[Forgot Password]
Login  Register Subscribe

25354

 
 

132811

 
 

147822

 
 

909

 
 

118073

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 17366 Download | Alert*

The host is installed with Winamp 5.6 or earlier version and is prone to denial of service vulnerability. A flaw is present in in_mp4 plugin, which fails to properly handle a metadata or albumart in an MP4 file. Successful exploitation allows remote attackers to crash the application using an invalid MP4 file.

Buffer overflow in Nullsoft Winamp 5.12 allows remote attackers to execute arbitrary code via a playlist (pls) file with a long file name (File1 field).

Untrusted search path vulnerability in Nullsoft Winamp 5.581, and probably other versions, allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wnaspi32.dll that is located in the same folder as a .669, .aac, .aiff, .amf, .au, .avr, .b4s, .caf or .cda file.

The host is installed with ImgBurn through 2.5.4.0 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle an issue in ImgBurn.exe. Successful exploitation could allow remote attackers to to execute arbitrary code and conduct DLL hijacking attacks.

sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via "an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML()," which triggers an assertion failure.

An information disclosure vulnerability exists in SharePoint Server. An attacker who exploited this vulnerability could read arbitrary files on the server. To exploit the vulnerability, an attacker would need to send a specially crafted request to a susceptible SharePoint Server instance.

Apple QuickTime before 7.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted H.264 movie file.

The host is installed with IBM DB2 9.1 before FP9 or 9.5 before FP6 or 9.7 before FP2 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle an error during special group and user enumeration. Successful exploitation allows an attacker could rap the server and cause a denial of service.

The host is installed with IBM DB2 9.1 before FP9 or 9.5 before FP6 or 9.7 before FP2 and is prone to Unspecified vulnerability. A flaw is present in the DB2STST program in the application which fails to avoid unspecified error within DB2STST. Successful exploitation allow attackers to have unknown impact and attack vectors.

The host is installed with RealNetworks RealPlayer 11.0 through 11.1 or SP 1.0 through 1.1.5 or 14.0.0 through 14.0.1 or Enterprise 2.0 through 2.1.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which uses predictable names for temporary files and allows remote attackers to conduct cross-domain scripting attacks. Successful exploitation could all ...


Pages:      Start    1707    1708    1709    1710    1711    1712    1713    1714    1715    1716    1717    1718    1719    1720    ..   1736

© SecPod Technologies