[Forgot Password]
Login  Register Subscribe

23631

 
 

127000

 
 

102010

 
 

909

 
 

81059

 
 

123

 
 
Paid content will be excluded from the download.

Filter
Matches : 11693 Download | Alert*

The host is installed with Adobe Flash Player 11.x through 11.5.502.135 or before 10.3.183.50 or Adobe AIR before 3.5.0.1060 and is prone to buffer overflow vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attacker to execute remote code.

The host is installed with Oracle Java SE before 7 Update 11 and is prone to a security manager bypass vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Oracle Java SE 7 through Update 11 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unspecified vectors related to JMX. Successful exploitation could allow attackers to bypass the Java security sandbox.

The host is installed with Internet Explorer 8 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Silverlight 5 or Microsoft Silverlight 5 Developer Runtime and is prone to double dereference vulnerability. A flaw is present in the application, which fails to handle a specially crafted Silverlight application. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new accounts with full user rights.

The host is installed with Opera before 12.10 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed SVG image. Successful exploitation could allow a remote attacker to execute arbitrary code or cause a denial of service (application crash).

The host is installed with Opera before 12.10 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle incorrect size data in a WebP image. Successful exploitation could allow a remote attacker to obtain potentially sensitive information from process memory by using a crafted image as the fill pattern for a canvas.

The host is installed with Opera before 12.10 and is prone to phishing attacks. A flaw is present in the application, which fails to properly handle the internet shortcuts that are referenced by a IMG element or other inline element. Successful exploitation could allow a remote attacker to conduct phishing attacks via a crafted web site.

The host is installed with Opera before 12.11 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a long HTTP response. Successful exploitation could allow a remote attacker to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Opera before 12.11 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle vectors involving web script in an error page. Successful exploitation could allow a remote attacker to determine the existence of arbitrary local files via vectors involving web script in an error page.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1169

© 2013 SecPod Technologies