[Forgot Password]
Login  Register Subscribe

23631

 
 

122183

 
 

98060

 
 

909

 
 

79198

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 12032 Download | Alert*

The host is installed with Apple QuickTime before 7.7 and is prone to buffer overflow vulnerability. A flaw is present in the application which fails to properly handle JPEG files. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Apple QuickTime before 7.7 and is prone to integer overflow vulnerability. A flaw is present in the application which fails to properly handle audio channels in movie files. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Apple QuickTime before 7.7 and is prone to memory corruption vulnerability. A flaw is present in the application which fails to properly handle sample tables in QuickTime movie files. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Apple QuickTime before 7.7 and is prone to integer overflow vulnerability. A flaw is present in the application which fails to properly handle RIFF WAV files. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Apple QuickTime before 7.7 and is prone to cross-origin bypass vulnerability. A flaw is present in the application which fails to properly handle cross-site redirects. Successful exploitation allows remote attackers to obtain potentially sensitive video data

The host is installed with Apple QuickTime before 7.7 and is prone to multiple memory corruption vulnerabilities. A flaw is present in the application which fails to properly handle JPEG2000 images.Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Apple QuickTime before 7.7.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which properly process URL data handlers in movie files. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with Apple QuickTime before 7.7.1 and is prone to multiple vulnerabilities. A flaw is present in the application, which fails to handle the atom hierarchy in movie files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.7.1 and is prone to cross site scripting vulnerability. A flaw is present in the application, which fails to handle HTML documents that contain an http link to a script file. Successful exploitation could allow attackers to inject arbitrary script.

The host is installed with Apple QuickTime before 7.7.1 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted FlashPix file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    1160    1161    1162    1163    1164    1165    1166    1167    1168    1169    1170    1171    1172    1173    ..   1203

© 2013 SecPod Technologies