[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 8286 Download | Alert*

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a graphics memory corruption vulnerability. A flaw is present in application, which improperly handles specially crafted embedded fonts. An attacker who successfully exploited these vulnerabilities could install programs; view, change, or delete data; or create new accounts with full user rights.

The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted Microsoft Office file. Successful exploitation could allow attackers to run arbitrary code in the context of the current user.

The host is installed with Microsoft Office 2011 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted Microsoft Office file. Successful exploitation could allow attackers to run arbitrary code in the context of the current user.

The host is installed with Google Picasa 3.9.140 Build 239 or 3.9.140 Build 248 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle phase one 0x412 tag. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to an untrusted search path vulnerability. A flaw is present in the Wireshark Application class, which fails to handle a Trojan horse riched20.dll.dll file in the current working directory, related to use of QLibrary. Successful exploitation could allow local users to gain privileges.

The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle BER dissector which verifies certain length is nonzero. Successful exploitation could allow remote attackers to cause a denial of service (out-of-bounds read and application crash).

The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted packet. Successful exploitation could allow remote attackers to cause a denial of service (infinite loop).

The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted packet. Successful exploitation could allow remote attackers to cause a denial of service (application crash).

The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to limit the amount of header data. Successful exploitation could allow remote attackers to cause a denial of service (memory consumption or application crash).

The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to validate the data type. Successful exploitation could allow remote attackers to cause a denial of service (out-of-bounds read and application crash).


Pages:      Start    728    729    730    731    732    733    734    735    736    737    738    739    740    741    ..   828

© SecPod Technologies