[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8274 Download | Alert*

The host is installed with Adobe Digital Editions before 4.5.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Digital Editions before 4.5.2 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Digital Editions before 4.5.2 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Digital Editions before 4.5.6 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause a remote code execution.

The host is installed with Adobe Digital Editions before 4.5.6 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause a memory address disclosure.

The host is installed with Apple Mac OS X before 10.6.3 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle crafted unicode string. Successful exploitation could allow remote attackers to inject arbitrary web script or HTML.

The host is installed with Microsoft Silverlight 5 and is prone to elevation of privilege vulnerability. A flaw is present in the application, which fails to validate user supplied information. Successful exploitation allows attackers to execute the specially crafted application.

The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to a improper access control vulnerability. A flaw is present in the application, which fails to prevent _unknown user from browsing the share point but not guests. Successful exploitation could allow attackers to access share point record.

The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to a authentication bypass vulnerability. A flaw is present in the application, which fails to properly handle authentication authority. Successful exploitation could allow attackers to bypass the password requirement.

The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle access control issue existed in Open Directory. Successful exploitation could allow attackers to another local user's password data.


Pages:      Start    806    807    808    809    810    811    812    813    814    815    816    817    818    819    ..   827

© SecPod Technologies