[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108741

 
 

909

 
 

85467

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 85453 Download | Alert*

The host is installed with Word for Mac 2011 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could run arbitrary code in the context of the current user.

An information disclosure vulnerability exists when Microsoft Office software reads out of bound memory due to an uninitialized variable, which could disclose the contents of memory. An attacker who successfully exploited the vulnerability could view out of bound memory. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Offic ...

The host is installed with Apple iTunes before 12.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted identifiers. Successful exploitation could allows context-dependent attackers to cause a denial of service (CPU consumption).

The host is installed with RealPlayer 12.0.0.1569 or before and is prone to cross-zone scripting vulnerability. A flaw is present in the application which fails to properly handle local HTML files. Successful exploitation allows remote attackers to inject arbitrary web script or HTML in the Local Zone.

The host is installed with Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to affect confidentiality.

The host is installed with Apple Mac OS X 10.5.8 or 10.6.3 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is installed with Microsoft Office 2011 for Mac and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle specially crafted word files. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Photoshop CS5 (12.0) or CS5.1 (12.1) and is prone to stack-based buffer-overflow vulnerability. A flaw is present in the application, which fails to perform adequate boundary-checks on user-supplied data. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Ruby on rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to handle a malformed HTML markup. Successful exploitation could allow attackers to inject arbitrary web script.

The host is installed with Oracle Java SE 1.6.0_37 before 1.6.0_39 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle vectors related to RMI. Successful exploitation allows attackers to affect integrity.


Pages:      Start    7975    7976    7977    7978    7979    7980    7981    7982    7983    7984    7985    7986    7987    7988    ..   8545

© SecPod Technologies