[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle JPEG encoded data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle 'mvhd' atoms. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime and is prone to heap based overflow vulnerability. A flaw is present in the application, which fails in processing of Track header atoms. Successful exploitation allow remote attackers to execute arbitrary code or cause a denial of service (application crash).

The host is installed with Apple QuickTime and is prone to heap based overflow vulnerability. A flaw is present in the application, which fails to handle a file permission. Successful exploitation allow local user can access potentially sensitive information.

The host is installed with Apple QuickTime before 7.7.1 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted PICT file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.7.1 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle a crafted TKHD atoms in a QuickTime movie file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apache Archiva and is prone to multiple cross-site scripting vulnerabilities. The flaws are present in the application which fails to properly validate user-supplied input before using it in dynamically generated content. Successful exploitation allows remote attacker to steal cookie-based authentication credentials.

The host is installed with Adobe Shockwave Player before 11.5.0.600 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle crafted Shockwave Player 10 content. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Shockwave Player before 11.0.0.465 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle certain unknown vectors. Successful exploitation allows attackers to execute arbitrary code.

The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold and SP1, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2; does not properly restrict use of OleLoadFromStream in instantiating objects from data streams, which allows remote atta ...


Pages:      Start    1404    1405    1406    1407    1408    1409    1410    1411    1412    1413    1414    1415    1416    1417    ..   1502

© SecPod Technologies