[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108530

 
 

909

 
 

85343

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 7032 Download | Alert*

The host is installed with Adobe Flash Player 9.x up to 9.0.48.0 and is prone to a HTTP request splitting vulnerability. A flaw is present in the application, which fails to handle malicious data. Successful exploitation could allow remote attackers to modify HTTP headers for client requests and conduct HTTP Request Splitting attacks.

The host is installed with Adobe Flash Player 9.x before 9.0.124.0 or Adobe Air before 1.0.1 and is prone to a DNS rebinding vulnerability. A flaw is present in the applications, which fail to handle a malicious SWF file. Successful exploitation could allow remote attackers to establish arbitrary TCP sessions.

The host is installed with Mozilla Firefox or Mozilla Thunderbird or SeaMonkey and is prone to execution of arbitrary code vulnerability. A flaw is present in the application, which fails to properly handle nsTreeRange data structures. Successful exploitation could allow remote attackers to execute arbitrary code via unspecified vectors that lead to a "dangling pointer".

The host is installed with Adobe Flash Player 9.x up to 9.0.48.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle input validation errors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player 9.x up to 9.0.48.0 and is prone to multiple cross-site scripting vulnerabilities. The flaw are present in the application, which fail to handle crafted flash file. Successful exploitation could allow attackers to crash the service.

The host is installed with Oracle Java SE 7 Update 13 or earlier and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to Libraries. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 7 Update 13 or earlier and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to Libraries. Successful exploitation allows attackers to affect integrity.

The host is installed with Oracle Java SE 7 Update 13 or earlier or 6 Update 39 or earlier or 5 update 39 or earlier and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to JMX. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.

The host is installed with Mozilla Firefox or Mozilla Thunderbird or SeaMonkey and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle nsDirIndexParser. Successful exploitation could allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code.

The DCOM RPC interface for Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause network communications via an "alter context" call that contains additional data, aka the "Object Identity Vulnerability."


Pages:      Start    679    680    681    682    683    684    685    686    687    688    689    690    691    692    ..   703

© SecPod Technologies