[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Oracle Java SE before 5u61, before 7u51, before 6u71 or before JavaFX 2.2.51 and is prone to unspecified vulnerability. The flaw is present in the application, which fails to handle unknown vectors related to 2D. Successful exploitation allows remote attackers to affect confidentiality, integrity and availability.

The host is installed with Oracle Java SE before 7u51 or before 6u71 and is prone to unspecified vulnerability. The flaw is present in the application, which fails to handle unknown vectors related to deployment. Successful exploitation allows remote attackers to affect confidentiality, integrity and availability.

The host is installed with Apple iTunes before 11.1.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle the contents of the iTunes Tutorials window. Successful exploitation allows attackers to gain control and inject arbitrary contents.

The host is installed with BlackBerry Desktop Software before 5.0.1 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted web page. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with RIM BlackBerry Desktop Software 4.7 through 6.0 and is prone to an information disclosure vulnerability. A flaw is present in the application, which uses a weak password to encrypt a database backup file. Successful exploitation could allow attackers to decrypt the file via a brute force attack.

The host is installed with BlackBerry Desktop Manager 5.0.0.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a certain ActiveX control in lnresobject.dll. Successful exploitation could allow attackers to crash the service.

The host is installed with WinZip before 11.0 and is prone to DNS cache poisoning vulnerability. A flaw is present in the application, which is caused by the WinZip update component. Successful exploitation allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning.

The host is installed with MariaDB 5.5.x before 5.5.29 or 5.3.x before 5.3.12, or 5.2.x before 5.2.14 and is prone to brute force password guessing attacks vulnerability. The flaw is present in application, which fails to properly handle multiple executions of the change_user command within the same connection. Successful exploitation allows remote attackers to bypass the security.

The host is installed with Winamp 5.21, 5.5 or 5.51 and is prone to multiple stack-based buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a long artist or name tag in Ultravox streaming metadata. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Winamp before 5.24 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly verify the authenticity of updates. Successful exploitation allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update


Pages:      Start    1191    1192    1193    1194    1195    1196    1197    1198    1199    1200    1201    1202    1203    1204    ..   1516

© SecPod Technologies