[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14865 Download | Alert*

The host is installed with Google Picasa and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle certain properties of JPEG images. Successful exploitation could allow remote attackers to execute arbitrary code with the privilege of the running application.

Untrusted search path vulnerability in Google Earth 5.1.3535.3218 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse quserex.dll that is located in the same folder as a .kmz file.

The host is installed with Dropbox version 0.7.110 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle the zero-length directory name in the LD_LIBRARY_PATH. Successful exploitation allows local users to gain privileges via a Trojan horse shared library in the current working directory.

The host is installed with 7 zip through 16.2 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle a Trojan horse DLL. Successful exploitation could allow remote attackers to gain privileges.

The host is installed with 7-zip before 4.5.7 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to cause unknown impact.

The host is installed with 7 zip 18.03 and earlier and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to handle a crafted RAR archive. Successful exploitation could allow remote attackers to crash the service through the usage of uninitialized memory.

The host is installed with Adobe Photoshop CS4 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to properly handle a crafted TIFF file. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Photoshop and is prone to security vulnerability. A flaw is present in the application, which fails to handle security issues. Successful exploitation could allow remote attackers to cause unknown impact.

The host is installed with Adobe Photoshop Elements 8.0 or earlier and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle crafted files. Successful exploitation allows remote attackers to cause a denial of service.

The host is installed with Adobe Photoshop CS4 11.0.1 or earlier and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle crafted ASL. ABR, GRD files. Successful exploitation allows remote attackers to execute arbitrary code.


Pages:      Start    1361    1362    1363    1364    1365    1366    1367    1368    1369    1370    1371    1372    1373    1374    ..   1486

© SecPod Technologies