[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with Adobe Flash Player 10.3.181.36 or before or Adobe AIR 2.7 or before and is prone to memory corruption vulnerability. A flaw is present in the applications which fail to properly handle memory. Successful exploitation allows remote attackers to execute remote code.

The host is installed with OpenOffice.org 2.x and 3.x before 3.3 and is prone to multiple directory traversal vulnerabilities. The flaws are present in the application, which fails to handle zip/jar package extraction. Successful exploitation may lead to overwriting files when relative file locations point to locations outside the root of the destination folder.

The host is installed with Adobe Flash Player 10.3.181.36 or before or Adobe AIR 2.7 or before and is prone to buffer overflow vulnerability. A flaw is present in the applications which fail to properly handle memory. Successful exploitation allows remote attackers to execute remote code.

The host is installed with Adobe Flash Player 10.3.181.36 or before or Adobe AIR 2.7 or before and is prone to buffer overflow vulnerability. A flaw is present in the applications which fail to properly handle memory. Successful exploitation allows remote attackers to execute remote code.

The host is installed with OpenOffice.org 2.x and 3.x before 3.3 and is prone to use-after-free vulnerability. A flaw is present in oowriter, which fails to properly sanitize user-supplied input. Successful exploitation may allow a remote unprivileged user to execute arbitrary code on the system with the privileges of a local user running OpenOffice.org.

The host is installed with OpenOffice.org 2.x and 3.x before 3.3 and is prone to use-after-free vulnerability. A flaw is present in oowriter, which fails to handle a specially crafted RTF document that triggers an out-of-bounds memory read. Successful exploitation may allow a remote unprivileged user to execute arbitrary code on the system with the privileges of a local user running OpenOffice.org ...

The host is installed with OpenOffice.org 2.x and 3.x before 3.3 and is prone to denial of service vulnerability. A flaw is present in the WW8DopTypography::ReadFromMem function of oowriter, which fails to handle specially crafted typography information in a crafted .DOC file that triggers an out-of-bound write. Successful exploitation may allow a remote unprivileged user to execute arbitrary code ...

The host is installed with Adobe Flash Player 10.3.181.36 or before or Adobe AIR 2.7 or before and is prone to multiple memory corruption vulnerabilities. The flaws are present in the applications which fail to properly handle crafted SWF file. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Wireshark 1.6.1 and is prone to a denial of service vulnerability. A flaw is present in an application, which fails to validate the IKE packet. Successful exploitation could allow attackers to crash the application.

The host is installed with Pidgin before 2.10.0 and is prone to NULL pointer dereference vulnerability. A flaw is present in the application, which is caused by an error in the IRC protocol plugin when handling WHO responses with special characters in the nicknames. Successful exploitation allow attackers to cause the application to crash.


Pages:      Start    1123    1124    1125    1126    1127    1128    1129    1130    1131    1132    1133    1134    1135    1136    ..   1429

© SecPod Technologies