[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to denial of service vulnerability. The flaw is present in the dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector, which fails to properly handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (loop).

The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to denial of service vulnerability. The flaw is present in the dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector, which fails to properly initialize a data structure. Successful exploitation allows remote attackers to cause a denial of service (application crash) via a craft ...

The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to unspecified vulnerability. The flaw is present in the in the NBAP dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (application crash).

The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to spoofing vulnerability. The flaw is present in the ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissecto, which fails to properly handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (application crash).

The host is installed with VideoLAN VLC media player 2.0.8 or earlier and is prone to an unspecified vulnerability. The flaw is present in the application, which fails to handle a long string in a URL in a m3u file. Successful exploitation allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.

The host is installed with Microsoft Windows XP SP2, SP3, Server 2003 SP2, Vista SP1, SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, Windows 8.1, Server 2012 or Server 2012 R2 and is prone to security feature bypass vulnerability. A flaw is present in the application, which fails to properly handle a DirectAccess server. Successful exploitation allows attackers to spoof server ...

The host is installed with RealPlayer before 16.0.3.51, RealPlayer SP 1.0 through 1.1.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed RealMedia file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with RealPlayer before 16.0.3.51, RealPlayer SP 1.0 through 1.1.5 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted .rmp file. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Digital Editions 2.x before 2.0.1 and is prone to unspecified memory corruption vulnerability. The flaw is present in the application, which fails to properly handle memory. Successful exploitation allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.

The host is installed with Microsoft Office 2013 and is prone to a token hijacking vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted response while attempting to open an Office file hosted on the malicious website. Successful exploitation could allow attackers to ascertain access tokens used to authenticate the current user on a targeted ShareP ...


Pages:      Start    1096    1097    1098    1099    1100    1101    1102    1103    1104    1105    1106    1107    1108    1109    ..   1429

© SecPod Technologies