[Forgot Password]
Login  Register Subscribe

24437

 
 

132035

 
 

118681

 
 

909

 
 

92673

 
 

143

 
 
Paid content will be excluded from the download.

Filter
Matches : 13641 Download | Alert*

The host is installed with Microsoft Publisher 2003 and is prone to buffer overflow vulnerability. A flaw is present in the application, which allows a negative number to be passed into a byte array insertion while parsing specially crafted Publisher files. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Microsoft Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, R2, Windows 7, Windows 8, Windows Server 2012 and is prone to a windows handle vulnerability. A flaw is present in the application which fails to properly handle deleted objects in memory. Successful exploitation could allow attackers to gain privileges.

The host is installed with Microsoft Windows Vista, Windows Server 2008 or R2 , Windows 7 SP1, Windows 8, Windows Server 2012 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow local users to gain privileges via a crafted application.

The host is installed with Windows Essentials 2011 or 2012 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle URL parameters. Successful exploitation allows attackers to override Windows Writer proxy settings and overwrite files accessible to the user on the target system.

The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly terminate a data structure after a failure to locate a number within a string. Successful exploitation allows remote attackers to cause a denial of service (application crash).

The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly consider a certain case of multiple realloc operations that restore a memory chunk to its original size. Successful exploitation allows remote attackers to cause a denial of service (incorrect free operation and application crash).

The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate a certain offset value. Successful exploitation allows remote attackers to cause a denial of service (infinite loop).

The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which does not prevent the conflicting use of a table for both IPv4 and IPv6 addresses. Successful exploitation allows remote attackers to cause a denial of service (application crash).

The host is installed with Microsoft Internet Explorer 6 through 10 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to handle a crafted web site that triggers access to a deleted object. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Internet Explorer 6 through 10 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to handle a crafted web site that triggers access to a deleted object. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1246    1247    1248    1249    1250    1251    1252    1253    1254    1255    1256    1257    1258    1259    ..   1364

© SecPod Technologies