[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14857 Download | Alert*

The host is installed with Apple iTunes before 12.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

Buffer overflow in Apple QuickTime 7.5.5 and iTunes 8.0 allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a long type attribute in a quicktime tag (1) on a web page or embedded in a (2) .mp4 or (3) .mov file, possibly related to the Check_stack_cookie function and an off-by-one error that leads to a heap-based buffer overflow.

The host is installed with Adobe Reader or Adobe Acrobat and is prone to untrusted search path vulnerability. A flaw is present in the applications which fails to properly handle specially crafted DLL file. Successful exploitation allows remote attacker to gain privileges.

The host is installed with Adobe Reader and Adobe Acrobat and is prone to unspecified vulnerability. A flaw is present in the applications which does not properly validate the user input. Successful exploitation allows remote attacker to bypass intended access restrictions.

The host is installed with Adobe Reader or Adobe Acrobat and is prone to memory corruption vulnerability. A flaw is present in the applications which fails to properly handle the memory. Successful exploitation allows remote attacker to execute arbitrary code.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in Java Runtime Environment (JRE) component in the application, which fails to properly handle vectors related to deployment. Successful exploitation allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in Java Runtime Environment (JRE) component in the application, which fails to properly handle vectors related to deployment. Successful exploitation allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in Java Runtime Environment (JRE) component in the application, which fails to properly handle vectors related to deployment. Successful exploitation allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in Java Runtime Environment (JRE) component in the application, which fails to properly handle vectors related to deployment. Successful exploitation allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability.

The host is installed with Microsoft ASP.NET MVC 2, 3 or 4 and it is prone a cross-site scripting (XSS) vulnerability. A flaw is present in the application, which fails to handle a crafted web page. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.


Pages:      Start    1340    1341    1342    1343    1344    1345    1346    1347    1348    1349    1350    1351    1352    1353    ..   1485

© SecPod Technologies