[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Apple QuickTime before 7.7.9 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted movie file. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).

The host is installed with Apple QuickTime before 7.7.9 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted movie file. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).

The host is installed with Apple QuickTime before 7.7.9 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted movie file. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).

The host is installed with Apple QuickTime before 7.7.9 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted movie file. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).

The host is installed with Apple QuickTime before 7.7.9 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted TXXX frame in a movie file. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash).

The host is installed with Apple QuickTime before 7.7.9 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted movie file. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).

The host is installed with OpenAFS before 1.6.1300 and is prone to an out-of-bounds vulnerability. A flaw is present in the application, which fails to handle a crafted regular expression. Successful exploitation allows remote authenticated users to cause a denial of service (out-of-bounds read and crash).

The host is installed with OpenAFS before 1.6.1300 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted OSD FS command. Successful exploitation allows local users to cause a denial of service (memory corruption and kernel panic).

The host is installed with OpenAFS 1.6.0800 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors related to TMAY requests. Successful exploitation allows remote attackers to cause a denial of service (uninitialized memory access and crash).

The host is installed with OpenAFS 1.4.0800 before 1.6.0700 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted statsVersion argument. Successful exploitation allows remote attackers to cause a denial of service (crash).


Pages:      Start    1479    1480    1481    1482    1483    1484    1485    1486    1487    1488    1489    1490    1491    1492    ..   1502

© SecPod Technologies