[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11666 Download | Alert*

The host is installed with XnView before 1.99 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted PCT image. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with XnView before 1.99 and is prone to multiple heap-based buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a SGI32LogLum compressed TIFF image or SGI32LogLum compressed TIFF image with the PhotometricInterpretation encoding set to LogL. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with Microsoft Silverlight and is prone to denial of service vulnerability. A flaw is present in the application, which fails to perform garbage collection. Successful exploitation allow remote attackers to cause denial of service via applications involving a popup control and a custom DependencyProperty property.

The host is installed with Microsoft Silverlight and is prone to denial of service vulnerability. A flaw is present in the datagrid control, which fails to release memory used by INotifyDataErrorInfo.ErrorsChanged event. Successful exploitation allow remote attackers to cause denial of service.

The host is installed with Microsoft Silverlight 5 and is prone to security feature bypass vulnerability. A flaw is present in the application, which fails to correctly implement the DEP/ASLR security features. Successful exploitation allows attackers to more reliably predict the memory offsets of specific instructions in a given call stack.

The host is installed with ViPNet Client 3.2.10 (15632) or earlier, ViPNet Coordinator 3.2.10 (15632) or earlier or ViPNet SafeDisk 4.1 (0.5643) or earlier and is prone to a local privilege escalation vulnerability. A flaw is present in the applications, which fail to handle a crafted request. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Mozilla Firefox ESR 10.x before 10.0.5, Thunderbird ESR 10.x before 10.0.5 and is prone to denial of service vulnerability. A flaw is present in the applications, which fail to handle a crafted JavaScript code. Successful exploitation could allow attackers to cause memory corruption and application crash or possibly execute arbitrary code.

Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger certain improper removal of an NSSCertificate structure from a trust domain.

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.


Pages:      Start    1139    1140    1141    1142    1143    1144    1145    1146    1147    1148    1149    1150    1151    1152    ..   1166

© 2013 SecPod Technologies