[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87854

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 13597 Download | Alert*

The host is installed with Quicktime before 7.7.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted audio samples. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Quicktime before 7.7.2 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted MPEG files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Quicktime before 7.7.2 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a crafted movie file with JPEG2000 encoding. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Quicktime before 7.7.2 and is prone to a buffer underflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted MPEG file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Oracle MySQL Server through 5.6.38 or through 5.7.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Replication. Successful exploitation allows attackers to affect Integrity and Availability.

A cross-site-scripting (XSS) vulnerability exists when Microsoft Access does not properly sanitize inputs to image fields edited within Design view. An attacker could exploit the vulnerability by sending a specially crafted file to a victim, or by hosting the file on a web server. The attacker who successfully exploited the vulnerability could then run javascript in the security context of the cur ...

An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scriptin ...

An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions. An attacker who successfully exploited the vulnerability could impersonate processes, interject cross-process communication, or interrupt system functionality. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addr ...

An elevation of privilege vulnerability exists in the Microsoft Server Message Block (SMB) Server when an attacker with valid credentials attempts to open a specially crafted file over the SMB protocol on the same machine. An attacker who successfully exploited this vulnerability could bypass certain security checks in the operating system. To exploit the vulnerability, an attacker would first ha ...

The host is installed with 7 zip through 16.2 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle a Trojan horse DLL. Successful exploitation could allow remote attackers to gain privileges.


Pages:      Start    1344    1345    1346    1347    1348    1349    1350    1351    1352    1353    1354    1355    1356    1357    ..   1359

© SecPod Technologies