[Forgot Password]
Login  Register Subscribe

24436

 
 

131815

 
 

115190

 
 

909

 
 

90025

 
 

140

 
 
Paid content will be excluded from the download.

Filter
Matches : 13204 Download | Alert*

The host is installed with VLC Media Player before 1.1.8 and is prone to arbitrary code execution vulnerability. A flaw is present in the application which is caused due to an error when processing video files with large dimensions. Successful exploitation could allow remote attackers to overflow a buffer and execute arbitrary code on the system or cause the application to crash.

The host is installed with VLC Media Player before 1.1.8 and is prone to arbitrary code execution vulnerability. A flaw is present in the application which is caused by a memory corruption error in the "libdirectx" plugin when processing malformed NSV data. Successful exploitation allows remote attacker to overflow a buffer and execute arbitrary code on the system or cause the application to crash ...

Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via a crafted Office document that triggers memory corruption, "Drawing Exception Handling Vulnerability."

Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, "RTF Stack Buffer Overflow Vulnerability."

Microsoft Office XP SP3, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via a crafted Office document that triggers memory corruption, "MSO Large SPID Read AV Vulnerability."

The Windows Task Scheduler in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly determine the security context of scheduled tasks, which allows local users to gain privileges via a crafted application, aka "Task Scheduler Vulnerability." NOTE: this might overlap CVE-2010-3888.

Untrusted search path vulnerability in Adobe Captivate 5.0.0.596, and possibly other versions, allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .cptx file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party informati ...

The extSetOwner function in the UfProxyBrowserCtrl ActiveX control (UfPBCtrl.dll) in Trend Micro Internet Security Pro 2010 allows remote attackers to execute arbitrary code via an invalid address that is dereferenced as a pointer.

The host is installed with IBM DB2 9.7 before FP2 and is prone to security vulnerability. A flaw is present in the SYSIBMADM schema in the application which does not perform the expected access control on the monitor administrative views. Successful exploitation allow remote attackers can obtain sensitive information via unspecified vectors.

The host is installed with IBM DB2 9.7 before FP2 and is prone to denial of service vulnerability. A flaw is present in AUTO_REVAL database configuration parameter in the application which fails to handle an error during special group and user enumeration. Successful exploitation allows an attacker could rap the server and cause a denial of service.


Pages:      Start    1272    1273    1274    1275    1276    1277    1278    1279    1280    1281    1282    1283    1284    1285    ..   1320

© SecPod Technologies