[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8059 Download | Alert*

The host is installed with VideoLAN VLC media player 0.5.0 through 1.0.0 and is prone to an integer underflow vulnerability. A flaw is present in the application, which fails to handle a crafted length value in an RDT chunk header. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with VideoLAN VLC media player 0.5.0 before 1.0.2 and is prone to multiple stack-based buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle (1) a crafted ASF file, related to the ASF_ObjectDumpDebug function in modules/demux/asf/libasf.c; (2) a crafted AVI file, related to the AVI_ChunkDumpDebug_level function in modules/demux/avi/l ...

The host is installed with Google Chrome before 27.0.1444.3 and is prone to a denial of service vulnerability. The flaw is present in the application, which fails to handle a crafted javascript code. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Adobe Digital Editions 2.x before 2.0.1 and is prone to unspecified memory corruption vulnerability. The flaw is present in the application, which fails to properly handle memory. Successful exploitation allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.

The host is installed with Google Chrome before 40.0.2214.91 and is prone to a privilege escalation vulnerability. The flaw is present in the application, which fails to handle a trojan horse program. Successful exploitation allows local users to gain privileges.

The host is installed with Google Chrome before 40.0.2214.91 and is prone to an use-after-free vulnerability. The flaw is present in the application, which fails to handle a crafted PDF document. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Google Chrome before 34.0.1847.131 and is prone to an integer overflow vulnerability. The flaw is present in the application, which fails to handle a large length value. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Apple Safari before 6.2.1, 7.x before 7.1.1 or 8.x before 8.0.1 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly load cross-origin elements. Successful exploitation could allow attackers to edit unauthorized data.

The host is installed with Apple iTunes before 11.2.1 and is prone to security bypass vulnerability. A flaw is present in the application, which fail to handle standard filesystem operations. Successful exploitation could allow attackers to modify files and consequently obtain access to arbitrary user accounts.


Pages:      Start    796    797    798    799    800    801    802    803    804    805    ..   805

© 2013 SecPod Technologies