[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with Cisco WebEx extensions for Google Chrome before before 1.0.7, Mozilla Firefox before 106 or Internet Explorer before 2.1.0.10 and is prone to a Cisco WebEx browser extension remote code execution vulnerability. A flaw is present in the application, which fails to handle an application programing interface (API) response parser within the plugin. Successful exploitation a ...

The host is installed with Bamboo CI server before 6.10.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a missing authorization check. Successful exploitation could allow attackers to initiate periodic log scans and send the results to a user-specified email address.

The host is installed with Firebird 2.5.x before 2.5.7 or 3.x before 3.0.2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle insufficient checks in the UDF subsystem. Successful exploitation could allow remote authenticated users to execute code.

The host is installed with ActiveScriptRuby (ASR) before 1.8.7 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly restrict interaction with an Internet Explorer ActiveX environment. Successful exploitation could allow remote attackers to execute arbitrary Ruby code.

The host is installed with Quicktime before 7.7.2 and is prone to an integer signedness error vulnerability. A flaw is present in the application, which fails to properly handle a crafted QTVR movie file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Quicktime before 7.7.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted movie file with Sorenson encoding. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Quicktime before 7.7.2 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted pathname for a file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted TeXML file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle H.263 encoded movie files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle dref atoms. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    1323    1324    1325    1326    1327    1328    1329    1330    1331    1332    1333    1334    1335    1336    ..   1429

© SecPod Technologies