[Forgot Password]
Login  Register Subscribe

24003

 
 

131425

 
 

104705

 
 

909

 
 

84119

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 8429 Download | Alert*

The host is installed with Adobe Reader 11.0.0, 10.x before 10.1.5 or 9.x before 9.5.3 and is prone to logic error vulnerability. A flaw is present in the application, which fails to properly handle certain unspecified vectors. Successful exploitation allows attackers to bypass intended access restrictions.

The host is installed with Oracle Java 1.6.0 through 1.6.0_41 or 1.7.0 through 1.7.0_15 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted applet or Web Start application. Successful exploitation allows attackers to cause arbitrary code to be executed on the target user's system.

The host is installed with Oracle Java 1.6.0_43 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle font layout and glyph table errors. Successful exploitation could allow attackers to bypass Java sandbox restrictions.

The host is installed with Adobe Reader or Acrobat before 11.0.03, before 10.1.7 or before 9.5.5 and is prone to unspecified vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat before 11.0.03, before 10.1.7 or before 9.5.5 and is prone to unspecified vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe reader or Acrobat 10.x before 10.1.12 or 11.x before 11.0.09 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause a denial of service (memory corruption).

The host is installed with Adobe reader or Acrobat 10.x before 10.1.12 or 11.x before 11.0.09 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with VideoLAN VLC media player 2.1.5 and is prone to a DEP violation and application crash vulnerability. A flaw is present in the application, which fails to handle a crafted FLV file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which improperly relies on length fields contained in packet data. Successful exploitation allows remote attackers to cause a denial of service (application crash).

The host is installed with LibreOffice before 4.4.5 or Apache OpenOffice before 4.1.2 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which use the stored LinkUpdateMode configuration information in OpenDocument Format files and templates when handling links. Successful exploitation could allow attackers to obtain sensitive information.


Pages:      Start    779    780    781    782    783    784    785    786    787    788    789    790    791    792    ..   842

© 2013 SecPod Technologies