[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14850 Download | Alert*

The host is installed with Adobe Shockwave Player before 12.3.5.205 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Shockwave Player before 12.3.5.205 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Shockwave Player before 12.3.5.205 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with VMware Workstation 15.x before 15.5.1, VMware Player 15.x before 15.5.1 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle an issue in the e1000e virtual network adapter. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-se ...

The host is installed with KMPlayer 4.2.2.31 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause unspecified impact.

Unspecified vulnerability in Microsoft Excel 2000 through 2004 allows remote user-assisted attackers to execute arbitrary code via unspecified vectors. NOTE: this is a different vulnerability than CVE-2006-3086.

The host is installed with Qbik WinGate through 6.1.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a self-referencing compressed name pointer. Successful exploitation could allow remote attackers to cause a denial of service (CPU consumption).

The host is installed with Qbik WinGate 6.1.1.1077 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a issue in the WWW Proxy Server. Successful exploitation could allow remote attackers to cause a denial of service and possibly execute arbitrary code via a long URL HTTP request.

Unspecified vulnerability in the setRequestHeader method in the XMLHTTP (XML HTTP) ActiveX Control 4.0 in Microsoft XML Core Services 4.0 on Windows, when accessed by Internet Explorer, allows remote attackers to execute arbitrary code via crafted arguments that lead to memory corruption, a different vulnerability than CVE-2006-4685. NOTE: some of these details are obtained from third party infor ...

Buffer overflow in certain Asian language versions of Microsoft Excel might allow user-assisted attackers to execute arbitrary code via a crafted STYLE record in a spreadsheet that triggers the overflow when the user attempts to repair the document or selects the "Style" option, as demonstrated by nanika.xls. NOTE: Microsoft has confirmed to CVE via e-mail that this is different than the other Ex ...


Pages:      Start    1474    1475    1476    1477    1478    1479    1480    1481    1482    1483    1484    ..   1484

© SecPod Technologies