[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

114411

 
 

909

 
 

88812

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 88593 Download | Alert*

The host is installed with Apple Mac OS X 10.6 through v10.6.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the IPV6 sockets. Successful exploitation could allow attackers to crash the service.

Android before 2.3 does not properly restrict access to the system property space, which allows local applications to bypass the application sandbox and gain privileges, as demonstrated by psneuter and KillingInTheNameOf, related to the use of Android shared memory (ashmem) and ASHMEM_SET_PROT_MASK.

The host is installed with Microsoft Windows Azure Software Development Kit and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly support the use of cookies for maintaining state. Successful exploitation could allow remote attackers to obtain potentially sensitive information by reading an encrypted cookie.

The host is installed with Google Chrome and is prone to Use-after-free vulnerability. The flaw in present in WebKit in Webcore, due to improper handling of provisional items by the HistoryController component. Successful exploitation could allow remote attackers to crash the affected application, denying service to legitimate users.

The host is installed with Google Chrome and is prone to Use-after-free vulnerability. The flaw in present in WebKit in Webcore, due to improper handling of provisional items by the HistoryController component. Successful exploitation could allow remote attackers to crash the affected application, denying service to legitimate users.

The host is installed with Google Chrome and is prone to use-after-free vulnerability. A flaw in present in WebKit in Webcore, which fails to properly handle provisional items by the HistoryController component. Successful exploitation allow remote attackers to crash the affected application, denying service to legitimate users.

The host is installed with VLC Media Player 1.0.0 through 1.1.9 and is prone to buffer-overflow vulnerability. A flaw is present in the application which fails to perform adequate checks on user-supplied input when a user attempts to create a bookmark via the 'Playback' menu while playing an mp3 audio file containing crafted ID3 metadata tags. Successful exploitation allows remote attacker to exec ...

The host is installed with IBM Lotus Sametime 8.0 before 8.0.2 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle the authReasonCode parameter in an OpenDatabase action. Successful exploitation could allow attackers to inject arbitrary code.

The host is installed with IBM Lotus Sametime before 8.0.2 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle the authReasonCode parameter in an OpenDatabase action. Successful exploitation could allow attackers to inject arbitrary code.

The host is installed with Novell File Reporter and is prone to stack based buffer overflow vulnerability. A flaw is present in the NFRAgent.exe component, which fails to validate user supplied data and copies it into a fixed length buffer on the stack while handling XML tags. Successful exploitation could allow remote attackers to execute arbitrary code.


Pages:      Start    7845    7846    7847    7848    7849    7850    7851    7852    7853    7854    7855    7856    7857    7858    ..   8859

© SecPod Technologies