[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle JPEG encoded data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle 'mvhd' atoms. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime and is prone to heap based overflow vulnerability. A flaw is present in the application, which fails in processing of Track header atoms. Successful exploitation allow remote attackers to execute arbitrary code or cause a denial of service (application crash).

The host is installed with Apple QuickTime and is prone to heap based overflow vulnerability. A flaw is present in the application, which fails to handle a file permission. Successful exploitation allow local user can access potentially sensitive information.

The host is installed with Apple QuickTime before 7.7.1 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted PICT file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.7.1 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle a crafted TKHD atoms in a QuickTime movie file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apache Archiva and is prone to multiple cross-site scripting vulnerabilities. The flaws are present in the application which fails to properly validate user-supplied input before using it in dynamically generated content. Successful exploitation allows remote attacker to steal cookie-based authentication credentials.

The host is installed with Adobe Shockwave Player before 11.5.0.600 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle crafted Shockwave Player 10 content. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Shockwave Player before 11.0.0.465 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle certain unknown vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Flash Player and is prone to memory corruption vulnerability. A flaw is present in the application which is caused by memory corruption errors when processing malformed Flash content. Successful exploitation allows remote attacker to cause a denial of service condition.


Pages:      Start    1405    1406    1407    1408    1409    1410    1411    1412    1413    1414    1415    1416    1417    1418    ..   1502

© SecPod Technologies