[Forgot Password]
Login  Register Subscribe

24002

 
 

127027

 
 

102010

 
 

909

 
 

81374

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 11404 Download | Alert*

The host is installed with Adobe Flash Player before 11.7.700.252 , 11.8.x and 11.9.x before 11.9.900.152 or Adobe Air before 3.9.0.1210 and is prone to remote memory corruption vulnerability. The flaw is present in the application, which when loaded by the target user, will trigger a memory corruption error. Successful exploitation allows attackers to execute arbitrary code or cause a denial of s ...

The host is installed with Adobe Shockwave Player before 12.0.7.148 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Adobe Shockwave Player before 12.0.7.148 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with WinSCP before 5.1.6 or PuTTY 0.62 and earlier and is prone to an integer overflow vulnerability. The flaw is present in the application, which fails to handle a negative size value in an RSA key signature during the SSH handshake. Successful exploitation could allow attackers to crash the service.

The host is installed with Opera before 15.0 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to inject arbitrary web script or HTML.

The host is installed with Winamp before 5.64 build 3418 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle package with a long skin directory name. Successful exploitation allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.

The host is installed with PuTTY before 0.63 and is prone to buffer underflow vulnerability. The flaw is present in the modmul function in sshbn.c in PuTTY, which is not properly handled when performing certain bit-shifting operations during modular multiplication. Successful exploitation allows remote SSH servers to cause a denial of service (crash) and possibly trigger memory corruption or code ...

The host is installed with PuTTY before 0.63 and is prone to buffer overflow vulnerability. The flaw is present in the application, which is not properly handled during computation of a modular inverse and triggers the overflow during a division by zero by the bignum functionality. Successful exploitation allows remote SSH servers to cause a denial of service (crash).

The host is installed with PuTTY before 0.63 and is prone to information disclosure vulnerability. The flaw is present in the rsa_verify function in PuTTY, which does not clear sensitive process memory after use and (2) does not free certain structures containing sensitive process memory. Successful exploitation might allow local users to discover private RSA and DSA keys.

The host is installed with Microsoft Silverlight 5 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle certain objects in memory. Successful exploitation allows attackers to disclose information on the local system.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1140

© 2013 SecPod Technologies