[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112994

 
 

909

 
 

87812

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 8564 Download | Alert*

The host is installed with Adobe Digital Editions before 4.5.5 and is prone to an insecure library loading vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to gain privileges.

The host is installed with Adobe Digital Editions before 4.5.5 and is prone to an insecure library loading vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to gain privileges.

The host is installed with Adobe Digital Editions before 4.5.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow remote attackers to execute code.

The host is installed with Adobe Digital Editions before 4.5.5 and is prone to a stack overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to cause a memory leak.

The host is installed with Adobe Digital Editions before 4.5.5 and is prone to an insecure library loading vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow attackers to gain privileges.

The host is installed with Wireshark 1.12.x before 1.12.13 and is prone to a denial of service vulnerability. A flaw is present in the MMSE dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (infinite loop).

The host is installed with Apple iTunes before 12.6 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle vectors involving use of the srand function. Successful exploitation could allow context-dependent attackers to defeat cryptographic protection mechanisms.

The host is installed with Adobe Digital Editions before 4.5.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allow remote attackers to execute code.

A security feature bypass exists when the Lync for Mac 2011 client fails to properly validate certificates. An attacker who successfully exploited this vulnerability could tamper with trusted communications between the server and target client.

The host is installed with Adobe Digital Editions before 4.5.2 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    846    847    848    849    850    851    852    853    854    855    856    ..   856

© SecPod Technologies