[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with Google SketchUp before 8.0.14346 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted RLE8 compressed BMP. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Google Picasa and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle certain properties of JPEG images. Successful exploitation could allow remote attackers to execute arbitrary code with the privilege of the running application.

Untrusted search path vulnerability in Google Earth 5.1.3535.3218 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse quserex.dll that is located in the same folder as a .kmz file.

The host is installed with Dropbox version 0.7.110 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle the zero-length directory name in the LD_LIBRARY_PATH. Successful exploitation allows local users to gain privileges via a Trojan horse shared library in the current working directory.

The host is installed with 7 zip 18.03 and earlier and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to handle a crafted RAR archive. Successful exploitation could allow remote attackers to crash the service through the usage of uninitialized memory.

The host is installed with Adobe Photoshop CS4 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted TIFF file. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Photoshop and is prone to security vulnerability. A flaw is present in the application, which fails to handle security issues. Successful exploitation could allow remote attackers to cause unknown impact.

The host is installed with Adobe Photoshop Elements 8.0 or earlier and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle crafted files. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with Adobe Photoshop CS4 11.0.1 or earlier and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle crafted ASL. ABR, GRD files. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Pidgin before 2.10.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle canceled SOCKS5 connection attempts. Successful exploitation allows user-assisted remote authenticated users to cause application crash via a sequence of XMPP file-transfer requests.


Pages:      Start    1264    1265    1266    1267    1268    1269    1270    1271    1272    1273    1274    1275    1276    1277    ..   1429

© SecPod Technologies