[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Vista SP2, Server 2008 SP2, Windows 7 SP1 or Server 2008 R2 SP1 and is prone to an elevation of privilege vulnerability. A flaw is present in the Windows, which fails to properly sanitize handles in memory. An attacker who successfully exploited this vulnerability could run arbitrary code as System user.

The host is installed with Internet Explorer 10 and is prone to a memory corruption vulnerability. A flaw is present in the application, which improperly accesses objects in memory. Successfully exploitation can corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

The host is installed with Microsoft InfoPath 2007, InfoPath 2010 or InfoPath 2013 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle objects in memory. Successful exploitation allows attackers to run arbitrary code in the context of the current user.

The host is installed with Adobe Digital Editions before 4.5.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in WebKit, which fails to handle glyph data during layout actions for floating blocks associated with pseudo-elements. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service condition.

The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to denial of service vulnerability. A flaw is present in WebKit, which fails to prevent man-in-the-middle attack while browsing the iTunes Store via iTunes. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service condition.

The host is installed with Google Chrome before 10.0.648.204 and is prone to denial of service vulnerability. A flaw is present in the application which does not properly handle parentage. Successful exploitation allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

The host is installed with IBM DB2 9.7 before FP2 and is prone to security vulnerability. A flaw is present in the SYSIBMADM schema in the application which does not perform the expected access control on the monitor administrative views. Successful exploitation allow remote attackers can obtain sensitive information via unspecified vectors.

The host is installed with IBM DB2 9.7 before FP2 and is prone to denial of service vulnerability. A flaw is present in AUTO_REVAL database configuration parameter in the application which fails to handle an error during special group and user enumeration. Successful exploitation allows an attacker could rap the server and cause a denial of service.

The host is installed with IBM DB2 9.1 before FP9 or 9.5 before FP6 or 9.7 before FP2 and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle an error during special group and user enumeration. Successful exploitation allows an attacker could rap the server and cause a denial of service.


Pages:      Start    1244    1245    1246    1247    1248    1249    1250    1251    1252    1253    1254    1255    1256    1257    ..   1516

© SecPod Technologies