[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17560 Download | Alert*

The host is installed with Adobe Digital Editions before 4.5.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Digital Editions before 4.5.2 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Digital Editions before 4.5.2 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Apple Mac OS X before 10.6.3 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly handle crafted unicode string. Successful exploitation could allow remote attackers to inject arbitrary web script or HTML.

The host is installed with Microsoft Silverlight 5 and is prone to elevation of privilege vulnerability. A flaw is present in the application, which fails to validate user supplied information. Successful exploitation allows attackers to execute the specially crafted application.

The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to a improper access control vulnerability. A flaw is present in the application, which fails to prevent _unknown user from browsing the share point but not guests. Successful exploitation could allow attackers to access share point record.

The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to a authentication bypass vulnerability. A flaw is present in the application, which fails to properly handle authentication authority. Successful exploitation could allow attackers to bypass the password requirement.

The host is installed with Apple Mac OS X 10.7 before 10.7.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle access control issue existed in Open Directory. Successful exploitation could allow attackers to another local user's password data.

The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle file deletions in directories with the sticky bit. Successful exploitation could allow attackers to bypass intended permissions.

The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to prevent FireWire DMA in the absence of a login. Successful exploitation could allow attackers to bypass intended access restrictions.


Pages:      Start    1728    1729    1730    1731    1732    1733    1734    1735    1736    1737    1738    1739    1740    1741    ..   1755

© SecPod Technologies