[Forgot Password]
Login  Register Subscribe

23631

 
 

126995

 
 

100182

 
 

909

 
 

80198

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11738 Download | Alert*

The host is installed with Oracle Java SE 7 update 4 or earlier, 6 update 32 or earlier, 5 update 35 or earlier or 1.4.2_37 or JavaFX 2.1 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to 2D. Successful exploitation allows remote attackers to affect confidentiality, integrity, and availability.

The host is installed with Pidgin before 2.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle msn_oim_report_to_user function in oim.c in the MSN protocol plugin in libpurple in Pidgin. Successful exploitation could allow remote servers to cause a denial of service or application crash.

The host is installed with PHP before 5.4.0 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to properly handle invalid [ (open square bracket) characters in name values. Successful exploitation allows attackers to cause a denial of service or conduct directory traversal attacks during multi-file uploads by leveraging a script that lacks its own ...

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted ASCII string in a BDF font. Successful exploitation allows remote attackers to cause a denial of service (invalid stack read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted glyph-outline data in a font. Successful exploitation allows remote attackers to cause a denial of service (invalid stack read operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted font. Successful exploitation allows remote attackers to cause a denial of service (divide-by-zero error).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted TrueType font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted private-dictionary data in a Type 1 font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors involving the NPUSHB and NPUSHW instructions in a TrueType font. Successful exploitation allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption).

The host is installed with VideoLAN VLC Media Player before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted glyph or bitmap data in a BDF font that lacks an ENCODING field. Successful exploitation allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption).


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1173

© 2013 SecPod Technologies