[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26381 Download | Alert*

The host is installed with Google Chrome before 21.0.1180.89 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 21.0.1180.89 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle a crafted web script. Successful exploitation could allow attackers to inject arbitrary web script or html.

Buffer overflow in Microsoft Office 2000 SP3, XP SP3, and other versions and packages, allows user-assisted attackers to execute arbitrary code via a routing slip that is longer than specified by the provided length field, as exploited by malware such as TROJ_MDROPPER.BH and Trojan.PPDropper.E in attacks against PowerPoint.

Buffer overflow in Microsoft Office 2000 SP3, XP SP3, and other versions and packages, allows user-assisted attackers to execute arbitrary code via a routing slip that is longer than specified by the provided length field, as exploited by malware such as TROJ_MDROPPER.BH and Trojan.PPDropper.E in attacks against PowerPoint.

Cross-site scripting (XSS) vulnerability in balancer-manager in mod_proxy_balancer in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) ss, (2) wr, or (3) rr parameters, or (4) the URL.

The balancer_handler function in mod_proxy_balancer in the Apache HTTP Server 2.2.0 through 2.2.6, when a threaded Multi-Processing Module is used, allows remote authenticated users to cause a denial of service (child process crash) via an invalid bb variable.

The host is installed with Apache Tomcat 5.5.0 through 5.5.20 or 6.0.0 through 6.0.8 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails handle the cookie in an https session. Successful exploitation allows remote attackers to obtain sensitive information.

The host is installed with VideoLAN VLC Media Player before 0.8.6f and is prone to a denial of service vulnerability. The flaw is present in the application, which does not properly handle a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with VideoLAN VLC Media Player before 0.8.6h and is prone to a buffer overflow vulnerability. The flaw is present in the application, which does not properly handle a TLS message containing multiple Client Hello messages. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with VideoLAN VLC Media Player before 0.8.6h and is prone to a integer signedness error vulnerability. The flaw is present in the application, which does not properly handle a certain integer value in the random field. Successful exploitation allows remote attackers to cause a denial of service (buffer over-read and crash).


Pages:      Start    1482    1483    1484    1485    1486    1487    1488    1489    1490    1491    1492    1493    1494    1495    ..   2638

© SecPod Technologies