[Forgot Password]
Login  Register Subscribe

23631

 
 

121725

 
 

98218

 
 

909

 
 

79224

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8407 Download | Alert*

The host is installed with Adobe Flash Player before 10.3.183.29 or 11.x before 11.4.402.287 or Adobe AIR 3.4.0.2540 or before and is prone to buffer overflow vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with IBM Tivoli Storage Manager 5.3.x before 5.3.6.10, 5.4.x before 5.4.3.4, 5.5.x before 5.5.2.10 or 6.1.x before 6.1.3.1 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to prevent specifying a long LANG environment variable, and then sending a request over a pipe. Successful exploitation allows local users to gain ...

The host is installed with IBM Tivoli Storage Manager (TSM) 5.3.x before 5.3.6.10, 5.4.x before 5.4.3.4, 5.5.x before 5.5.3, 6.1.x before 6.1.4 or 6.2.x before 6.2.2 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle certain unknown vectors. Successful exploitation allows local users to overwrite arbitrary files.

The host is installed with Opera before 12.10 and is prone to unauthorized access vulnerability. A flaw is present in the application, which fails to handle the X.509 certificate-validation functionality in the https implementation. Successful exploitation could allow a remote attacker to trigger a false indication of successful revocation-status checking by causing a failure of a single checking ...

The host is installed with Oracle Java SE 1.6.0 before 1.6.0_41 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to JMX. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.

The host is installed with Adobe Flash Player before 10.3.183.61 and 11.x before 11.6.602.167 or Adobe Air before 3.6.0.597 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Google Chrome before 25.0.1364.152 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors related to the handling of browser navigation. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact.

The host is installed with Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1 or SeaMonkey before 2.15 and is prone to multiple unspecified vulnerabilities. The flaws are present in the applications, which fail to properly handle certain unknown vectors. Successful exploitation a ...

The host is installed with Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2 or SeaMonkey before 2.15 and is prone to use-after-free vulnerability. A flaw is present in the applications, which fail to handle a crafted web page referencing JavaScript Proxy objects that are not properly handled during garbage collection. Succes ...

The host is installed with Oracle Java 1.6.0_43 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    792    793    794    795    796    797    798    799    800    801    802    803    804    805    ..   840

© 2013 SecPod Technologies