[Forgot Password]
Login  Register Subscribe

24002

 
 

127027

 
 

102010

 
 

909

 
 

81374

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 11085 Download | Alert*

The host is installed with LibreOffice through 6.0.1 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to properly handle =WEBSERVICE calls in a document. Successful exploitation could allow remote attackers to read arbitrary files.

The host is installed with Piriform CCleaner 3.26.0.1988 through 5.02.5101 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unallocated disk space. Successful exploitation could allow remote attackers to disclose sensitive information.

The host is installed with Notepad++ before 4.8.1 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle a trojan horse update. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with Notepad++ 6.6.9 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a long time attribute in an event element in an XML file. Successful exploitation could allow remote attackers to have unspecified impact.

The host is installed with Google Chrome before 64.0.3282.167 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle derived class instantiation in V8. Successful exploitation allows attackers to exploit this issue to bypass certain security restrictions to gain unauthorized access.

The host is installed with Adobe Flash Player before 18.0.0.268, 19.x, 20.x before 20.0.0.228 or Adobe AIR before 20.0.0.204 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the applications, which fail to properly handle an MP3 file with COMM tags that are mishandled during memory allocation. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 18.0.0.324, 19.x, 20.x before 20.0.0.267 , Adobe AIR before 20.0.0.233, Internet Explorer 10, Internet Explorer 11 or Microsoft Edge and is prone to an integer overflow vulnerability. A flaw is present in the applications, which fail to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player through 18.0.0.252 or 19.x through 19.0.0.207 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to crash and take control of the affected system.

The host is installed with Adobe Flash Player through 13.0.0.296 and 14.x through 18.x through 18.0.0.194 or Adobe Air before 18.0.0.180 and is prone to a security bypass vulnerability. A flaw is present in the applications, which fail to handle crafted data. Successful exploitation could allow attackers to take control of the affected system.

The host is installed with Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 or Adobe AIR before 17.0.0.172 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1108

© 2013 SecPod Technologies