[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14850 Download | Alert*

The host is installed with Adobe Flash Player 10.3.181.36 or before or Adobe AIR 2.7 or before and is prone to cross site information disclosure vulnerability. A flaw is present in the applications which fail to properly handle cookie-based authentication. Successful exploitation allows remote attackers to execute remote code.

The host is installed with Adobe Flash Player 10.3.181.36 or before or Adobe AIR 2.7 or before and is prone to integer overflow vulnerability. A flaw is present in the applications which fail to properly handle memory. Successful exploitation allows remote attackers to execute remote code.

The host is installed with Adobe Flash Player 10.3.181.36 or before or Adobe AIR 2.7 or before and is prone to buffer overflow vulnerability. A flaw is present in the applications which fail to properly handle memory. Successful exploitation allows remote attackers to execute remote code.

The host is installed with Adobe Flash Player 10.3.181.36 or before or Adobe AIR 2.7 or before and is prone to integer overflow vulnerability. A flaw is present in the applications which fail to properly handle memory. Successful exploitation allows remote attackers to execute remote code.

The host is installed with Adobe Flash Player 10.3.181.36 or before or Adobe AIR 2.7 or before and is prone to memory corruption vulnerability. A flaw is present in the applications which fail to properly handle memory. Successful exploitation allows remote attackers to execute remote code.

The host is installed with OpenOffice.org 2.x and 3.x before 3.3 and is prone to multiple directory traversal vulnerabilities. The flaws are present in the application, which fails to handle zip/jar package extraction. Successful exploitation may lead to overwriting files when relative file locations point to locations outside the root of the destination folder.

The host is installed with Adobe Flash Player 10.3.181.36 or before or Adobe AIR 2.7 or before and is prone to buffer overflow vulnerability. A flaw is present in the applications which fail to properly handle memory. Successful exploitation allows remote attackers to execute remote code.

The host is installed with Adobe Flash Player 10.3.181.36 or before or Adobe AIR 2.7 or before and is prone to buffer overflow vulnerability. A flaw is present in the applications which fail to properly handle memory. Successful exploitation allows remote attackers to execute remote code.

The host is installed with OpenOffice.org 2.x and 3.x before 3.3 and is prone to use-after-free vulnerability. A flaw is present in oowriter, which fails to properly sanitize user-supplied input. Successful exploitation may allow a remote unprivileged user to execute arbitrary code on the system with the privileges of a local user running OpenOffice.org.

The host is installed with OpenOffice.org 2.x and 3.x before 3.3 and is prone to use-after-free vulnerability. A flaw is present in oowriter, which fails to handle a specially crafted RTF document that triggers an out-of-bounds memory read. Successful exploitation may allow a remote unprivileged user to execute arbitrary code on the system with the privileges of a local user running OpenOffice.org ...


Pages:      Start    1198    1199    1200    1201    1202    1203    1204    1205    1206    1207    1208    1209    1210    1211    ..   1484

© SecPod Technologies