[Forgot Password]
Login  Register Subscribe

24437

 
 

131950

 
 

117853

 
 

909

 
 

91655

 
 

143

 
 
Paid content will be excluded from the download.

Filter
Matches : 14302 Download | Alert*

The host is installed with Adobe Photoshop Camera Raw before 7.3 and is prone to buffer underflow vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code via unspecified vectors.

The host is installed with Adobe Photoshop Camera Raw before 7.3 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code via unspecified vectors.

The host is installed with Adobe ColdFusion 9.0, 9.0.1, 9.0.2 or 10 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to handle user crafted input. Successful exploitation allows remote attackers to bypass intended shared-hosting sandbox permissions via unspecified vectors.

The host is installed with VideoLAN VLC media player 2.0.3 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted PNG file. Successful exploitation allows remote attackers to cause an application crash.

The host is installed with Apache Tomcat through 7.0.x and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the partial HTTP requests. Successful exploitation allows remote attackers to cause a denial of service (daemon outage).

The host is installed with the VMware Workstation 8.x before 8.0.5 or VMware Player 4.x before 4.0.5 on Windows and is prone to privilege escalation vulnerability. A flaw is present in the application, which fails to assign strong security permissions for unspecified process threads. Successful exploitation allows host OS users to gain host OS privileges via a crafted application.

The host is installed with the VMware Workstation 8.x before 8.0.5 or VMware Player 4.x before 4.0.5 on Windows and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle system folder. Successful exploitation allows host OS users to gain host OS privileges.

The host is installed with ActivePerl 5.16.1.1601 and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to handle the installation functionality. Successful exploitation allows local users to gain privileges via a Trojan horse DLL in the C:\Perl\Site\bin directory, which is added to the PATH system environment variable.

The host is installed with Microsoft Internet Explorer 6 through 9 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted web site. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with FlashFXP 4.0 through 4.1.9.1726 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a long unicode string. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    1344    1345    1346    1347    1348    1349    1350    1351    1352    1353    1354    1355    1356    1357    ..   1430

© SecPod Technologies