[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80198

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11878 Download | Alert*

The host is installed with IrfanView FlashPix PlugIn before 4.3.4.0 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted FlashPix image during decompression. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Irfanview Plugins version 4.33 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a specially crafted JLS compressed image file. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Foxit Reader or Foxit Phantom and is prone to integer overflow vulnerability. A flaw is present in the applications which fails to handle ICC chunks in a PDF file. Successful exploitation allow remote attackers to execute arbitrary code.

The host is installed with Foxit Reader before 5.0.2.0718 and is prone to untrusted search path vulnerability. A flaw is present in the application which is caused due to the insecure loading of the DLLs. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with VMware vSphere Client 4.0 before Update 4b or 4.1 before Update 3a and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to trigger the downloading and execution of an arbitrary program.

The host is installed with VMware vSphere Client 5.0 before Update 3 or 5.1 before Update 2 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to trigger the downloading and execution of an arbitrary program.

The host is installed with VMware vSphere Client 5.0 before Update 3 or 5.1 before Update 2 and is prone to a SSL servers spoofing vulnerability. A flaw is present in the application, which fails to handle a crafted certificate. Successful exploitation allows man-in-the-middle attackers to spoof SSL servers.

The host is installed with Oracle VM VirtualBox before 3.2.18, 4.0.x before 4.0.20, 4.1.x before 4.1.28 or 4.2.x before 4.2.18 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to Core. Successful exploitation allows local users to affect availability.

The host is installed with Oracle Virtualization VirtualBox 4.1.x before 4.1.32, 4.2.x before 4.2.24 or 4.3.x before 4.3.10 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Graphics driver (WDDM) for Windows guests. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Virtualization VirtualBox prior to 3.2.24, 4.0.x before 4.0.26, 4.1.x before 4.1.34, 4.2.x before 4.2.26 or 4.3.x before 4.3.14 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to core. Successful exploitation could allow attackers to affect confidentiality, integrity, and availabilit ...


Pages:      Start    1126    1127    1128    1129    1130    1131    1132    1133    1134    1135    1136    1137    1138    1139    ..   1187

© 2013 SecPod Technologies