[Forgot Password]
Login  Register Subscribe

23631

 
 

126995

 
 

100182

 
 

909

 
 

80298

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8192 Download | Alert*

The host is installed with Xcode before 8.1 on Apple Mac OS X 10.11.5 or later and is prone to an arbitrary code execution vulnerability. A flaw is present in the Node.js, which fails to handle unknown vectors. Successful exploitation allows attackers to cause unexpected application termination or arbitrary code execution.

The host is installed with Adobe Flash Player before 23.0.0.207 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to code execution.

The host is installed with Adobe Digital Editions before 4.5.4 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to cause a memory leak.

The host is installed with Google Chrome before 57.0.2987.98 and is prone to a multiple out of bounds writes vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Google Chrome before 62.0.3202.62 and is prone to an URL spoofing vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Adobe Reader 8.x before 8.2.5 and 9.x before 9.4 and is prone to multiple vulnerabilities. A flaw is present in the application, which fails to validate user supplied data. Successful exploitation could allow an attacker to execute arbitrary code or crash the service.

The host is installed with Adobe Reader 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 and is prone to input validation vulnerability. A flaw is present in the applications, which fails to properly perform input validation. Successful exploitation allows remote attackers to execute arbitrary code using a crafted 3D file.

The host is installed with Google Chrome before 14.0.835.202 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors related to the Google V8 bindings. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 15.0.874.120 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted stream. Successful exploitation could allow attackers to overflow the buffer.

The host is installed with Google Chrome before 17.0.963.46 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle vectors that trigger a large amount of database usage. Successful exploitation allows remote attackers to cause an application crash.


Pages:      Start    796    797    798    799    800    801    802    803    804    805    806    807    808    809    ..   819

© 2013 SecPod Technologies