[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

95906

 
 

909

 
 

77982

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11488 Download | Alert*

The host is installed with Oracle Java SE 5.0u75 and earlier, 6u85 and earlier, 7u72 and earlier or 8u25 and earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to 2D. Successful exploitation could allow attackers to affect confidentiality.

The host is installed with Oracle Java SE 6u85 and earlier, 7u72 and earlier or 8u25 and earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Libraries. Successful exploitation could allow attackers to affect confidentiality, integrity and availability.

The host is installed with Oracle Java SE 5.0u75 and earlier, 6u85 and earlier, 7u72 and earlier or 8u25 and earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to 2D. Successful exploitation could allow attackers to affect confidentiality.

The host is installed with Oracle Java SE 8u25 and earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Libraries. Successful exploitation could allow attackers to affect confidentiality, integrity and availability.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to an unspecified vulnerability. The flaw is present in the Application, which fails to handle unspecified vectors that trigger memory corruption. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with LibreOffice 4.x before 4.2.7 or 4.3.x before 4.3.3 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted request to TCP port 1599. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with VMware Movie Decoder before 6.5.5 build 328052, 7.x before 7.1.2 build 301548, VMware Workstation 6.5.x before 6.5.5 build 328052, 7.x before 7.1.2 build 301548, VMware Player 2.5.x before 2.5.5 build 246459 or 3.x before 3.1.2 build 301548 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted video file. ...

The host is installed with VMware Movie Decoder before 6.5.3 build 185404, VMware Workstation 6.5.x before 6.5.3 build 185404 or VMware Player 2.5.x before 2.5.3 build 185404 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted AVI file that triggers heap memory corruption. Successful exploitation allow remote attackers to ...

The host is installed with VMware Movie Decoder before 6.5.4 Build 246459, movie decoder in VMware Workstation 6.5.x before 6.5.4 build 246459 or VMware Player 2.5.x before 2.5.4 build 246459 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle an AVI file with crafted hextile-encoded video chunks that trigger heap-based buffer over ...

The host is installed with VMware Movie Decoder before 6.5.4 Build 246459, movie decoder in VMware Workstation 6.5.x before 6.5.4 build 246459 or VMware Player 2.5.x before 2.5.4 build 246459 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle an AVI file with crafted video chunks that use hextile encoding. Successful exploitation ...


Pages:      Start    1132    1133    1134    1135    1136    1137    1138    1139    1140    1141    1142    1143    1144    1145    ..   1148

© 2013 SecPod Technologies