[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110139

 
 

909

 
 

85964

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 9077 Download | Alert*

The host is installed with Apple Mac OS X 10.8 before 10.13 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle a validation issue, that existed in the handling of the KDC-REP service name. Successful exploitation could allow attackers in a privileged network position to impersonate a service.

The host is installed with Apple Mac OS X 10.13.2 or later and is prone to an arbitary code execution vulnerability. A flaw is present in the application, which fails to handle crafted files. Successful exploitation could allow an attacker to cause arbitrary code execution.

The host is installed with Active Perl and is prone to denial of service vulnerability. A flaw is present in parser, which fails to handle malicious arguments passed to etpeername, readdir, closedir, getsockname, rewinddir, tell or telldir functions leading to a null pointer dereference. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service con ...

The host is installed with Apple Mac OS X or Server 10.12.2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle certain modeline options. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Google Chrome before 67.0.3396.87 and is prone to an out of bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Adobe Flash Player 10.3.181.23 or earlier and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle malicious data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Adobe Flash Player before 13.0.0.258 or 14.x and 15.x before 15.0.0.239 and is prone to a dereference memory pointer vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player 10.3.181.36 or earlier or Adobe AIR 2.7 or earlier and is prone to memory corruption vulnerability. A flaw is present in the applications which fail to properly handle memory. Successful exploitation allows remote attackers to execute remote code.

The host is installed with Adobe Flash Player before 11.7.700.279 or 11.8.x through 13.x before 13.0.0.206 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Wireshark 2.4.0 to 2.4.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the netmonrec_comment_destroy function issue. Successful exploitation allows attackers to cause a denial of service or possibly have unspecified other impact.


Pages:      Start    9    10    11    12    13    14    15    16    17    18    19    20    21    22    ..   907

© SecPod Technologies