[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108530

 
 

909

 
 

85343

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 85329 Download | Alert*

The host is installed with Wireshark 1.12.x before 1.12.7 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly terminate a data structure after a failure to locate a number within a string. Successful exploitation allows remote attackers to cause a denial of service (application crash).

The host is installed with Wireshark 1.12.x before 1.12.9 and is prone to denial of service vulnerability. A flaw is present in the application, which does not ensure that a conversation exists. Successful exploitation allows remote attackers to cause a denial of service (application crash).

The host is installed with Adobe Photoshop CC 2014 before 15.2.3.58 or Adobe Photoshop CC 2015 before 16.0.0.88 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is missing an important security update according to Microsoft bulletin, MS16-120. The update is required to fix multiple TrueType Font Parsing vulnerability. A flaw is present in the application, which fails to properly handle truetype fonts. Successful exploitation allows attackers to take complete control of the affected system.

The host is installed with Apple QuickTime before 7.7 and is prone to integer overflow vulnerability. A flaw is present in the application which fails to properly handle RIFF WAV files. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

Apple iWork is installed (Mac OS X)

The host is installed with Apple Mac OS X 10.5.8 or 10.6.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is installed with Apple Mac OS X 10.5.8 or 10.6.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is installed with Office 2008 for Mac or Open XML File Format Converter for Mac and is prone to a heap corruption vulnerability. A flaw is present in the application, which fails to properly parse records in Excel spreadsheets. Successful exploitation could allow attackers to execute arbitrary code.

The host is missing an important security update according to Microsoft security bulletin, MS11-072. The update is required to fix multiple remote code execution vulnerabilities. Multiple flaws are present in the applications, which fail to properly handle different crafted excel files. Successful exploitation could allow attackers to take complete control of the system.


Pages:      Start    7941    7942    7943    7944    7945    7946    7947    7948    7949    7950    7951    7952    7953    7954    ..   8532

© SecPod Technologies