[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26631 Download | Alert*

The host is installed with Apple QuickTime before 7.7.9 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted movie file. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).

The host is installed with Apple QuickTime before 7.7.9 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted movie file. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).

The host is installed with Apple QuickTime before 7.7.9 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a crafted TXXX frame in a movie file. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash).

The host is installed with Apple QuickTime before 7.7.9 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted movie file. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).

The host is installed with OpenAFS before 1.6.1300 and is prone to an out-of-bounds vulnerability. A flaw is present in the application, which fails to handle a crafted regular expression. Successful exploitation allows remote authenticated users to cause a denial of service (out-of-bounds read and crash).

The host is installed with OpenAFS before 1.6.1300 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted OSD FS command. Successful exploitation allows local users to cause a denial of service (memory corruption and kernel panic).

The host is installed with OpenAFS 1.6.0800 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors related to TMAY requests. Successful exploitation allows remote attackers to cause a denial of service (uninitialized memory access and crash).

The host is installed with OpenAFS 1.4.0800 before 1.6.0700 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted statsVersion argument. Successful exploitation allows remote attackers to cause a denial of service (crash).

The host is installed with EMC Documentum eRoom 7.x before 7.4.3.f and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted message over TCP. Successful exploitation could allow attackers to overflow the buffer.

The host is installed with InduSoft Web Studio 7.0 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to validate user supplied input. Successful exploitation allows remote attackers to execute arbitrary code.


Pages:      Start    2641    2642    2643    2644    2645    2646    2647    2648    2649    2650    2651    2652    2653    2654    ..   2663

© SecPod Technologies