[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Skype extension BETA 2.2.0.95 for Firefox and is prone to arbitrary code injection vulnerability. A flaw is present in the application, which fails to handle the skype_tool.copy_num method. Successful exploitation could allow remote attackers to write arbitrary data to the clipboard via a string argument.

The host is installed with Skype before 4.1.0.179 on Windows and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle an unspecified error in the Extras Manager component. Successful exploitation has unknown impact and attack vectors.

The host is installed with RealVNC 4.0 through 4.1.2, which is prone to remote code execution vulnerability. A flaw is present in the CMsgReader::readRect function in the VNC Viewer component in application, which fails to handle crafted RFB protocol data, related to "encoding type". Successful exploitation allows execution of arbitrary code or likely to result in denial-of-service conditions.

The host is installed with WinZip through 9.0 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application which fails to handle an issue in the command line. Successful exploitation allows attackers to execute arbitrary code via multiple vectors, including the command line.

The host is installed with Google SketchUp before 8 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle certain types of invalid edge geometry when parsing a malicious .SKP file. Successful exploitation allows remote attackers to cause the application to crash.

The host is installed with Google SketchUp before 8.0.14346 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted RLE8 compressed BMP. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Google Picasa and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle certain properties of JPEG images. Successful exploitation could allow remote attackers to execute arbitrary code with the privilege of the running application.

Untrusted search path vulnerability in Google Earth 5.1.3535.3218 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse quserex.dll that is located in the same folder as a .kmz file.

The host is installed with Dropbox version 0.7.110 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle the zero-length directory name in the LD_LIBRARY_PATH. Successful exploitation allows local users to gain privileges via a Trojan horse shared library in the current working directory.

The host is installed with 7 zip through 18.01 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly implement the "Large memory pages" option. Successful exploitation could allow remote attackers to bypass intended access restrictions.


Pages:      Start    1337    1338    1339    1340    1341    1342    1343    1344    1345    1346    1347    1348    1349    1350    ..   1502

© SecPod Technologies