[Forgot Password]
Login  Register Subscribe

25354

 
 

132804

 
 

134312

 
 

909

 
 

108836

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 16390 Download | Alert*

The host is installed with Winlog Lite SCADA or Winlog Pro SCADA before 2.07.17 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a packet with a crafted positive integer after the opcode. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Oracle Java SE 7 Update 7 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to deployment. Successful exploitation allows attackers to affect confidentiality.

The host is installed with Siemens Automation License Manager (ALM) 4.x or 5.x before 5.2 and is prone to denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to cause a memory consumption via crafted packets.

The host is installed with Adobe Reader or Acrobat 11.0.0, 10.x before 10.1.5 or 9.x before 9.5.3 and is prone to integer overflow vulnerability. A flaw is present in the applications, which fail to properly handle certain unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Reader or Acrobat 11.0.0, 10.x before 10.1.5 or 9.x before 9.5.3 and is prone to integer overflow vulnerability. A flaw is present in the applications, which fail to properly handle certain unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is installed with Oracle JavaFX 2.2.4 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is installed with Adobe Flash Player before 10.3.183.48, 11.x before 11.5.502.135 or Adobe Air before 3.5.0.880 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 10.3.183.48, 11.x before 11.5.502.135 or Adobe Air before 3.5.0.880 and is prone to an integer overflow vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 10.3.183.48, 11.x before 11.5.502.135 or Adobe Air before 3.5.0.880 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Adobe Flash Player 9.x before 9.0.124.0 or Adobe Air before 1.0.1 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted SWF file with a negative Scene Count value. Successful exploitation could allow remote attackers to trigger a buffer overflow.


Pages:      Start    1541    1542    1543    1544    1545    1546    1547    1548    1549    1550    1551    1552    1553    1554    ..   1638

© SecPod Technologies