Alert*

The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_packet function in epan/packet.c file. Successful exploitation could allow remote attackers to cause denial of service or application crash.

The host is installed with Adobe Shockwave Player before 11.5.9.620 and is prone to a input validation vulnerability. A flaw is present in the application, which fails to validate unspecified input data. Successful exploitation allows a remote attackers to corrupt memory and execute arbitrary code on the system.

The host is installed with Adobe Shockwave Player before 11.5.6.606 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle a crafted Shockwave file. Successful exploitation allows remote attackers to execute remote code.

The host is installed with Adobe Reader 8.x before 8.2.2 or 9.x before 9.3.2 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted PDF document.

The host is installed with Google Chrome before 18.0.1025.168 or Apple Safari before 6.0 and is prone to use-after-free vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with Google Chrome before 9.0.597.84 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to handle stat system call function. Successful exploitation could allow remote attackers to obtain potentially sensitive information about local files.

The host is installed with Google Chrome before 19.0.1084.46 and is prone to out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle the OGG container. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.4 and is prone to a buffer underflow vulnerability. A flaw is present in the application, which fails to properly handle crafted MPEG file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Google Chrome before 20.0.1132.43 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle SVG references. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Apple Safari before 6.0 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   805

© 2013 SecPod Technologies