[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to spoofing vulnerability. The flaw is present in the ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissecto, which fails to properly handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (application crash).

The host is installed with VideoLAN VLC media player 2.0.8 or earlier and is prone to an unspecified vulnerability. The flaw is present in the application, which fails to handle a long string in a URL in a m3u file. Successful exploitation allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.

The host is installed with Microsoft Windows XP SP2, SP3, Server 2003 SP2, Vista SP1, SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, Windows 8.1, Server 2012 or Server 2012 R2 and is prone to security feature bypass vulnerability. A flaw is present in the application, which fails to properly handle a DirectAccess server. Successful exploitation allows attackers to spoof server ...

The host is installed with RealPlayer before 16.0.3.51, RealPlayer SP 1.0 through 1.1.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed RealMedia file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with RealPlayer before 16.0.3.51, RealPlayer SP 1.0 through 1.1.5 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted .rmp file. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Digital Editions 2.x before 2.0.1 and is prone to unspecified memory corruption vulnerability. The flaw is present in the application, which fails to properly handle memory. Successful exploitation allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.

The host is installed with Microsoft Office 2013 and is prone to a token hijacking vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted response while attempting to open an Office file hosted on the malicious website. Successful exploitation could allow attackers to ascertain access tokens used to authenticate the current user on a targeted ShareP ...

The host is installed with Microsoft Office 2007 SP3 or Office 2012 SP1 or SP2 and is prone to security feature bypass vulnerability. A flaw is present in the application, because a specific Microsoft Office shared component was not built to implement the ASLR security feature. Successful exploitation allows attackers to bypass the ASLR security feature.

The host is installed with Microsoft Internet Explorer 6, 7, 8 or 9 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle an object in memory. Successful exploitation allows attackers to execute arbitrary code in the context of the current user.

The host is installed with Microsoft Internet Explorer 7 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle an object in memory. Successful exploitation allows attackers to execute arbitrary code in the context of the current user.


Pages:      Start    1179    1180    1181    1182    1183    1184    1185    1186    1187    1188    1189    1190    1191    1192    ..   1516

© SecPod Technologies