[Forgot Password]
Login  Register Subscribe

24436

 
 

131815

 
 

116471

 
 

909

 
 

91176

 
 

140

 
 
Paid content will be excluded from the download.

Filter
Matches : 13613 Download | Alert*

The host is installed with Google Chrome before 71.0.3578.80 and is prone to an out of bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Adobe Flash Player before 10.3.183.29 or 11.x before 11.4.402.287 or Adobe AIR 3.4.0.2540 or before and is prone to buffer overflow vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 10.3.183.48, 11.x before 11.5.502.135 or Adobe Air before 3.5.0.880 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 10.3.183.48, 11.x before 11.5.502.135 or Adobe Air before 3.5.0.880 and is prone to an integer overflow vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with RealPlayer 18.1.5.705 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a repeating VRAT chunk in qcpfformat.dll. Successful exploitation could allow attackers to cause a null pointer dereference and crash.

The host is installed with RealPlayer 16.0.3.51 and earlier is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed .3gp file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Pale Moon before 27.9.3 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle the DOMProxyHandler::EnsureExpandoObject function issue. Successful exploitation allows attackers to perform a use-after-free attack.

The host is installed with Pale Moon before 15.4 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle the bounds-check user-supplied input issue. Successful exploitation allows attackers to execute arbitrary code in the context of the application.

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first ...

An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the information disclosure does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability. ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1361

© SecPod Technologies