[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78730

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 6923 Download | Alert*

The host is installed with Adobe Flash Player before 13.0.0.241 or 14.x before 14.0.0.176 or Adobe AIR before 14.0.0.178 and is prone to a security bypass vulnerability. A flaw is present in the applications, which do not properly restrict discovery of memory addresses. Successful exploitation could allow remote attackers to bypass the ASLR protection mechanism.

The host is installed with Adobe Flash Player before 13.0.0.241 or 14.x before 14.0.0.176 or Adobe AIR before 14.0.0.178 and is prone to a security bypass vulnerability. A flaw is present in the applications, which do not properly restrict discovery of memory addresses. Successful exploitation could allow remote attackers to bypass the ASLR protection mechanism.

The host is installed with Adobe Flash Player before 13.0.0.241 or 14.x before 14.0.0.176 or Adobe AIR before 14.0.0.178 and is prone to a security bypass vulnerability. A flaw is present in the applications, which do not properly restrict discovery of memory addresses. Successful exploitation could allow remote attackers to bypass the ASLR protection mechanism.

The host is installed with Adobe Flash Player before 13.0.0.241 or 14.x before 14.0.0.176 or Adobe AIR before 14.0.0.178 and is prone to a security bypass vulnerability. A flaw is present in the applications, which fails to handle unspecified vectors. Successful exploitation could allow remote attackers bypass intended access restrictions.

The host is installed with Winamp before 5.55 and is prone to multiple stack-based buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a large Common Chunk (COMM) header value in an AIFF file and a large invalid value in an MP3 file. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Opera before 9.62.10467.0 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long file:// URI. NOTE. Successful exploitation allows remote attackers to execute arbitrary code.

Kodak Image Viewer in Microsoft Windows 2000 SP4, and in some cases XP SP2 and Server 2003 SP1 and SP2, allows remote attackers to execute arbitrary code via crafted image files that trigger memory corruption, as demonstrated by a certain .tif (TIFF) file.

Integer overflow in Microsoft Internet Explorer 6 on Windows XP SP2 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a 0x7fffffff argument to the setSlice method on a WebViewFolderIcon ActiveX object, which leads to an invalid memory copy.

Buffer overflow in the DHCP Client service for Microsoft Windows 2000 SP4, Windows XP SP1 and SP2, and Server 2003 up to SP1 allows remote attackers to execute arbitrary code via a crafted DHCP response.

Vulnerabilities in RPC servers in (1) Microsoft Exchange Server 2000 and earlier, (2) Microsoft SQL Server 2000 and earlier, (3) Windows NT 4.0, and (4) Windows 2000 allow remote attackers to cause a denial of service via malformed inputs.


Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   692

© 2013 SecPod Technologies