[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Microsoft Internet Explorer 9 or 10 and is prone to use-after-free vulnerability. The flaw is present in Microsoft Internet Explorer 9 and 10, which fails to handle a crafted CSpliceTreeEngine::InsertSplice object in an HTML document. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with OpenAFS before 1.6.0200 and is prone to buffer overflow vulnerability. The flaw is present in the application, which fails to handle the ptserver. Successful exploitation allows remote attackers to cause the heap based buffer overflow.

The host is installed with OpenAFS before 1.6.0200 and is prone to buffer overflow vulnerability. The flaw is present in the application, which fails to handle the client utilities. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with OpenAFS 1.6.x before 1.6.0500 and is prone to information disclosure vulnerability. The flaw is present in the application, which fails to handle the -encrypt option. Successful exploitation allows the remote attackers to obtain sensitive information by sniffing the network.

The host is installed with OpenAFS 1.6.x before 1.6.0500 or 1.7.x before 1.7.2600 or before 1.4.1500 and is prone to information disclosure vulnerability. The flaw is present in the application, which fails to handle the weak encryption (DES) for Kerberos keys. Successful exploitation allows the remote attackers to obtain the service key.

The host is installed with Adobe Flash Player 9.0.124.0 and earlier and is prone to remote code execution vulnerability. The flaw is present in the System.setClipboard method in ActionScript, which does not require user interaction to populate the clipboard. Successful exploitation could allows remote attackers to populate the clipboard with a URL.

The host is installed with Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87 and is prone to unspecified vulnerability. The flaw is present in the application, which fails to handle (1) a crafted Flash application in a .pdf file or (2) a crafted .swf file, related to authplay.dll. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of serv ...

The host is installed with Adobe Flash Player 9.0.124.0 and earlier and is prone to unspecified vulnerability. The flaw is present in ActionScript in Adobe Flash Player, which does not require user interaction in conjunction with (1) the FileReference.browse operation in the FileReference upload API or (2) the FileReference.download operation in the FileReference download API. Successful exploitat ...

The host is installed with Adobe Flash Player 9.0.124.0 and earlier and is prone to unspecified vulnerability. The flaw is present in settings manager in Adobe Flash Player, which does not properly handle access control dialogs disguised as normal graphical elements, as demonstrated by hijacking the camera or microphone, and related to "clickjacking. Successful exploitation allows remote attackers ...

The host is installed with Adobe Flash Player 9.0.124.0 and earlier and is prone to cross-site scripting vulnerability. The flaw is present in the application, which fails to properly handle vectors involving HTTP response headers. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.


Pages:      Start    1185    1186    1187    1188    1189    1190    1191    1192    1193    1194    1195    1196    1197    1198    ..   1516

© SecPod Technologies