[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

111749

 
 

909

 
 

87255

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 12602 Download | Alert*

The host is installed with Apple iTunes before 10.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple iTunes before 10.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple iTunes before 10.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple iTunes before 10.7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with the VMware OVF Tool 2.1 or VMware Workstation 8.x before 8.0.5 or VMware Player 4.x before 4.0.5 on Windows and is prone to format string vulnerability. A flaw is present in the application, which fails to properly handle a crafted OVF file. Successful exploitation allows user-assisted remote attackers to execute arbitrary code.

The host is installed with PHP before 5.3.14 or 5.4.x before 5.4.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted parameter value. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds read and application crash).

The host is installed with Apache HTTP Server 2.4.x before 2.4.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly close back-end connections. Successful exploitation could allow attackers to obtain information intended for a different client.

The host is installed with VideoLAN VLC media player before 2.0.2 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted OGG file. Successful exploitation could allow attackers to crash the service.

The host is installed with IBM DB2 V10.1 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to handle the UTL_FILE module. Successful exploitation allows remote authenticated users to modify, delete, or read arbitrary files via a pathname in the file field.

The host is installed with Oracle Java SE 7 Update 7 or earlier or 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to deployment. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.


Pages:      Start    1155    1156    1157    1158    1159    1160    1161    1162    1163    1164    1165    1166    1167    1168    ..   1260

© SecPod Technologies