[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87854

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 12047 Download | Alert*

The host is installed with Apple QuickTime before 7.7.3 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the transform attribute in text3GTrack elements. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.7.3 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle the style elements in QuickTime TeXML files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.7.3 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails in plugin's handling of MIME types. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.7.3 and is prone to use after free vulnerability. A flaw is present in the application, which fails in the QuickTime ActiveX control's handling of the Clear() method. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.7.3 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle Targa image files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.7.3 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle 'rnet' boxes in MP4 files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with SQL Server 2000 Reporting Services Service or 2005 SP4 or 2008 SP2 or SP3 or 2008 R2 SP1 or 2012 and is prone to reflected XSS vulnerability. A flaw is present in the application, which fails to handle SQL Server Report Manager input parameters. Successful exploitation could allows an attacker to inject a client-side script into the user's instance of Internet Explorer.

The host is installed with Javascript and Vbscript 5.6 or 5.7 or 5.8 scripting engines and is prone to remote code execution vulnerability. A flaw is present in the application which is caused when the scripting engines attempt to reallocate memory while decoding a script in order to run it, an integer overflow could occur. Successful exploitation allows remote attacker to take complete control of ...

The host is installed with Microsoft Office 2003, Office 2003 Web Components, Microsoft Office 2007, 2010, Microsoft Host Integration Server 2004 , Microsoft Visual FoxPro 8.0, 9.0 or Visual Basic 6.0 Runtime, Microsoft SQL Server 2000, 2005, 2008, 2008 R2 and is prone to remote code execution vulnerability. A flaw is present in the applications, which is caused when an ActiveX control corrupts th ...

The host is installed with Microsoft visio 2010 SP1 or Visio viewer 2010 SP1 and is prone to remote code execution vulnerability. A flaw is present in the in Microsoft Office, which fails to handle a specially crafted Visio file. Successful exploitation could allow an attacker to gain the same user rights as the local user and take complete control of an affected system.


Pages:      Start    1192    1193    1194    1195    1196    1197    1198    1199    1200    1201    1202    1203    1204    ..   1204

© SecPod Technologies