[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 7346 Download | Alert*

Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an invalid offset in an unspecified undocumented opcode in ActionScript Virtual Machine 2, related to getouterscope, a different vulnerability than CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE- ...

Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, related to an "invalid pointer vulnerability" and the newfunction (0x44) operator, a different vulnerability than CVE-2010-2173.

Buffer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors.

The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.

The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an ear ...

The host is installed with Adobe Flash Player, Adobe AIR, Adobe Reader or Acrobat and is prone to remote code execution vulnerability. A flaw is present in authplay.dll, which fails to handle crafted flash content. Successful exploitation could allow remote attackers to execute arbitrary code or obtain sensitive information or cause denial of service.

The host is installed with Apple iTunes before 10.2 or Apple Safari before 5.0.4 and is prone to memory leak vulnerability. The flaw is present in the application, which fails to handle a PNG image containing malformed Physical Scale (aka sCAL) chunks. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Apple QuickTime before 7.6.9 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted JP2 file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.6.9 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted JP2 file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.6.9 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted movie file that causes an image sample transformation to scale a sprite outside a buffer boundary. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   734

© SecPod Technologies