[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14840 Download | Alert*

The host is installed with Microsoft Office Office 2013 or SP1 and is prone to an uninitialized memory use vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Microsoft Windows 7, SP1, Windows 8, Windows 8.1, Windows Server 2012 or Windows Server 2012 R2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle a sequence of crafted packets. Successful exploitation could allow attackers to take complete control of the affected system.

The host is installed with Cisco WebEx extensions for Google Chrome before before 1.0.7, Mozilla Firefox before 106 or Internet Explorer before 2.1.0.10 and is prone to a Cisco WebEx browser extension remote code execution vulnerability. A flaw is present in the application, which fails to handle an application programing interface (API) response parser within the plugin. Successful exploitation a ...

The host is installed with Bamboo CI server before 6.10.2 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle a missing authorization check. Successful exploitation could allow attackers to initiate periodic log scans and send the results to a user-specified email address.

The host is installed with Firebird 2.5.x before 2.5.7 or 3.x before 3.0.2 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle insufficient checks in the UDF subsystem. Successful exploitation could allow remote authenticated users to execute code.

The host is installed with Quicktime before 7.7.2 and is prone to an integer signedness error vulnerability. A flaw is present in the application, which fails to properly handle a crafted QTVR movie file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Quicktime before 7.7.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted movie file with Sorenson encoding. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Quicktime before 7.7.2 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted pathname for a file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted TeXML file. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.74.80.86 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle H.263 encoded movie files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    1423    1424    1425    1426    1427    1428    1429    1430    1431    1432    1433    1434    1435    1436    ..   1483

© SecPod Technologies