[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252097

 
 

909

 
 

196747

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17382 Download | Alert*

The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a malformed movie file. Successful exploitation could allow attackers to trigger an incorrect buffer length calculation and crash the service.

The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle a crafted movie file with Sorenson encoding. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle DELTA_FLI chunks and untrusted length values in a .fli file. Successful exploitation could allow attackers crash the service.

The host is installed with Apple Mac OS X 10.6 before 10.6.3 or Apple Quicktime 7.6.6 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a crafted genl atom in a QuickTime movie file with MPEG encoding. Successful exploitation could allow attackers to crash the service.

The host is installed with JetBrains PhpStorm before 2020.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to add source code to debug logs.

The host is installed with Jamovi through 1.6.18 and is prone to a cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle an issue in ElectronJS Framework. Successful exploitation could allow attackers to make a .omv (Jamovi) document containing a payload, when opened by victim, the payload is triggered.

The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle the Application Container issue. Successful exploitation allows an unauthenticated attacker to cause unspecified impact.

The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0, 12.2.1.3, 12.2.1.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle the Console issue. Successful exploitation allows an unauthenticated attacker to cause unspecified impact.

The host is installed with oracle WebLogic through 10.3.6.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle the core components issue. Successful exploitation allows an unauthenticated attacker to cause unspecified impact.

The host is installed with oracle WebLogic through 10.3.6.0, 12.1.3.0, 12.2.1.3, 12.2.1.4 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle the Console issue. Successful exploitation allows an unauthenticated attacker to cause unspecified impact.


Pages:      Start    1677    1678    1679    1680    1681    1682    1683    1684    1685    1686    1687    1688    1689    1690    ..   1738

© SecPod Technologies