[Forgot Password]
Login  Register Subscribe

23631

 
 

119105

 
 

98250

 
 

909

 
 

79281

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11426 Download | Alert*

The host is installed with Splunk 4.3.0 through 4.3.5 and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle maliciously crafted link. Successful exploitation allows attackers to inject arbitrary web script or HTML via unspecified vectors.

The host is installed with Apple QuickTime before 7.7 and is prone to buffer overflow vulnerability. A flaw is present in the application which fails to properly handle JPEG files. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Apple QuickTime before 7.7 and is prone to integer overflow vulnerability. A flaw is present in the application which fails to properly handle audio channels in movie files. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Apple QuickTime before 7.7 and is prone to memory corruption vulnerability. A flaw is present in the application which fails to properly handle sample tables in QuickTime movie files. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Apple QuickTime before 7.7 and is prone to integer overflow vulnerability. A flaw is present in the application which fails to properly handle RIFF WAV files. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Apple QuickTime before 7.7 and is prone to cross-origin bypass vulnerability. A flaw is present in the application which fails to properly handle cross-site redirects. Successful exploitation allows remote attackers to obtain potentially sensitive video data

The host is installed with Apple QuickTime before 7.7 and is prone to multiple memory corruption vulnerabilities. A flaw is present in the application which fails to properly handle JPEG2000 images.Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Apple QuickTime before 7.7.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which properly process URL data handlers in movie files. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with Apple QuickTime before 7.7.1 and is prone to multiple vulnerabilities. A flaw is present in the application, which fails to handle the atom hierarchy in movie files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.7.1 and is prone to cross site scripting vulnerability. A flaw is present in the application, which fails to handle HTML documents that contain an http link to a script file. Successful exploitation could allow attackers to inject arbitrary script.


Pages:      Start    1102    1103    1104    1105    1106    1107    1108    1109    1110    1111    1112    1113    1114    1115    ..   1142

© 2013 SecPod Technologies