[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with 7 zip through 16.2 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle a Trojan horse DLL. Successful exploitation could allow remote attackers to gain privileges.

The host is installed with 7-zip before 4.5.7 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to cause unknown impact.

The host is installed with 7 zip 18.03 and earlier and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to handle a crafted RAR archive. Successful exploitation could allow remote attackers to crash the service through the usage of uninitialized memory.

The host is installed with Adobe Photoshop CS4 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted TIFF file. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Photoshop and is prone to security vulnerability. A flaw is present in the application, which fails to handle security issues. Successful exploitation could allow remote attackers to cause unknown impact.

The host is installed with Adobe Photoshop Elements 8.0 or earlier and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle crafted files. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with Adobe Photoshop CS4 11.0.1 or earlier and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle crafted ASL. ABR, GRD files. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Pidgin before 2.10.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle canceled SOCKS5 connection attempts. Successful exploitation allows user-assisted remote authenticated users to cause application crash via a sequence of XMPP file-transfer requests.

The host is installed with RealNetworks RealPlayer 10/10.5, RealOne Player or RealPlayer Enterprise and is prone to stack buffer overflow vulnerability. A flaw is present in the application due to an error in the SmilTimeValue::parseWallClockValue function in smlprstime.cpp. Successful exploitation allows remote attackers to execute arbitrary code via an SMIL (SMIL2) file with a long wallclock val ...

The host is installed with RealNetworks RealPlayer 10.5/10.0, RealOne Player V2 or RealPlayer Enterprise and is prone to heap buffer overflow vulnerability. A flaw is present in the application due to improper bounds checking of SWF files. Successful exploitation allows remote attackers to execute arbitrary code via an SWF file with malformed record headers.


Pages:      Start    1339    1340    1341    1342    1343    1344    1345    1346    1347    1348    1349    1350    1351    1352    ..   1502

© SecPod Technologies