[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

125990

 
 

909

 
 

104883

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 2004 Download | Alert*

The host is installed with Apple QuickTime before 7.6.2 and is prone to a heap-based memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted JP2 image. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.5.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted PICT image. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to Apple advisory, APPLE-SA-2008-06-09. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a crafted file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to Apple advisory, APPLE-SA-2008-04-02. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary cod ...

The host is missing a security update according to, APPLE-SA-2008-02-06. The update is required to fix a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a long Reason-Phrase response to an rtsp:// request, as demonstrated using a 404 error message. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing a security update according to Apple advisory, APPLE-SA-2008-01-15. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a security update according to Adobe advisory, ASPB13-29. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing an important security update according to Microsoft advisory, MS13-102. The update is required to fix elevation of privilege vulnerability. A flaw is present in the application, which fails to properly handle the crafted LPC port message. Successful exploitation allows the attacker to cause a stack-based buffer overflow condition on the LRPC client.

The host is missing an important security update according to Microsoft bulletin, MS13-106. The update is required to fix security feature bypass vulnerability. A flaw is present in the application, because a specific Microsoft Office shared component was not built to implement the ASLR security feature. Successful exploitation allows attackers to bypass the ASLR security feature.

The host is missing an important security update according to Microsoft security bulletin, MS13-104. The updated is required to fix a token hijacking vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted response while attempting to open an Office file hosted on the malicious website. Successful exploitation could allow attackers to ascertain acces ...


Pages:      Start    174    175    176    177    178    179    180    181    182    183    184    185    186    187    ..   200

© SecPod Technologies